Browse Definitions :
Definition

cryptomining malware

Contributor(s): Laura Fitzgibbons

Cryptomining malware is malicious code that takes over a computing device's resources so an attacker can use the device's processing power to track and verify cryptocurrency transactions in a distributed ledger. In digital currencies like Bitcoin, the verification process is known as mining and it can be financially profitable for the agents who engage in it.  

Cryptomining malware most often infects a computer when a user unknowingly downloads malware. Attackers typically embed infected code in other programs or files in order to bypass a system's security. Because cryptomining software runs in the background, a user might not realize they have been the victim of an attack until they experience a graceful degradation of service. To defend against this type of attack, security experts recommend individuals keep software up-to-date and network administrators perform regular penetration tests.

The act of infecting a computing device with malicious code is known as cryptojacking. A large-scale cryptojacking attack took place in February 2019, when a virus called CookieMiner was launched against Apple products. Large-scale attacks have also be aimed at networks and servers, targeting multiple machines at once.

This was last updated in February 2019

Continue Reading About cryptomining malware

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

If you have experience with buying and trading cryptocurrency, how do you protect your investments?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant ...

SearchStorage

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • megabytes per second (MBps)

    Megabytes per second (MBps) is a unit of measurement for data transfer speed to and from a computer storage device.

  • zettabyte

    A zettabyte is a unit of measurement used by technology professionals and the general public to describe a computer or other ...

Close