Cryptojacking
Web3 / compliance
Cryptojacking is the unauthorized use of someone else's computing resources to mine cryptocurrency without their knowledge or consent. Attackers typically inject malicious code into devices through malware, phishing emails, compromised websites, or vulnerable software. Once infected, the victim's processor or GPU is hijacked to perform mining operations, consuming significant computational power, electricity, and bandwidth while the attacker profits from the generated cryptocurrency. The victim often experiences slower device performance, increased energy costs, and potential hardware degradation without understanding the cause. Example: In 2018, the popular streaming platform Showtime's website was compromised and began running Coinhive cryptojacking scripts on visitors' browsers, secretly mining Monero cryptocurrency while users watched content. The attack affected thousands of visitors before the malicious code was discovered and removed. Why it matters for compliance: Cryptojacking represents a significant liability and security breach that organizations must detect and prevent. Regulatory frameworks increasingly require companies to maintain robust cybersecurity standards, monitor network activity, and report security incidents. Failure to prevent cryptojacking can result in compliance violations, financial penalties, and reputational damage.
Explore the full Web3 Glossary — 2,062+ expert-curated definitions. Need guidance? Talk to our consultants.