ARTICLE
12 December 2019

Cybercriminals Are Innovative - So Watch Out For Cryptojacking!

FL
Foley & Lardner

Contributor

Foley & Lardner LLP looks beyond the law to focus on the constantly evolving demands facing our clients and their industries. With over 1,100 lawyers in 24 offices across the United States, Mexico, Europe and Asia, Foley approaches client service by first understanding our clients’ priorities, objectives and challenges. We work hard to understand our clients’ issues and forge long-term relationships with them to help achieve successful outcomes and solve their legal issues through practical business advice and cutting-edge legal insight. Our clients view us as trusted business advisors because we understand that great legal service is only valuable if it is relevant, practical and beneficial to their businesses.
HelpNetSecurity.com reported that "Cryptojacking is a breach where malware is installed on a device connected to the internet (anything from a phone, to a gaming console, to an organization's servers)
United States Technology

HelpNetSecurity.com reported that “Cryptojacking is a breach where malware is installed on a device connected to the internet (anything from a phone, to a gaming console, to an organization’s servers). Once installed, the malware uses the hijacked computing power to “mine” cryptocurrency without the user’s knowledge.”  The December 6, 2019 article entitled “The hidden risks of cryptojacking attacks” includes these comments:

Unlike phishing or ransomware attacks, cryptojacking runs nearly silently in the background of the victim’s device, and as a result the increase in cryptojacking attacks has flown mainly under the radar.

Yet, new studies suggest that attacks of this type have more than tripled since 2017, generating concern as these undetected breaches siphon energy, slow down performance of systems and expose victims to additional risk.

The rise of cryptojacking has followed the same upward trajectory as the value of cryptocurrency. Suddenly, digital “cash” is worth actual money and hackers, who usually have to take several steps to generate income from stolen data, have a direct path to cashing in on their exploits.

In fundamental terms, cryptojacking attacks are about stealing… in this case energy and system resources.

The energy might be minimal (more about that in a moment) but using resources slows the performance of the overall system and actually increases wear and tear on the hardware, reducing its lifespan, resulting in frustration, inefficiency and increased costs.

Be careful out there since Cybercriminals way ahead of us!

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More