{"id":7353,"date":"2018-07-24T15:30:45","date_gmt":"2018-07-24T15:30:45","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541705"},"modified":"2018-07-24T15:30:45","modified_gmt":"2018-07-24T15:30:45","slug":"the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/","title":{"rendered":"The trend toward cryptojacking: What it is and how businesses can prevent it"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog4-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\"\/><\/p>\n<p>Digital attacks have evolved quite a bit in recent years. First, businesses and researchers observed a rash of ransomware, wherein encryption was exploited to lock users out of their data and files in an attempt to collect financial ransom.<\/p>\n<p>Now, the next big wave in cybercriminal strategy has come, involving increasingly popular cryptocurrencies and the ability to leverage the computer power of unknowing users\u2019 systems to mine a profit. This process is called cryptojacking \u2013 and it\u2019s putting businesses and individual users all across the globe at potential risk.<\/p>\n<h3><strong>Understanding cryptojacking: Defining the basics<\/strong><\/h3>\n<p>Ahead of delving into this new cybercriminal process, let\u2019s break down the underlying concepts.<\/p>\n<p>Cryptojacking revolves around cryptocurrency mining, a process in which users leverage infrastructure systems and their computing power in order to verify digital transactions and reconcile associated hash function algorithms. This process enables users to create the next block of transactions in the blockchain, the digital, unchangeable ledger wherein all cryptocurrency transactions are recorded and compiled. Once a transaction is verified, the next block in the blockchain is created \u2013 once established, blocks within the blockchain and their associated transactions can not be adjusted or shifted.<\/p>\n<p>\u201cEach time a cryptocurrency transaction is made, a cryptocurrency miner is responsible for <a href=\"https:\/\/www.webopedia.com\/TERM\/C\/cryptocurrency-mining.html\">ensuring the authenticity of information<\/a> and updating the blockchain with the transaction,\u201d Webopedia explained. \u201cThe mining process itself involves competing with other cryptominers to solve complicated mathematical problems with cryptographic hash functions that are associated with a block containing the transaction data.\u201d<\/p>\n<p>The miner that is first able to resolve the hash functions is then able to authorize the transaction and earn a small profit in cryptocurrency for adding to the blockchain.\u00a0It is this<\/p>\n<p>competitive nature and potential for reward \u2013 despite only being a small amount per transaction \u2013 that has attracted hackers and other malicious actors to the arena.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-541706\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog2.jpg\" alt=\"\" width=\"800\" height=\"534\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog2.jpg 800w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog2-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog2-768x513.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog2-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog2-440x294.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog2-380x254.jpg 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/p>\n<p><em>Cryptojacking involves the fraudulent use of user systems for cryptocurrency mining.<\/em><\/p>\n<h3><strong>Cryptocurrency mining vs. cryptojacking: What\u2019s the difference?<\/strong><\/h3>\n<p>Legitimate users, leveraging their own systems and the required specialized mining hardware, can engage in cryptocurrency mining. In fact, as noted above, the process is essential for verifying transactions hinging upon the use of cryptocurrency, and to support the continual growth of the underlying blockchain ledger.<\/p>\n<p>However, there is a stark difference between legitimate and necessary cryptocurrency mining and malicious cryptojacking\u00a0processes.\u00a0The distinction here rests in authorized use.<\/p>\n<p>Cryptocurrency miners utilize their own systems and therefore have authorized permission to leverage this computing power in order to solve the associated hash functions and create the next block of transactions in the blockchain. Those engaged in cryptojacking, on the other hand, breach and use someone else\u2019s computing systems in an unauthorized manner.<\/p>\n<p>Within cryptocurrency mining, the miner is the authorized user of the system being leveraged and reaps the small cryptocurrency reward for verifying transactions. Cryptojacking\u00a0sees this reward delivered to the hacker who has broken in and is stealing the resources of another user\u2019s systems.<\/p>\n<p>As CSO contributor Michael Nadeau explained, the <a href=\"https:\/\/www.csoonline.com\/article\/3253572\/internet\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html\">infection process is somewhat similar<\/a> to other attack styles like ransomware.<\/p>\n<p>\u201cHackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infection a website or online ad with JavaScript code that auto-executes once loaded in the victim\u2019s browser,\u201d Nadeau wrote. \u201cEither way, the cryptomining code then works in the background as unsuspecting victims use their computers normally.\u201d<\/p>\n<p>Once infected, users are often unaware that their systems have been leveraged for cryptojacking by an unauthorized intruder. In this way, the malicious actor can allow the cryptomining software to operate in the background and enable them to earn a profit by verifying cryptocurrency transactions.<\/p>\n<p>As Nadeau pointed out, the only somewhat tell-tale sign of cryptojacking is a slowdown or lag in performance or action execution, which can also be a symptom of an array of other types of infections or system issues.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-541707\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog3.jpg\" alt=\"\" width=\"800\" height=\"420\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog3.jpg 800w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog3-300x158.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog3-768x403.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog3-640x336.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog3-440x231.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog3-380x200.jpg 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/p>\n<p><em>There\u2019s a substantial difference between cryptojacking and cryptocurrency mining.<\/em><\/p>\n<h3><strong>Cryptojacking campaign discovered: Infected live support platform<\/strong><\/h3>\n<p>Concrete evidence in the rise of cryptojacking lies in the increasing discovery of infected sites, spreading cryptomining software to unsuspecting visitors. Trend Micro <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cryptojacking-campaign-impacts-nearly-1-500-websites\">reported on just such an instance in November 2017<\/a>, wherein a considerably large cryptojacking campaign was uncovered, with a live chat and support platform at the center.<\/p>\n<p>Security researchers discovered that nearly 1,500 websites that included a widget for the live chat and support platform were infected and being used for cryptocurrency mining.<\/p>\n<p>\u201cA copy of the Coinhive in-browser cryptocurrency miner was found inside a JavaScript file used by LiveHelpNow, a live chat and support platform that was being loaded on the websites,\u201d Trend Micro reported.<\/p>\n<p>This issue is worsened by the fact that the JavaScript code doesn\u2019t have to be specifically installed in order to allow for cryptojacking \u2013 users need only visit the affected websites that include the LiveHelpNow widget including the Coinhive code. Once a user loads the webpage, the mining code runs automatically within their browser.<\/p>\n<p>Many of the 1,500 sites impacted by the infected LiveHelpNow widget were e-commerce companies and small, private businesses. Interestingly, attackers chose an ideal time to put the cryptomining code in place \u2013 right ahead of the busy end-of-year shopping season.<\/p>\n<p>Recognizable names including Everlast were included in the list of affected websites included in this cryptojacking campaign. Other organizations\u2019 websites \u2013 including Politifact, Showtime and even Pirate Bay \u2013 have also been impacted by cryptomining code.<\/p>\n<p>\u201cUsers accessing the affected websites will see their CPU usage shoot as Coinhive script mines the Monero cryptocurrency for another party,\u201d Trend Micro noted.<\/p>\n<h3><strong>The issue for businesses: Cryptojacking prevention<\/strong><\/h3>\n<p>While cryptojacking is certainly a prominent risk for all users, the threat could hit enterprises particularly hard. When available CPU resources are being leveraged to support cryptomining, the performance of other platforms that rely on this support will suffer. This can prevent employees from properly engaging and using company platforms and necessary software. And while cryptocurrency mining and cryptojacking are still in their infancy, now is the time for organizations to prepare and guard against this threat.<\/p>\n<p>First, it\u2019s imperative to include cryptojacking as part of security awareness training. When workers and IT department members in particular understand what to look for, they can help reduce the risk. There are also ad-blocking and anti-cryptomining extensions that can be installed within web browsers to help avoid infections.<\/p>\n<p>Endpoint protection and specific, robust solutions like Trend Micro <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps.html?cm_mmc=VURL:www.trendmicro.com-_-VURL-_-\/us\/enterprise\/network-security\/interscan-web-security\/index.html-_-1:1\">Smart Protection Suites<\/a> and <a href=\"https:\/\/www.trendmicro.com\/en_us\/small-business\/worry-free.html\">Worry-Free Business Security<\/a> can help safeguard organizations and their users through the fast detection and blocking of malicious files and websites.<\/p>\n<p>To find out more, connect with the experts at Trend Micro today.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital attacks have evolved quite a bit in recent years. First, businesses and researchers observed a rash of ransomware, wherein encryption was exploited to lock users out of their data and files in an attempt to collect financial ransom. Now, the next big wave in cybercriminal strategy has come, involving increasingly popular cryptocurrencies and the&#8230;<br \/>\nThe post The trend toward cryptojacking: What it is and how businesses can prevent it appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7354,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1282,677,21,1205,1283,2234,106,311,307],"class_list":["post-7353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-crypto-miners","tag-crypto-mining","tag-cryptocurrency","tag-cryptocurrency-mining","tag-cryptojacking","tag-cryptominers","tag-cryptomining","tag-current-news","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The trend toward cryptojacking: What it is and how businesses can prevent it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The trend toward cryptojacking: What it is and how businesses can prevent it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-24T15:30:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The trend toward cryptojacking: What it is and how businesses can prevent it\",\"datePublished\":\"2018-07-24T15:30:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\"},\"wordCount\":1126,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg\",\"keywords\":[\"Crypto Miners\",\"crypto-mining\",\"Cryptocurrency\",\"Cryptocurrency mining\",\"cryptojacking\",\"cryptominers\",\"cryptomining\",\"Current News\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\",\"name\":\"The trend toward cryptojacking: What it is and how businesses can prevent it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg\",\"datePublished\":\"2018-07-24T15:30:45+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crypto Miners\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/crypto-miners\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The trend toward cryptojacking: What it is and how businesses can prevent it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The trend toward cryptojacking: What it is and how businesses can prevent it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/","og_locale":"en_US","og_type":"article","og_title":"The trend toward cryptojacking: What it is and how businesses can prevent it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-24T15:30:45+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The trend toward cryptojacking: What it is and how businesses can prevent it","datePublished":"2018-07-24T15:30:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/"},"wordCount":1126,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg","keywords":["Crypto Miners","crypto-mining","Cryptocurrency","Cryptocurrency mining","cryptojacking","cryptominers","cryptomining","Current News","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/","url":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/","name":"The trend toward cryptojacking: What it is and how businesses can prevent it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg","datePublished":"2018-07-24T15:30:45+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Crypto Miners","item":"https:\/\/www.threatshub.org\/blog\/tag\/crypto-miners\/"},{"@type":"ListItem","position":3,"name":"The trend toward cryptojacking: What it is and how businesses can prevent it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=7353"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7353\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/7354"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=7353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=7353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=7353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}