Blog
2025-03-12 11:00

What Is Cryptojacking?

Cryptojacking has become a widespread cybersecurity threat. While it primarily targets small and medium-sized businesses, everyday users can also fall victim.

Cryptojacking — also referred to as “unauthorized” or “stealth” mining — involves using someone else’s hardware and computing power without permission to mine cryptocurrency.

Typically, attackers mine coins that require less computing power (such as Zcash, Ethereum, or Monero), since these can be mined with just a decent GPU or CPU, without needing specialized hardware.

💻 Access to devices can be obtained physically (e.g., when an employee uses work computers for mining) or by installing malware. In both cases, the mining process is hidden from the user, and victims only discover it through indirect signs.
How to recognize if you’re a victim of cryptojacking:

✔️ Slow system performance or device failure: While cryptojacking doesn’t aim to damage your hardware, mining is highly resource-intensive. You’ll likely notice your computer slowing down significantly or even crashing.

✔️ Increased electricity bills: Mining consumes a lot of energy, so you'll see a spike in power usage — and it’s the equipment owner who pays the price.
How to protect yourself:
1️⃣ Use antivirus software: Most major providers now offer cybersecurity tools that detect cryptojacking. These can catch both malware (like trojans) and malicious scripts embedded in websites.
2️⃣ Avoid suspicious links and files: Classic phishing tactics remain popular among cryptojackers. Don’t open unknown attachments or click shady links.
3️⃣ Install browser protections: Tools like Anti Miner, minerBlock, or No Coin, as well as common ad blockers like AdBlock, can prevent malicious scripts from running on websites or ads.
What are the legal consequences of cryptojacking?
1️⃣ Criminal liability: Up to 10 years of imprisonment (for fraud, hacking, or spreading malware)
2️⃣ Administrative liability: Fines up to 300,000 RUB
3️⃣ Civil liability: Compensation for unauthorized use of someone else’s resources
How to protect your business and personal devices:

✔️ Implement an IT security policy in your organization that strictly prohibits personal use of business equipment and outlines monitoring measures.

✔️ Conduct regular IT audits and monitor network traffic to detect unusual activity.

✔️ Sign NDAs and responsibility agreements with employees and IT contractors to reduce the risk of internal misuse.
Cryptojacking is not just a technical issue — it’s also a legal one. Legal guidance and proactive cybersecurity measures are essential to avoid becoming an unwitting crypto miner.