As part of Cybersecurity Awareness Month, we want to make sure you (the end user) understand the various threats attacking the thing that is more or less attached to you for most of the day – your mobile device. This week, we’ll focus on the signs of cryptojacking and what you can do about it.

What is cryptojacking?

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. The crypto mining code works in the background as unsuspecting victims use their computers normally.

What are the symptoms?

A few signs of cryptojacking include:

  • Device heating up
  • Laptop making loud whirring noises
  • Battery draining faster than usual
  • Impaired device performance – slowing down, crashing, etc.

What are the causes?

Currencies such as Bitcoin, Ethereum and Monero are all continually ‘mined’ by using distributed computing resources to work out problems that generate ‘hashes’. Anyone can use their machines to process new coins in this way, but with cryptojacking, website owners and app developers are able to harness the CPU of their audience instead, earning them cryptocurrency in the process.

Hackers cryptojack your device by either getting you to click on a malicious link in an email that loads crypto mining code on your device, or by infecting a website or online ad with JavaScript code that auto-executes once loaded in your browser.

cryptojacking.

What’s the treatment for cryptojacking?

So you’ve seen the signs of cryptojacking on your device, what now?

  • Close and block the website running the script
  • Update and purge browser extensions

Prevention

The best remedy is prevention. Stay safe from cryptojacking by following this guidance:

  • Watch out for phishing-type attempts to load scripts onto your device
  • Install an ad-blocker extension for your web browsers
  • Routinely check your browser extensions for anything suspicious and keep them up to date

No matter how hard you try to educate yourself and your team, it’s inevitable that some attempts will slip through the net. To stay ahead of the attacker it’s imperative to have a security solution in place which is able to intercept traffic to phishing sites, stopping the threat at its source. For more information, get in contact with one of our mobility experts today.

Mobile Threat Landscape 2018

Mobile moves fast, and security moves even faster. What are the key mobile security challenges facing the enterprise in 2018? Download this report to find out.

Download now