• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Malware • News  /  Cryptojacking: FAQs for Businesses
Cryptojacking: FAQs for Businesses
26 June 2018

Cryptojacking: FAQs for Businesses

Written by Ankita Ashesh
Ankita Ashesh
Malware, News
10
Shares

If ransomware, malware, hacking and data loss weren’t enough for India’s cybersecurity space, it has now got another problem to deal with. On 11 May, 2018, it was widely reported that India had just seen a major cryptojacking attack. More than 2,000 computers from Aditya Birla company were targeted by hackers for cryptojacking. As per the reports, the attack was first detected at an overseas subsidiary and soon found its way to some of the manufacturing and service computers of the company. The reports quoted an Aditya Birla spokesperson specifying that the threat had been neutralized and that they had ascertained there was no data loss.

So what is Cryptojacking?

But if you’re a business owner, don’t get lulled into a false of security by the “no data loss” version. In fact, that’s the very point of this new, dangerous form of cyber attack. Cryptojacking attacks don’t necessarily cause data loss; they serve a more dangerous, insidious purpose. They are used by hackers to use someone else’s computer to generate or mine cryptocurrency.

In the Aditya Birla attack, the cryptocurrency that was mined was Montero which is used by many cybercriminals as it is considered to be more anonymous than the more well-known Bitcoin.

How does it work?

Hackers try and get unsuspecting victims to click on malicious links in emails or hosting a website or ad with infected code. Once the victim is infected, the code then works in the background mining cryptocurrency, sometimes without victims even noticing it.

The harmful effects

To understand how cryptojacking works, we need to also understand the basics of cryptocurrency. There are two ways to get cryptocurrency: either buy it or mine it. Mining requires computers with massive processing computer which not many can afford. Hence, this is where hackers have found a malicious way to gain cryptocurrency: use other people’s processing power to generate cryptocurrency.

But obviously, this has a side-effect. The systems which are cryptojacked operate at full capacity, resulting in high electricity consumption. The computer gets hotter, the fans get louder. This has an effect on the system as well as it can crash often, affect the company’s security and productivity. In effect, hackers are using their victim’s computers for their own personal usage and ensuring the victims also foot the electricity bill.

Are only PCs affected?

No, not really. Any browser that has JavaScript running can be affected by cryptojacking. This effectively means that desktops, laptops and even mobile devices can be affected, making almost all electric devices of a business susceptible.

What steps can be taken to prevent cryptojacking?

Obviously, the first step towards securing your organization against cryptojacking is awareness. If a business is aware of this new kind of threat, that itself goes a long way in securing their defense.

  • Installing ad-blocking software on browsers

Most cryptojacking scripts are delivered through malicious code embedded in websites which users inadvertently stumble upon. Installing an ad-blocker or an anti-cryptomining software on the browser is an effective means to guard against these kinds of attempts.

  • Web Filtering

Most major cybersecurity solutions offer Web Filtering tools. These web filtering tools can be customized to ensure that websites which are found suspicious of containing cryptojacking code can be blocked and users can be prevented from accessing them.

  • Network Monitoring

Similarly, a network monitoring tool also helps in detecting large surges of processor activity which can be a symptom of a device being cryptojacked. Network administrators must keep an eye on the monitoring data for anomalies.

  • A Mobile Device Management (MDM) solution

As mentioned previously, cryptojacking efforts also include mobile phones which business employees may use for their convenience. To prevent this kind of hijacking, a strong Mobile Device Management (MDM) solution can be useful.

Seqrite’s Unified Threat Management (UTM) solution can be a strong defense against cryptojacking efforts thanks to its advanced Intrusion Detection System and URL Filtering. For mobile devices, businesses can consider Seqrite’s Mobile Device Management (MDM) solution, thanks to key features which help to prevent cryptojacking.

 Previous PostLatest cyber threats you should know about
Next Post  Cybersecurity in international sporting events like the 2018 FIFA...
Ankita Ashesh

About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • 5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

    December 26, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies