A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for What is Cryptojacking? Types & Real World Examples
Cybersecurity 101/Cybersecurity/Cryptojacking

What is Cryptojacking? Types & Real World Examples

Learn about cryptojacking, its types, how it works, detection techniques, and effective protection strategies.

CS-101_Cybersecurity.svg
Table of Contents

Related Articles

  • What is Microsegmentation in Cybersecurity?
  • Firewall as a Service: Benefits & Limitations
  • What is MTTR (Mean Time to Remediate) in Cybersecurity?
  • What Is IoT Security? Benefits, Challenges & Best Practices
Author: SentinelOne
Updated: July 22, 2025

In recent years, Cryptojacking has turned out to be one of the most serious cybersecurity threats. Cryptojacking is a cyber attack that steals computing resources to mine cryptocurrency without authorization. Unregulated mining grounds can be a massive financial burden for the financial sector, reporting massive losses, and organizations enter a heavier operational cost area as damaged hardware and increased energy consumption are noted.

In this blog, we will discuss what cryptojacking is and what are some cryptojacking attack techniques, detection mechanisms, and defense strategies. We will also discuss how attackers spread mining malware using a range of attack vectors, including the most common indicators of compromise, and outline the best ways to protect against such threats.

Cryptojacking - Featured Image - | SentinelOneWhat is Cryptojacking?

Cryptojacking is when computing devices are hijacked to mine cryptocurrency. In this process, attackers insert malware to make the targeted device solve complicated math calculations needed for cryptocurrency mining. Mining refers to the process through which cryptocurrency transactions are verified and recorded on the blockchain.

Mining uses a lot of computational power. Cryptojackers hijack a system and use its CPU and GPU for mining. They usually focus on cryptocurrencies that still have profitable returns with the use of regular computer hardware, such as Monero ( as its mining algorithm is friendly for CPUs).

Why is Cryptojacking so dangerous?

Cryptojacking can be very serious for organizations as it can run for a long time at scale without detection and cause massive harm. It directly affects the performance of the system as it uses CPU resources for mining. This use can degrade hardware, particularly in systems that are running 24/7 at or near capacity.

This threat is larger than just impacting single devices. Cryptojacking malware is usually embedded with worm-like characteristics so that it spreads throughout networks. The malware then looks for other vulnerable systems within the network and builds a network of mining nodes. Such behavior expands the attack surface and complicates the process of removal.

Impact of Cryptojacking

Cryptojacking has a non-linear financial impact. Multiple systems running at maximum capacity lead to a spike in electricity costs for organizations. Continuous wear out leads to hardware replacement costs. This can result in weak performance but also a significant time loss in deploying these services and increased potential for outages. Business impacts also include the following:

  • Regulatory compliance breach due to running unauthorized code
  • Risk of exposure to legal liability for unauthorized mining activities

And the environmental footprint is also notable. When these attackers are targeting data centers or cloud infrastructure, the resulting cryptojacking operations become large-scale, significantly driving energy consumption and carbon emissions.

Common Symptoms of Cryptojacking

System administrators can spot cryptojacking using a few of the usual suspects. Even in an idle state, when no user apps are running, the high CPU usage persists. Unknown processes using a lot of resources are visible in the Task Manager or a system monitoring tool.

This sort of pattern is usually revealed through network monitoring. The infected systems have ongoing outbound connections to the mining pool or the command and control servers (C2). These links typically use targeted methods that are relevant to mining protocols that security teams need to identify.

Affected hardware shows physical symptoms. The systems run hot, and the cooling fans are running at full speed. If the device runs on battery, it has a much shorter battery life. In extreme cases, this causes the systems to crash or go down to thermal protection.

Cryptojacking via the browser has certain indicators. Even with only a few tabs opened, Web browsers are maxing out CPU resources. The performance degradation continues until the respective browser tabs are closed.

Types of Cryptojacking Attacks

While cryptojacking has gained a lot of attention in the last few years, the attack type is far from monolithic in nature, using varied methodologies to infiltrate systems and mine cryptocurrency. These types of attacks differ in the way they are deployed, the way they persist, and the level of impact.

1. Browser Based Cryptojacking

Browser-based Cryptojacking implies that mining code has been implemented within web browsers, possibly as a result of hackers taking control of websites. JavaScript miners automatically start when users visit infected sites and do not download files to the system; thus, the user is not alerted.

2. Binary Based Cryptojacking

In binary attack-driven attacks, the attackers deliver malicious executable files to the target systems. These miners operate as an independent process that is (typically) disguised as a legitimate system service. They remain through system reboots and are often more efficient than browser-based ones as they are able to access the hardware directly.

3. Supply Chain Cryptojacking

Supply chain cryptojacking hijacks authentic software distribution channels to deliver mining malware instead. An attacker adds mining code to software packages, updates, or dependencies. The mining components automatically deploy along with a digital signature whenever users install or update affected software.

4. Fileless Cryptojacking

Fileless cryptojacking uses the whole process in the system memory instead of writing to the disk. In these attacks, PowerShell scripts or other native Windows tools are used to download and execute mining code. Detection becomes more difficult due to the absence of disk artifacts.

5. Cloud Infrastructure Cryptojacking

Attacks are on cloud infrastructure targeting misconfigured cloud resources and containers. In cloud instances, miner deployment is performed through either the attack surface presented by exposed management interfaces or through improperly configured weak credentials. Such attacks can quickly balloon in size by provisioning additional cloud resources using otherwise legitimate account credentials that have been compromised.

How do Cryptojacking Attacks Work?

In Cryptojacking, attackers use various technical steps to carry out an action to be able to deploy mining code and remain persistent. Though each technique has different attack vectors and different ways of exploitation, all have essentially similar approaches, which is avoiding detection by maximizing mining performance.

Browser-Based Injection Techniques

The first step in browser-based cryptojacking is to compromise legitimate websites. In domain crawler attacks, hackers embed mining JavaScript code within web pages via vulnerable plugins, outdated content management systems, or compromised third-party libraries. When this code is executed inside a visitor’s browser, it connects to mining pools with WebSocket connections and starts mining. These scripts are often built with throttling layers to make them less visible and employ domain verification to avoid code duplication.

Binary-Based Attacks

Binary attacks start with initial system compromise via phishing, exploits, or malicious downloads. It drops mining executables and supporting files in several system folders. Those consist of information concerning mining swimming pool setups, purse addresses, and CPU usage. Persistence is achieved by adding registry keys, scheduling tasks, or installing a service.

Supply Chain Compromise Methods

This type of attack is to target software build systems, update servers, or package repositories. The mining components are added to the source code, or build scripts, by the attacker. These packages keep their pre-infected purpose and instead run mining in the background. Attackers have repeatedly used legitimately acquired code-signing certificates from reputable vendors to evade detection or security controls. The mining code runs after the normal installation sequence.

Fileless Malware Approaches

Fileless cryptojacking executes mining code directly in memory, using system tools like PowerShell or Windows Management Instrumentation (WMI). Such compromises typically happen via malicious scripts or macros and these scripts download command server-encrypted mining configurations and decode them in memory. The attack establishes persistence via WMI event subscriptions or registry run keys that reload the mining code after the device reboots.

Common Cryptojacking Detection Techniques

Monitoring various system components and analyzing a variety of technical indicators is required for the detection of cryptojacking attacks. To truly identify mining activities in its infrastructure, the organizations require a layered approach.

1. System Performance Indicators

It all starts with monitoring CPU and GPU usage to investigate the presence of cryptojacking. Tools like monitoring the processor activity level and if it detects sustained high usage outside the bounds of normal activity would typically trigger an alert. Temperature sensors provide information regarding strange temperature behaviors. Application monitoring shows resource-intensive applications running from inappropriate locations.

2. Network Traffic Analysis

The second type of detection, network-based detection, pays more attention to the communications over the mining pool. Connections to known mining pool domains and overseas IP addresses have been revealed through deep packet inspection. If traffic-analysis tools see consistent data patterns that match mining protocols, it shows something wrong is going on. It detects SSL/TLS encrypted connections to mining services.

3. Memory Forensics Approaches

Memory analysis tools take a snapshot of memory to analyze what is happening in the code with the signatures. They are used to detect miner process injection techniques. Memory scanners identify cryptocurrency wallet addresses and mining pool URLs within process memory. By analyzing the runtime, it can find certain code patterns that start matching the known mining algorithms.

4. PowerShell Activity Monitoring

PowerShell monitoring means monitoring fileless mining detection. Security tools log and analyze PowerShell command executions. Cryptocurrency mining commands and configuration in script block logging. Module logging logs the usage of PowerShell modules on mining. Transcription logging captures complete session details for forensic analysis of PowerShell sessions.

5. Browser Behavior Analysis

Browser monitoring tools automatically monitor whether a browser is doing mining using JavaScript or not. Extension analyzers detect mining codes in browser extensions. Monitors are placed on web pages to watch for the execution of JavaScript to mine for coins. WebSocket connections to mining services are picked up by network request analyzers.

Best Practices for Protection against Cryptojacking

Preventing cryptojacking systems requires a combination of security controls in place and various operational procedures. These practices build layers of defense that can prevent an initial compromise and mining attempts.

1. Browser Security Configuration

It begins with configuring some security settings within the browser to prevent JavaScript from executing certain functions. Security teams see this and use script-blocking extensions that block all active mining code from executing. Mining domains are blocked with Content Security Policies. WebAssembly execution can be disabled in untrusted contexts via browser policies. Browser updates regularly fix vulnerabilities that allow the injection of mining code.

2. Network Monitoring Implementation

To defend the network, organizations must deploy monitoring tools at relevant points of their infrastructure. Signatures are used by Intrusion Detection Systems to recognize mining pool traffic. Mining malware that moves laterally instead is blocked by network segmentation. DNS filtering prevents connections from the target to domains identified as mining pools. Unusual traffic patterns from hijacked systems are detected by bandwidth monitoring.

3. Endpoint Protection Setup

Endpoint security tools help ensure protection against mining malware. Application whitelisting helps to block unauthorized miners from running. If a mining process is detected, the process will either be terminated or dropped, and it will be unable to perform any malicious piggybacking on its own. Resource utilization alerts identify system activity that appears suspicious. Unauthorized changes to a system are tracked by file integrity monitoring. Memory protection hinders code-injection methods that miners employ.

4. Security Awareness Requirements

Cryptojacking threats should be covered in security awareness programs to educate users. Training includes spotting strange behavior in the system. Employees should be trained on how to safely download and execute the software from the internet. The incident reporting process enables organizations to respond swiftly to suspected infections.

5. Patch Management Strategies

Patch management strategies protect systems from known vulnerabilities getting exploited. Security teams should have scheduled updates available for all systems. This can ensure that organizations get coverage on time using automated patch deployment. Identifying unpatched systems and vulnerability scanning patch status across the entire infrastructure is tracked by configuration management.

AI-Powered Cybersecurity

Elevate your security posture with real-time detection, machine-speed response, and total visibility of your entire digital environment.

Get a Demo

Conclusion

Cryptojacking is a continuous cybersecurity threat that keeps evolving in complexity and scale. Aside from depleting computing resources, such attacks also incur heavy financial losses due to increased operational costs, hardware damage, and fines for any violations of regulations that are likely to occur. It is a challenge for organizations to detect and stop miners as they are now employing evasion techniques that are becoming more sophisticated each day.

Companies are prepared to match solution paths with costs for fast detection and response with their cloud security posture, offering protection against cryptojacking. Knowing these attack vectors, browser-based injections, fileless malware, etc, allows the organization to deploy the right defenses. A solid defense strategy against cryptojacking will consist of system monitoring, network analysis, and employee awareness.

Cryptojacking FAQs

Cryptojacking is an attack in which attackers silently use the computing power of their targets to mine cryptocurrency. This attack delivers mining code in one of three ways: a browser script, malicious executable, or fileless malware to mine cryptocurrency without your permission.

Cryptojacking effects include higher electricity bills, potential damage to hardware from overuse, and decreased speed in system performance. Organizations also experience productivity loss, risk of not complying with various regulations, and incurring additional costs for security against detectors and remediation.

Cryptojacking operations boost the overall rate of mining power on cryptocurrency networks without the use of genuine investment capital, impacting cryptocurrency markets. Such unauthorized mining also affects the difficulty rates of cryptocurrency mining and may affect the market dynamics of CPU-mineable cryptocurrencies.

The process of cryptojacking malware removal involves locating and killing running mining processes, deleting malicious files, and eliminating persistence mechanisms. Using security solutions to scan systems, clean out infections, and check via investigation that they have been removed.

A lot of detection can be done by monitoring for CPU usage, monitoring outgoing network connections to mining pools, and scanning for code signatures of miner malware. Security tools are able to detect suspicious processes, abnormal network traffic, and unauthorized resource usage.

The main crime associated with cryptojacking is violating the computer access laws, which leads to criminal charges. Organizations that are unwittingly executing cryptojacking code may violate regulatory compliance, as well as find themselves legally liable for conducting unauthorized operations in mining.

Discover More About Cybersecurity

Shadow Data: Definition, Risks & Mitigation GuideCybersecurity

Shadow Data: Definition, Risks & Mitigation Guide

Shadow data creates compliance risks and expands attack surfaces. This guide shows how to discover forgotten cloud storage, classify sensitive data, and secure it.

Read More
Malware Vs. Virus: Key Differences & Protection MeasuresCybersecurity

Malware Vs. Virus: Key Differences & Protection Measures

Malware is malicious software that disrupts systems. Viruses are a specific subset that self-replicate through host files. Learn differences and protection strategies.

Read More
Software Supply Chain Security: Risks & Best PracticesCybersecurity

Software Supply Chain Security: Risks & Best Practices

Learn best practices and mistakes to avoid when implementing effective software supply chain security protocols.

Read More
Defense in Depth AI Cybersecurity: A Layered Protection GuideCybersecurity

Defense in Depth AI Cybersecurity: A Layered Protection Guide

Learn defense-in-depth cybersecurity with layered security controls across endpoints, identity, network, and cloud with SentinelOne's implementation guide.

Read More
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2025 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use