It is known that cryptojackers use network vulnerabilities and steal computer resources for mining (mining) cryptocurrencies. They spread malware in various ways, often spreading viruses over the Internet. These viruses and techniques, like extortion by cryptographers, are used to inject malicious code into victims’ systems, which secretly runs in the background without the victims’ knowledge. After the code is implemented, it starts sending the required results back to the hacker.


Cryptojackers are difficult to detect, as malicious code can go unnoticed for a long time. Since their motive is not to steal the victims’ data, but to use their system as a means for mining cryptocurrencies, it is difficult to trace the source of the infection after it is detected.

Motives: Cryptocurrency Mining

Who is most at risk? Any individual or organization with unsecured networks