Archives - Cryptojacking


The current state of ransomware

Ransomware is not new – it dates back to the 1980s – but it has undergone a renaissance throughout the 2010s, to the extent that it looks almost nothing like it did in its early days. Perpetrators have enhanced various strains with strong encryption (CryptoLocker), designed them to exploit protocols such as Microsoft Windows SMB […]

How do you defend against cryptojacking?

Use Cybersecurity best practices to help you protect your internet-connected systems and devices against cryptojacking. Use and maintain antivirus software, it recognizes and protects a computer against malware, allowing the owner or operator to detect and remove a potentially unwanted program before it can do any damage. Keep software and operating systems up-to-date so that […]

Types of Malware: What is cryptojacking?

Malicious actors distribute cryptojacking malware through weaponized mobile applications, botnets, and social media platforms by exploiting flaws in applications and servers, and by hijacking Wi-Fi hotspots. With the cryptomining software installed, the malicious cyber actors effectively hijack the processing power of the victim devices and systems to earn cryptocurrency. Additionally, malicious cyber actors may infect […]