A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary Cryptomining / Cryptojacking What is Cryptomining / Cryptojacking? Cryptomining is a system by which "miners" contribute computer processing power and get paid in cryptocurrency to validate blockchain transactions. In its malicious form, cryptojacking is where hackers take control of a victim's computing resources to secretly mine cryptocurrency for their own benefit. Cryptojacking is usually done via a malicious link in an email that loads cryptomining code onto a computer, or by infecting a website or online ad with JavaScript code that, once loaded, auto-executes in the victim's browser. The malware then works in the background as a victim uses their computer normally (unaware of its presence other than potentially slower performance or lags in execution). This activity is attractive to hackers because they can infect multiple computers that then continuously mine for them, and the risk of being caught is lower since the code is surreptitious and can go undetected for a long time. Cryptojacking is different from most other types of malware because, in most cases, it doesn't permanently damage infrastructure or misappropriate victims’ data, however, it does steal CPU processing resources. The popularity of both cryptomining and cryptojacking will be closely tied to the price of crypocurrencies, which have proven to be highly volatile. Image Related Services Penetration Testing 22 Ways To Protect Against Phishing Ransomware IoT Related TermsBlockchainCryptocurrency Share: Contact Us
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?