Glossary term
Cryptojacking
Cryptojacking is the unauthorized use of someone else's device or computing resources to mine cryptocurrency, often causing performance, security, and financial harm.
Byline
Written by: Editorial Team
Updated
What Is Cryptojacking?
Cryptojacking is the unauthorized use of someone else's computer, phone, browser, server, or network resources to mine cryptocurrency. Instead of paying for the electricity and processing power needed for mining, the attacker secretly shifts that cost to the victim. The direct financial loss may be small for an individual device, but the broader damage can include degraded performance, higher operating costs, and greater exposure to malware or other security problems.
Crypto-related harm is not limited to bad trades or falling prices. Some losses come from hidden operating costs, compromised devices, and broader cybersecurity failures.
Key Takeaways
- Cryptojacking is the hidden use of someone else's device or computing resources to mine cryptocurrency.
- The victim often pays the cost through slower systems, higher electricity use, and security exposure.
- Cryptojacking is usually a malware or browser-script problem, not a legitimate mining activity.
- The term is relevant to crypto markets because it shows how digital-asset activity can create indirect financial harm.
- It is different from frauds like an exit scam, which target investor deposits directly.
How Cryptojacking Happens
Attackers may install malicious software on a device, compromise a website, or exploit weak security controls to run mining code without permission. In some cases, users notice only that their battery drains faster, fans run constantly, or systems feel unusually slow. In larger environments, the hidden cost may show up as higher infrastructure bills or disrupted operations.
Because the activity is hidden, cryptojacking can continue for a long time before it is detected.
How Cryptojacking Turns Devices Into Mining Tools
Cryptojacking is not usually about stealing coins from a cryptocurrency wallet. It is about stealing computing capacity. That still creates economic harm. A household may experience slower devices and higher energy use. A business may face reduced productivity, higher cloud costs, and new remediation expenses. In some cases, the same security weakness can expose the victim to more serious attacks later.
Victim | Typical harm |
|---|---|
Individual user | Battery drain, slower devices, higher electricity use |
Business or server environment | Higher cloud bills, degraded performance, incident-response costs |
How Cryptojacking Creates Loss Beyond Cybersecurity
Cryptojacking sits at the edge of cybersecurity and finance, but the financial harm is real. It can raise electricity or cloud bills, slow business operations, and force victims to spend time and money on cleanup.
That makes the term useful for investors and consumers who want to understand how crypto-related risk can show up outside a brokerage account or wallet balance.
How It Differs From Investor-Focused Crypto Fraud
Cryptojacking is different from schemes that directly solicit deposits, fake returns, or block withdrawals. The attacker is usually not trying to convince the victim to buy a token. Instead, the attacker is secretly monetizing the victim's electricity, processing power, or cloud infrastructure.
The practical defense is different too. Device security, monitoring, and operational awareness matter more here than investment due diligence alone.
How Small Per-Device Costs Add Up in Cryptojacking
For one laptop, the financial damage may look minor at first. But hidden CPU use, battery wear, electricity costs, and downtime can still add up. In a business or cloud environment, those same hidden costs can scale quickly because the attacker is monetizing many machines or much larger infrastructure at once.
That scaling risk is what makes cryptojacking financially relevant even though it starts as a cybersecurity problem.
The Bottom Line
Cryptojacking is the unauthorized use of someone else's computing resources to mine cryptocurrency. The main takeaway is that crypto-related harm can come from hidden operating costs and cybercrime, not just from investment losses.