Malicious cyber actors use cryptocurrency-based malware campaigns to install cryptomining software and hijack the processing power of victim devices and systems to earn cryptocurrency. Cryptojacking may result in the following consequences to victim devices, systems, and networks: Degraded system and network performance because bandwidth and central processing unit (CPU) resources are monopolized by cryptomining activity; Increased power consumption, system crashes, and potential physical damage from component failure due to the extreme temperatures caused by cryptomining; Disruption of regular operations; and Financial loss due to system downtime caused by component failure and the cost of restoring systems and files to full operation as well as the cost of the increased power consumption.
08.09.20