Cryptojacking
Cryptojacking é um cybercrime onde um atacante usa o dispositivo de outra pessoa para minerar cryptocurrency sem consentimento, frequentemente via malware.
Cryptojacking envolve o uso não autorizado dos recursos computacionais de uma vítima para minerar cryptocurrency. Atacantes tipicamente infectam dispositivos com malware que executa um script de mineração de cryptocurrency, muitas vezes sem o conhecimento do usuário. Infecções podem ocorrer através de downloads de software infectados, malvertising, ou vulnerabilidades exploradas. O malware usa o CPU/GPU do dispositivo para realizar cálculos de hash para uma cryptocurrency escolhida, fornecendo recompensas ao atacante enquanto a vítima experimenta desempenho mais lento e maior consumo de energia. Cryptojacking pode ter como alvo desktops, smartphones e dispositivos IoT, e também pode ocorrer via scripts de mineração baseados em navegador que executam dentro de uma página web comprometida. Defesa eficaz inclui atualizações de software, bloqueio de anúncios, práticas seguras de desenvolvimento de software e monitoramento de uso incomum de recursos.
graph LR
Center["Cryptojacking"]:::main
Rel_cryptographic_hashing["cryptographic-hashing"]:::related -.-> Center
click Rel_cryptographic_hashing "/terms/cryptographic-hashing"
Rel_cryptocurrency_investigations["cryptocurrency-investigations"]:::related -.-> Center
click Rel_cryptocurrency_investigations "/terms/cryptocurrency-investigations"
Rel_blockchain_forensics["blockchain-forensics"]:::related -.-> Center
click Rel_blockchain_forensics "/terms/blockchain-forensics"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explique como se eu tivesse 5 anos
Generated ELI5 content
🤓 Expert Deep Dive
Generated expert content
❓ Perguntas frequentes
What is cryptojacking?
Cryptojacking is the unauthorized use of a victim's computing resources to mine cryptocurrency, typically through malware that runs a mining script without the user's knowledge.
How do attackers spread cryptojacking malware?
Through infected software downloads, malicious advertisements (malvertising), compromised browser extensions, or exploited vulnerabilities.
What are the typical impacts on victims?
Slower device performance, increased power consumption, higher electricity costs, and potential degradation of hardware over time.
Which cryptocurrencies are commonly mined in cryptojacking?
Cryptojacking is the unauthorized use of a victim's computing resources to mine cryptocurrency. It is typically achieved through malware that runs a mining script without the user's knowledge.
How can I defend against cryptojacking?
Keep software updated, use reputable security tools, block malicious ads, monitor CPU usage, and disable browser-based mining scripts when possible.
How can cryptojacking be detected?
Watch for unusual CPU/GPU usage, unfamiliar processes, and mining pool network connections; verify system process names and run security scans.