International Journal of Academic Research in Business and Social Sciences

search-icon

Crypto Jacking a Technique to Leverage Technology to Mine Crypto Currency

Open access

Haitham Hilal Al Hajri, Badar Mohammed Al Mughairi, Mohammad Imtiaz Hossain, Asif Mahbub Karim

Pages 1220-1231 Received: 01 Feb, 2019 Revised: 17 Feb, 2019 Published Online: 04 Mar, 2019

http://dx.doi.org/10.46886/IJARBSS/v9-i3/5791
Society dependency on technology is becoming an obligation of modern life society, hence the advancement and innovation on Information and Communication Technologies Sector, especially when it comes to the development of infrastructure and various services provided by many vendors governmental or commercial. It is all, due to the constant revaluation of technology used by society today. Blockchain made its first debit as a proof of concept on money exchange platforms back in 2008, where the born of the first cryptocurrency. However the technology had more potential than just platform of exchanging valuable currency, it has spanned, out to open a whole work of possibility to enhance today modern day society further. However, as usually, cyber-criminals have found a way to leverage this technology to benefit them by exploiting the technology weaknesses to carry own their deeds. This paper will demonstrated the phenomenon of the crypto jacking and other related methods utilised by a hacker to leverage mining crypto. The objective of this paper is to investigate the state-of-the-art crypto mining attacks by overviewing different types of malware like crypto-jacking.
With the current revaluation of technology, cybercriminals are being creative on discovering and implementing methods to abuse the leverage technology to meet their deeds, and lately, the majority of cybercriminals are experimenting with cryptocurrency and methods or techniques to mine cryptocurrency effectively and anonymously, the attack is known by Cryptojacking. The results from static and dynamic analysis uncover the techniques employed by the malware to exploit potential victims. The study concludes that enterprises face the greatest risk of cryptojacking due to the broad attack surface and moderate consequence severity. This research recommends anticipating trends in cybercrime monetization to inform defense strategies and increased communication about cyberattack information to better understand and defend against the cryptojacking threat.
Andrew, P. (2018, January 31). What is Proof of Capacity? An Eco-Friendly Mining Solution. Coin Central. Retrieved from: https://coincentral.com/what-is-proof-of-capacity/.
Allot, (2018).Threat Bulletin: Cryptojacking. Allot. Retrieved from: allot.com/wp-content/uploads/TB_Cryptojacking.pdf, US.
Bentov, I., Lee, C., Mizrahi, A., & Rosenfeld, M. (2014). Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake. IACR Cryptology ePrint Archive, 2014, 452.
Curran, B. (2018, September 11). What is Proof of Elapsed Time Consensus? (PoET) Complete Beginner’s Guide. Blockonomi. Retrieved from: https://blockonomi.com/proof-of-elapsed-time-consensus/.
Cowling, J., Myers, D., Liskov, B., Rodrigues, R., & Shrira, L. (2006, November). HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. In Proceedings of the 7th symposium on Operating systems design and implementation (pp. 177-190). USENIX Association.
Curran, B. (2018, July 5). What is Proof of Authority Consensus? Staking Your Identity on The Blockchain. Blockonomi. Retrieved from : https://blockonomi.com/proof-of-authority/.
Ernesto (2017). How Much Money Can Pirate Bay Make From a Cryptocoin Miner?.TF. Retrieved from: https://torrentfreak.com/how-much-money-can-pirate-bay-make-from-a-cryptocoin-miner-170924/.
Gu, A. C. (2018, July 17). Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking. Security Intelligence. Retrieved from https://securityintelligence.com/move-over-ransomware-why-cybercriminals-are-shifting-their-focus-to-cryptojacking/.
Harper, C. (2018, January 24) “Making Sense of Proof of Work vs. Proof of Stake.” CoinCentral. Retrieved from https://coincentral.com/making-sense-of-proof-of-work-vs-proof-of-stake/
Hio, L. (2018). Cybercriminals now cryptojacking mobile phones. The Straits Times Retrieved from.: https://www.reuters.com/article/us-cryptocurrency-cybercrime/cybercriminals-target-booming-cryptocurrencies-report-idUSKBN1FL5Q7.
InvestoPedia (2018).Proof of Stake (PoS). InvestoPedia. Retrieved from: https:// www.investopedia.com/terms/p/proof-stake-pos.asp.
Khatwani, S. (2018, October 10). What Is Coin Burn In Cryptocurrency: A Guide For Investors. Coin Sutra. Retrieved from: https://coinsutra.com/proof-of-burn/.
Khandelwal, S. (2018, May 01). A New Cryptocurrency Mining Virus is Spreading Through Facebook. The Hacker News. Retrieved from: https://thehackernews.com/2018/05/facebook-cryptocurrency-hacking.html.
Lee, B. (2017, November 7). Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model. Palo Alto Networks. CA, USA.Retrieved from
https://www.paloaltonetworks.com/resources/research/ransomware-report
Monero (n.d). Retrieved from: https://monero.org/.
Radiflow (2018, Februray 8). Radiflow Reveals First Documented Cryptocurrency Malware Attack on a SCADA Network. Retrieved from:
https://radiflow.com/radiflow-reveals-first-documented-cryptocurrency-malware-attack-on-a-scada-network/.
Rouse, M. (2017). Techtarget.Retrieved from : https://whatis.techtarget.com/definition/consensus-algorithm
Khatwani, S. (2018). Explaining Hash Rate Or Hash Power In Cryptocurrencies. Coinsutra. Retrieved from: https://coinsutra.com/hash-rate-or-hash-power/.
The Accounting Degree Review.(n.d). blockchain_info2. Retrieved from : https://cdn.accounting-degree.org/wp-content/uploads/2018/01/blockchain_info2.jpg.
Walters, S. (2018,April 6) . Proof of Activity Explained: A Hybrid Consensus Algorithm. Coinbureau. Retrieved from: https://www.coinbureau.com/blockchain/proof-of-activity-explained-hybrid-consensus-algorithm/.
Williams, B. (2018, April 24). What Exactly Is ‘Cryptojacking’, And How Can Businesses Respond To The Spiralling Cyber Threat?. Isbuzznews Retrieved from.: https://www.informationsecuritybuzz.com/articles/what-exactly-is-cryptojacking/.
In-Text Citation: (Hajri, Mughairi, Hossain, & Karim, 2019)
To Cite this Article: Hajri, H. H. Al, Mughairi, B. M. Al, Hossain, M. I., & Karim, A. M. (2019). Crypto Jacking a Technique to Leverage Technology to Mine Crypto Currency. International Journal Academic Research Business and Social Sciences, 9(3), 1210–1221.