{"id":14355,"date":"2019-02-14T10:31:49","date_gmt":"2019-02-14T09:31:49","guid":{"rendered":"https:\/\/names.co.uk\/blog\/?p=14355"},"modified":"2019-02-14T10:31:49","modified_gmt":"2019-02-14T09:31:49","slug":"cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it","status":"publish","type":"post","link":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/","title":{"rendered":"Cryptojacking overtook ransomeware as the most &#8220;popular&#8221; cyber crime in 2018 &#8211; but what is it?"},"content":{"rendered":"<p>One of the key features of the 2018 cybercrime landscape was the rapid rise in cryptojacking due to the spike in cryptocurrency values. A classic case of cybercriminals following the money. But what is cyber crime when we talk about cryptojacking?<\/p>\n<h2>Cryptocurrency basics<\/h2>\n<p>In order to understand cryptojacking we need to know a bit about cryptocurrencies and how they work. You\u2019ve certainly heard of Bitcoin, probably the best-known cryptocurrency, but there are lots of others too.<\/p>\n<p>These currencies work using a technology called \u2018blockchain\u2019. This works by adding all transactions in the currency to a digital ledger. In order to verify the transactions in the blockchain ledger, a series of complex mathematical calculations need to be carried out. This is a process known as \u2018mining\u2019 and completing a successful blockchain calculation earns the miner a reward in the form of a small amount of the currency in question.<\/p>\n<p>Mining can therefore be a lucrative activity, but it requires substantial computing power. This means that the cost of electricity used, the internet connection and the computing hardware can wipe out the earnings.<\/p>\n<h2>Step forward the cryptojackers<\/h2>\n<p>So what is cyber crime doing to get involved in this? As is often the case, cyber-criminals have spotted a money-making opportunity in the world of currency mining. This involves installing mining software on a computer without the user\u2019s consent to steal their computing power.<\/p>\n<p>Originally, this meant installing a virus on the machine but recent techniques have become more sophisticated. The latest method is to use JavaScript that runs in the user\u2019s browser when they visit a compromised website. This may be a site created by the cyber-criminal or a mainstream site that they have modified. They may not even need to attack the site directly in order to do this. There have been cases of cryptojacking software being distributed on advertising networks. This means that it can appear even on legitimate sites as site owners don\u2019t usually have control over which adverts are shown.<\/p>\n<p>Once a machine has been cryptojacked and is running the software, it may be recruited into a botnet of other hijacked machines in order to expand the processing power available. The first and end user is likely to know of a cryptojacking attack is a slow down in the performance of their computer.<\/p>\n<h2>Preventing cryptojacking<\/h2>\n<p>There are several things you can do to ensure that your machine doesn\u2019t get cryptojacked. First of all, you should consider installing an ad-blocking extension in your web browser. There are also some extensions that are designed specifically to detect and block mining scripts. In addition, you should make sure that your antivirus software is up to date as this can help guard against cryptojacking.<\/p>\n<p>Businesses should install a device management solution on their mobile devices in order to control what software can be run. They should also update their user awareness training to allow the signs of a hijacked machine to be spotted &#8211; simple indications such as extra fan noise because the processor is working harder, for example.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the key features of the 2018 cybercrime landscape was the rapid rise in cryptojacking due to the spike in cryptocurrency values. A classic case of cybercriminals following the&#8230; <a class=\"more-link\" href=\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":17,"featured_media":14261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[176],"tags":[],"class_list":["post-14355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cryptojacking was the most &quot;popular&quot; cyber crime in 2018 - but what is it?<\/title>\n<meta name=\"description\" content=\"One of the key features of 2018 cybercrime was the rise in cryptojacking. But what is cyber crime when we talk about cryptojacking?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptojacking was the most &quot;popular&quot; cyber crime in 2018 - but what is it?\" \/>\n<meta property=\"og:description\" content=\"One of the key features of 2018 cybercrime was the rise in cryptojacking. But what is cyber crime when we talk about cryptojacking?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/\" \/>\n<meta property=\"og:site_name\" content=\"names.co.uk blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/namesco\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-14T09:31:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nathan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Namesco\" \/>\n<meta name=\"twitter:site\" content=\"@Namesco\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/\"},\"author\":{\"name\":\"Nathan\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\"},\"headline\":\"Cryptojacking overtook ransomeware as the most &#8220;popular&#8221; cyber crime in 2018 &#8211; but what is it?\",\"datePublished\":\"2019-02-14T09:31:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/\"},\"wordCount\":525,\"image\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/\",\"url\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/\",\"name\":\"Cryptojacking was the most \\\"popular\\\" cyber crime in 2018 - but what is it?\",\"isPartOf\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"datePublished\":\"2019-02-14T09:31:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\"},\"description\":\"One of the key features of 2018 cybercrime was the rise in cryptojacking. But what is cyber crime when we talk about cryptojacking?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#primaryimage\",\"url\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"contentUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"width\":945,\"height\":425,\"caption\":\"What is an SSL Certificate?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"names.co.uk\",\"item\":\"\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.names.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/www.names.co.uk\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cryptojacking overtook ransomeware as the most &#8220;popular&#8221; cyber crime in 2018 &#8211; but what is it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.names.co.uk\/blog\/\",\"name\":\"names.co.uk blog\",\"description\":\"Welcome to the names.co.uk blog where we talk about domain names, web hosting, online shops, website builders and lots of other cool web related stuff.  Stick around for offers and competition news too!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.names.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\",\"name\":\"Nathan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g\",\"caption\":\"Nathan\"},\"description\":\"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time, he can often be found on a train travelling around the beautiful British countryside, or curled up on the sofa at home reading a good book.\",\"url\":\"https:\/\/www.names.co.uk\/blog\/author\/nathan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptojacking was the most \"popular\" cyber crime in 2018 - but what is it?","description":"One of the key features of 2018 cybercrime was the rise in cryptojacking. But what is cyber crime when we talk about cryptojacking?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/","og_locale":"en_GB","og_type":"article","og_title":"Cryptojacking was the most \"popular\" cyber crime in 2018 - but what is it?","og_description":"One of the key features of 2018 cybercrime was the rise in cryptojacking. But what is cyber crime when we talk about cryptojacking?","og_url":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/","og_site_name":"names.co.uk blog","article_publisher":"https:\/\/www.facebook.com\/namesco\/","article_published_time":"2019-02-14T09:31:49+00:00","og_image":[{"width":945,"height":425,"url":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","type":"image\/png"}],"author":"Nathan","twitter_card":"summary_large_image","twitter_creator":"@Namesco","twitter_site":"@Namesco","twitter_misc":{"Written by":"Nathan","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#article","isPartOf":{"@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/"},"author":{"name":"Nathan","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471"},"headline":"Cryptojacking overtook ransomeware as the most &#8220;popular&#8221; cyber crime in 2018 &#8211; but what is it?","datePublished":"2019-02-14T09:31:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/"},"wordCount":525,"image":{"@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","articleSection":["Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/","url":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/","name":"Cryptojacking was the most \"popular\" cyber crime in 2018 - but what is it?","isPartOf":{"@id":"https:\/\/www.names.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#primaryimage"},"image":{"@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","datePublished":"2019-02-14T09:31:49+00:00","author":{"@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471"},"description":"One of the key features of 2018 cybercrime was the rise in cryptojacking. But what is cyber crime when we talk about cryptojacking?","breadcrumb":{"@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#primaryimage","url":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","contentUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","width":945,"height":425,"caption":"What is an SSL Certificate?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.names.co.uk\/blog\/cryptojacking-overtook-ransomeware-as-the-most-popular-cyber-crime-in-2018-but-what-is-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"names.co.uk","item":"\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.names.co.uk\/blog\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/www.names.co.uk\/blog\/category\/security\/"},{"@type":"ListItem","position":4,"name":"Cryptojacking overtook ransomeware as the most &#8220;popular&#8221; cyber crime in 2018 &#8211; but what is it?"}]},{"@type":"WebSite","@id":"https:\/\/www.names.co.uk\/blog\/#website","url":"https:\/\/www.names.co.uk\/blog\/","name":"names.co.uk blog","description":"Welcome to the names.co.uk blog where we talk about domain names, web hosting, online shops, website builders and lots of other cool web related stuff.  Stick around for offers and competition news too!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.names.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471","name":"Nathan","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g","caption":"Nathan"},"description":"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time, he can often be found on a train travelling around the beautiful British countryside, or curled up on the sofa at home reading a good book.","url":"https:\/\/www.names.co.uk\/blog\/author\/nathan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=14355"}],"version-history":[{"count":1,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14355\/revisions"}],"predecessor-version":[{"id":14357,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14355\/revisions\/14357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/media\/14261"}],"wp:attachment":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=14355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=14355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=14355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}