{"id":9058,"date":"2022-03-14T23:39:00","date_gmt":"2022-03-14T20:39:00","guid":{"rendered":"https:\/\/alfacash.blog\/?p=9058"},"modified":"2024-02-19T21:50:53","modified_gmt":"2024-02-19T18:50:53","slug":"what-cryptojacking-how-can-you-affected","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/cs\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/","title":{"rendered":"What is cryptojacking and how can you be affected?"},"content":{"rendered":"<p>We know how it sounds: cryptocurrency + hijacking. So, is it about someone stealing your cryptocurrencies? Surprisingly, not exactly. Cryptojacking is more about someone stealing your device resources and your electricity to mine cryptocurrencies. All of this, remotely, and without your consent or knowledge. Without you owning any cryptocurrency, even.<\/p>\n\n\n\n<p>You could be an unwitting victim right now, and you probably wouldn\u2019t know. That\u2019s the trick. <strong>The hackers do everything they can for this malicious software to go unnoticed<\/strong>. As the cybersecurity firm <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-cryptojacking\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Kaspersky Lab<\/a> describes it:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cCryptojacking is a type of cybercrime that involves the unauthorized use of people&#8217;s devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency. Like many forms of cybercrime, the motive is profit, but unlike other threats, it is designed to stay completely hidden from the victim.\u201d<\/p><\/blockquote>\n\n\n\n<p>To make this possible, the hackers can secretly add <a href=\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\" target=\"_blank\" rel=\"noreferrer noopener\">the malware<\/a> into some interesting file for the victim (local miner). That\u2019s something like a game or movie downloaded from non-official sources, a malicious app, or maybe an attached file in an email. <strong>But they can also make focused attacks, especially against companies.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"797\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg\" alt=\"Cryptojacking-malware-can-affected\" class=\"wp-image-6089\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-300x233.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-150x117.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-15x12.jpg 15w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-231x180.jpg 231w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-662x515.jpg 662w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-653x508.jpg 653w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-370x288.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-554x431.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-306x238.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-315x245.jpg 315w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-257x200.jpg 257w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-87x67.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Once installed on the device, the malware works silently behind everything as long as the hosting machine it\u2019s turned on. It can even spread itself all over the connected network, infecting numerous devices at the same time.<\/p>\n\n\n\n<p>There\u2019s another way, though. In some cases, all that the hacker needs to do is embed the same miner software into a website \u2014any website. So, every user of this website would be <a href=\"https:\/\/alfacash.blog\/2020\/08\/25\/cryptocurrency-mining-dummies-how-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">mining cryptocurrencies<\/a> while remaining in there, without knowing (web miner). Sometimes, the hacker even arranges the software to stay open in a tiny window hidden behind the taskbar when the user closes the infected web.<\/p>\n\n\n\n<p>So, yes, anyone can be affected. But how do you know?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Symptoms and prevention<\/strong><\/h2>\n\n\n\n<p>As you may know, cryptocurrency mining usually requires a lot of hardware resources and electricity. <a href=\"https:\/\/alfacash.blog\/2020\/08\/20\/how-buy-bitcoin-simple-steps-nice-recipe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin<\/a> (BTC), for example, is the most difficult currency to mine. It requires specialized machines (ASIC miners), and an <a href=\"https:\/\/alfacash.blog\/2021\/05\/16\/faq-cryptocurrencies-pollution-climate-change\/\" target=\"_blank\" rel=\"noreferrer noopener\">awful lot of energy<\/a>. This is expensive <a href=\"https:\/\/alfacash.blog\/2022\/02\/21\/where-are-bitcoin-miners-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">pro horn\u00edky<\/a>, so, they usually join others in mining pools or prepare large mining farms with hundreds of machines \u2014to cover their expenses and maximize their profits.<\/p>\n\n\n\n<p>However, not every minable cryptocurrency is like that. Coins like Grin (GRIN), <a href=\"https:\/\/alfacash.blog\/2020\/09\/18\/little-story-dogecoin-shiba-inus-cryptocurrency\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dogecoin<\/a> (DOGE), Zcash (ZEC), and <a href=\"https:\/\/alfacash.blog\/2021\/03\/29\/discover-monero-how-use-it-full-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monero<\/a> (XMR) can be mined with only CPUs, without any other specialized machine. Monero is, precisely, the most popular for cryptojacking malware, be it as a local miner or as a web miner.<\/p>\n\n\n\n<p>Despite the fewer difficulty, the process can still consume the infected device resources quickly. At a minimum, the user will experience a slower system. <strong>At a maximum, in the case of mobile devices, the battery can run out in a few minutes, and the device may overheat<\/strong>. This, in turn, can cause some parts to become damaged due to heat.<\/p>\n\n\n\n<p>If the device is connected to the energy, the electricity bill might rise for the victim. In any case, what the hacker is doing is stealing someone\u2019s else resources to mine crypto for free and keep all the rewards for them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>U\u017eite\u010dn\u00e9 tipy<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shield triad at the rescue<\/a>: keep updated the OS, antivirus, and firmware of all your smart devices, don\u2019t open links or attached files from dubious emails and download files and software only from the official websites.<\/li><li>If you\u2019re unsure of a webpage, close your browser with all the windows and check on the Task Manager that there\u2019s nothing suspicious still open, i.e., an unknown app, process, or even tab.<\/li><li>Check if your browser offers extensions against malicious mining, like <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/minerblock\/emikbbbebcdfohonlaifafnoanocnebl?hl=en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">MinerBlock<\/a> on Chrome.<\/li><li>If you\u2019re part of a business, stay up to date with your cybersecurity and ask the experts if you need it. Additionally, it\u2019s also important to educate your employees about these threats.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How does cryptojacking work for the attackers?<\/strong><\/h2>\n\n\n\n<p>We\u2019ve been mentioning \u201chackers\u201d here, but what they usually do is only build this malicious software and put it up for sale on the darknet. Cryptojacking malware is commonly developed with low-level programming languages like C++ or Assembler. <strong>But the most required characteristic seems to be how much time can go undetected<\/strong> by the victim. Just as the firm <a href=\"https:\/\/www.digitalshadows.com\/blog-and-research\/cryptocurrency-attacks-to-be-aware-of-2021\/\">Digital Shadows<\/a> explained:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cAttacks of this nature often have low barriers for entry. All a threat actor needs to do once they have purchased a botnet miner is get the victim to download it. Aside from the initial investment for the miner program and the cost of running the botnet, there is little overhead for the threat actor; vendors frequently advertise this method of attack as a source of \u2018passive income\u2019.\u201d<\/p><\/blockquote>\n\n\n\n<p>A \u201cbotnet\u201d is, basically, a network of bots designed to control at a certain level a massive number of devices at the same time. Botnet miners are used for infecting as many devices as possible simultaneously. This way, the attackers can take more resources and energy to improve their <a href=\"https:\/\/alfacash.blog\/2021\/11\/24\/what-need-to-know-before-starting-liquidity-mining\/\" target=\"_blank\" rel=\"noreferrer noopener\">mining profits<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"597\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-1024x597.jpg\" alt=\"Zne\u010di\u0161t\u011bn\u00ed temn\u00fdch stran NFT\" class=\"wp-image-8124\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-1024x597.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-300x175.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-150x87.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-18x10.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-270x157.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-770x449.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-872x508.jpg 872w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-884x515.jpg 884w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-370x216.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-554x323.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-306x178.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-260x152.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280-87x51.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/10\/cryptocurrency-3171920_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>According to the European Network and Information Security Agency (<a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2021\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ENISA<\/a>), <strong>the volume of cryptojacking infections increased by over 117% during 2021<\/strong>, compared to the last few years. Therefore, we can deduce that this attack is, indeed, very profitable for hackers and malicious buyers. And they\u2019ll persist with it, especially against companies that can provide them huge resources for mining, like data centers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Charity and ads: legit uses<\/strong><\/h2>\n\n\n\n<p>Despite the bad uses, there are legit uses for local and web miners. They weren\u2019t designed originally to work as malware, but as an alternative <a href=\"https:\/\/alfacash.blog\/2021\/02\/06\/new-ways-passive-income-crypto-staking-liquidity-mining\/\" target=\"_blank\" rel=\"noreferrer noopener\">source of income<\/a> for websites and organizations. The first web miner in existence, Coinhive (closed in 2019), was a legit software that clearly asked its users to warn about its presence publicly.<\/p>\n\n\n\n<p>The resources and energy taken from the readers would be set to a minimum to avoid any inconvenience. At the same time, the readers would be helping the content developers to stay working. <strong>The ultimate goal was to replace the annoying ads as a source of income on websites<\/strong>, but the mined coins weren\u2019t enough at the time \u2014precisely because very little power was taken.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"678\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-1024x678.jpg\" alt=\"cryptojacking-ads-charity-power\" class=\"wp-image-4168\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-1024x678.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-300x199.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-150x99.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-770x510.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-767x508.jpg 767w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-777x515.jpg 777w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-370x245.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-554x367.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-306x203.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-260x172.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>As for the local miners, <a href=\"https:\/\/alfacash.blog\/2021\/04\/29\/cryptocurrencies-blockchain-charity-overview\/\" target=\"_blank\" rel=\"noreferrer noopener\">some charities<\/a> would publicly explain their operation and how that income would help them with their goals. So, they would ask for volunteers to download the miner and freely give their resources to help the cause.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.charitymine.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dobro\u010dinn\u00fd d\u016fl<\/a>&nbsp;a&nbsp;<a href=\"https:\/\/www.cudodonate.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cudo Darovat<\/a>&nbsp;jsou dobr\u00e9 p\u0159\u00edklady. Prvn\u00ed str\u00e1nka pracuje s webov\u00fdm minerem, zat\u00edmco druh\u00e1 je desktopov\u00e1 a mobiln\u00ed aplikace. V\u0161echny vyt\u011b\u017een\u00e9 prost\u0159edky jdou samoz\u0159ejm\u011b na r\u016fzn\u00e9 charitativn\u00ed \u00fa\u010dely.<\/p>\n\n\n\n<p>As usual, cryptocurrencies are barely a tool. Its good or bad use depends on the actor, and cryptojacking isn\u2019t different.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Chcete obchodovat s BTC, ETH a dal\u0161\u00edmi tokeny? M\u016f\u017ee\u0161 to ud\u011blat<\/em>&nbsp;<em>bezpe\u010dn\u011b&nbsp;<\/em><a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\"><em>na Alfacash<\/em><\/a><em>! A nezapome\u0148te, \u017ee mluv\u00edme o tomto a mnoha dal\u0161\u00edch v\u011bcech na na\u0161ich soci\u00e1ln\u00edch m\u00e9di\u00edch.<\/em><em><br><br><\/em><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Cvrlik\u00e1n\u00ed<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegram<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>&nbsp;*<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>&nbsp;&nbsp;*&nbsp;<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>We know how it sounds: is cryptojacking about someone stealing your cryptocurrencies? Surprisingly, not exactly. Let us explain!<\/p>","protected":false},"author":5,"featured_media":9239,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48],"tags":[73,61,474,135,127,126],"class_list":{"0":"post-9058","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-learn","8":"tag-crypto-mining","9":"tag-cryptocurrencies","10":"tag-cryptojacking","11":"tag-cybersecurity","12":"tag-malware","13":"tag-monero"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/cs\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is cryptojacking and how can you be affected? - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"We know how it sounds: is cryptojacking about someone stealing your cryptocurrencies? Surprisingly, not exactly. Let us explain!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/cs\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is cryptojacking and how can you be affected?\" \/>\n<meta property=\"og:description\" content=\"We know how it sounds: is cryptojacking about someone stealing your cryptocurrencies? Surprisingly, not exactly. Let us explain!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/cs\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-14T20:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:50:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2123\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"What is cryptojacking and how can you be affected?\",\"datePublished\":\"2022-03-14T20:39:00+00:00\",\"dateModified\":\"2024-02-19T18:50:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/\"},\"wordCount\":1195,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg\",\"keywords\":[\"Crypto-mining\",\"cryptocurrencies\",\"Cryptojacking\",\"Cybersecurity\",\"malware\",\"Monero\"],\"articleSection\":[\"Learn\"],\"inLanguage\":\"cs\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/\",\"url\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/\",\"name\":\"What is cryptojacking and how can you be affected? - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg\",\"datePublished\":\"2022-03-14T20:39:00+00:00\",\"dateModified\":\"2024-02-19T18:50:53+00:00\",\"description\":\"We know how it sounds: is cryptojacking about someone stealing your cryptocurrencies? Surprisingly, not exactly. Let us explain!\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg\",\"width\":2123,\"height\":1120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is cryptojacking and how can you be affected?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/cs\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is cryptojacking and how can you be affected? - alfa.cash blog","description":"We know how it sounds: is cryptojacking about someone stealing your cryptocurrencies? Surprisingly, not exactly. Let us explain!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/cs\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/","og_locale":"cs_CZ","og_type":"article","og_title":"What is cryptojacking and how can you be affected?","og_description":"We know how it sounds: is cryptojacking about someone stealing your cryptocurrencies? Surprisingly, not exactly. Let us explain!","og_url":"https:\/\/alfacash.blog\/cs\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2022-03-14T20:39:00+00:00","article_modified_time":"2024-02-19T18:50:53+00:00","og_image":[{"width":2123,"height":1120,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"What is cryptojacking and how can you be affected?","datePublished":"2022-03-14T20:39:00+00:00","dateModified":"2024-02-19T18:50:53+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/"},"wordCount":1195,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg","keywords":["Crypto-mining","cryptocurrencies","Cryptojacking","Cybersecurity","malware","Monero"],"articleSection":["Learn"],"inLanguage":"cs"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/","url":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/","name":"What is cryptojacking and how can you be affected? - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg","datePublished":"2022-03-14T20:39:00+00:00","dateModified":"2024-02-19T18:50:53+00:00","description":"We know how it sounds: is cryptojacking about someone stealing your cryptocurrencies? Surprisingly, not exactly. Let us explain!","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/"]}]},{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/03\/02.jpg","width":2123,"height":1120},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"What is cryptojacking and how can you be affected?"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/cs\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/9058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/comments?post=9058"}],"version-history":[{"count":4,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/9058\/revisions"}],"predecessor-version":[{"id":9138,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/9058\/revisions\/9138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/media\/9239"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/media?parent=9058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/categories?post=9058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/tags?post=9058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}