
Subscribe & Follow
#AfricaMonth
In the news
Cryptojacking: A hidden cost for your company

Cryptomining is no easy feat, requiring immense computing power to be successful. This is due in part to blockchain technology that is the cornerstone of cryptocurrencies’ impenetrable defence and anonymity, using complex algorithms to create and authenticate the currency.
The kind of computing power hackers need to solve these algorithms and successfully mine cryptocurrencies is the equivalent of that of large technology companies. To gather that much power cybercriminals are using malware to hack into devices and use them to trawl the web, consuming their resources to mine cryptocurrencies.
To shed more light on this new threat Panda Security compiled the report, 'Cryptojacking: A Hidden Cost'.
“Cryptojacking is an easy way to make money, and doing it is really cheap. Cryptojacking kits can be bought on the dark web for around $30. The attacker can install it on 100 machines, for example, and all of them will constantly contribute money by generating cryptocurrency with little risk” says Josu Franco, Technology and Strategy Consultant at Panda Security.
“What’s more, we’re seeing a significant increase in legitimate websites infected with CoinHive, a JavaScript that means that it isn’t even necessary to install mining software; it simply runs as long as the user is active on that page” continues Franco.
Cybercriminal’s can use a number of attacks methods to get into your device virtually unnoticed, including infected websites, unpatched vulnerabilities, Phishing and unsecured IoT devices.
How will you know if your device has been compromised?
One of the first indications of cryptojacking malware infection is unusually high electricity consumption. Users should also take note of a serious slowdown of the device.
How can you protect against Cryptojacking?
“The kinds of advanced cyber threats we face today have the potential to cripple organisations. To combat these threats business leaders need to develop a comprehensive cybersecurity strategy that includes next-generation EDR (Endpoint Detection and Response) technology to provide visibility and control of the network, as well as developing policies and procedures that govern user behaviour” says Jeremy Matthews, regional manager at Panda Security Africa
PandaLabs, Panda Security’s malware research facility shared the following tips for protecting against Cryptojacking:
Related
Cell C confirms customer data leak after ransomware claim 9 Apr 2025 South Africa's digital future hindered by rising cyber threats 19 Mar 2025 Bad Boys Porsche: Expensive lessons in procurement practices 14 Mar 2025 How healthcare facilities can guard against ransomware attacks 19 Dec 2024 Technology is becoming a major battleground when it comes to fraud, warns the SAFPS 19 Nov 2024 Asia stocks sputter as focus shifts to China stimulus 8 Nov 2024
