1. Cloud Incident Response Wiki
  2. Cloud Forensics and Cloud Security

Cryptomining vs. Cryptojacking

 

In today's digital world, cryptocurrency has become increasingly popular. This has led to the rise of two related activities: cryptomining and cryptojacking. While both involve using computers to generate cryptocurrency, they differ significantly in their legitimacy and impact.

 

We've built a platform to automate incident response and forensics in AWS, Azure, and GCP you can grab a demo here. You can also download a free playbook we've written on how to respond to security incidents in the cloud.

 

Cryptomining is the legitimate process of using computing power to solve complex mathematical problems that verify transactions on a blockchain network. Miners are rewarded for their work with cryptocurrency, such as Bitcoin or Ethereum. Cryptomining can be done individually or through mining pools, which combine the computing power of multiple users.

 

Cryptojacking, on the other hand, is the unauthorized use of someone else's computer to mine cryptocurrency. Hackers can install malware on a victim's computer through malicious links, infected websites, or even email attachments. This malware then uses the computer's resources to mine cryptocurrency for the hacker's benefit, without the knowledge or consent of the owner.

 

Here are some key differences between cryptomining and cryptojacking:

 

  • Legitimacy: Cryptomining is a legitimate activity, while cryptojacking is illegal.
  • Consent: Cryptomining requires the consent of the computer owner, while cryptojacking is done without the owner's knowledge or consent.
  • Impact: Cryptomining can slow down a computer, but it does not usually cause significant harm. Cryptojacking, on the other hand, can steal processing power, slow down the computer, and increase energy consumption.

 

How to protect yourself from cryptojacking:

 

  • Be careful about clicking on links from unknown sources.
  • Avoid visiting suspicious websites.
  • Keep your software up to date, including your operating system, web browser, and antivirus software.
  • Use a reputable antivirus or anti-malware program.
  • Be aware of the signs of cryptojacking, such as a slow computer, high CPU usage, or increased fan noise.
In conclusion, cryptomining and cryptojacking are two sides of the same coin. While cryptomining is a legitimate way to earn cryptocurrency, cryptojacking is a harmful activity that steals resources from unsuspecting victims. By understanding the differences between the two and taking steps to protect yourself, you can help keep your computer safe from cryptojacking.