Sometimes a single careless click like downloading cracked software or opening a suspicious attachment is all it takes for a hidden program to slip into your system. It won’t lock your files or display ransom messages. Instead, it quietly uses your computer’s processing power to mine cryptocurrency for someone else, often for months before being noticed.
This silent type of cyberattack is known as cryptojacking. In this blog, we’ll explain how cryptojacking works, review recent real-world cases, highlight the hidden costs for victims, and share practical methods to prevent these attacks.
Cryptojacking is when attackers secretly use a device’s processing power to mine cryptocurrency. Unlike other malware that steals data or damages files, cryptojackers focus on staying hidden and running quietly in the background.
There are two common forms of cryptojacking:
A cryptojacker’s goal is to stay hidden while continuously mining. Here’s the typical process:
Cryptojacking isn’t just an old trick , it’s evolving.
GreedyBear is a newly exposed attack group operating at an industrial scale, combining multiple tactics to steal cryptocurrency and credentials. Reports link the group to:
All these operations connect back to a single central server (185.]208.]156.]66), acting as a hub for command-and-control, data exfiltration, and scam site hosting.
In June 2025, security researchers uncovered a cryptojacking campaign they named JINX-0132. Unlike the usual malware that hides on personal devices, this one went straight for the backbone of modern businesses: DevOps tools.
Over 5,300 Consul servers and more than 400 Nomad servers were openly accessible online, making them prime targets.Most exposed systems were located in the United States, China, Germany, Singapore, Finland, the Netherlands, and the United Kingdom.
Some hacked Nomad clusters were running on hundreds of servers at once. Together, the stolen CPU and memory power added up to tens of thousands of dollars in cloud bills every month , all secretly mined by the attackers.
Attackers pulled their mining tools from public GitHub projects instead of using their own servers, making it harder to trace them. They abused weak points in common DevOps tools:
This campaign is a reminder that cryptojacking isn’t just about slowing down your laptop anymore. The battleground has shifted to the cloud and enterprise infrastructure, where a single weak configuration can become a goldmine for attackers.
In mid-2025, researchers discovered a new malware family called Trojan.Scavenger and it was aimed squarely at gamers. Instead of targeting corporate networks or cloud servers, attackers hid this trojan inside cheats and mods for popular titles like GTA V and Oblivion Remastered.
At first glance, the downloads looked like harmless performance patches or game tweaks. But once installed, they carried out a clever trick known as DLL Search Order Hijacking, which let the malware load itself every time the game launched.
It stole login credentials and crypto wallet data, targeting tools like MetaMask, Exodus, and Phantom. It even went after password managers such as Bitwarden and LastPass, giving attackers broad access to sensitive accounts. In some cases, it quietly turned gaming PCs into crypto-mining rigs, running in the background without raising suspicion.
Because gaming computers often have high-end GPUs and powerful CPUs, they’re a perfect target for cryptojackers. For many victims, the first signs were strange such as louder fans, overheating, or performance drops during gameplay but by then, their machines had been mining cryptocurrency for someone else.
As more companies adopt containerized environments for speed and scalability, attackers are following close behind. Security researchers uncovered a new cryptojacking campaign designed specifically for Docker.
Instead of going after individual laptops, the attackers planted malicious Docker images and scanned for exposed Docker APIs. Once inside, they deployed miners that ran quietly inside containers hidden away from traditional monitoring tools.
Over 1,000 Docker APIs were found misconfigured and publicly accessible, providing easy entry points for attackers. A worm-like variant, nicknamed Commando Cat, was able to move from container to container, using the chroot
command to escape Docker and backdoor the host system.
What made this campaign stand out was its evasion techniques:
This incident shows how cryptojackers are adapting to the cloud-native era. Docker and other container platforms make deployment fast and easy but when security takes a backseat, they can also become perfect entry points for large-scale, stealthy mining operations.
In June 2025, Kaspersky published an in-depth report on a group they call Librarian Ghouls (also tracked as Rare Werewolf and Rezet). This APT has been active since early 2025, focusing heavily on targets in Russia and the CIS. While initially linked to classic data-theft campaigns, investigators found the group was also deploying cryptojacking malware to quietly monetize its operations.
The infection chain was surprisingly simple but effective:
cryptojackers quietly drains resources for weeks or even months before victims realize something is wrong. Here’s how those “invisible” costs add up:
Performance Drain : When a cryptojacker runs in the background, it constantly uses your computer’s CPU and GPU to mine coins. That leaves fewer resources for you. Everyday tasks from opening a browser to running games or business applications start to feel slow and unresponsive.
Hardware Stress : Mining is extremely resource-intensive. It pushes processors to run at near 100% capacity for long stretches of time. Overheating becomes common, cooling fans spin at full speed, and hardware components wear out faster than they should.
Financial Impact : Cryptojacking quietly increases energy consumption. A single infected machine may only raise the power bill slightly, but across multiple computers or servers the costs quickly pile up. In large-scale attacks on businesses or cloud infrastructure, victims have reported tens of thousands of dollars in additional monthly costs.
Security Risk : If a cryptojacker has made its way into your system, it means your defenses have already been bypassed. That same backdoor can be used to deploy more dangerous malware — from info-stealers to ransomware.
The best way to handle cryptojacking is to stop it before it starts. Since these attacks rely on tricking users or exploiting weak systems, simple habits and good security hygiene go a long way:
https://www.koi.security/blog/greedybear-650-attack-tools-one-coordinated-campaign
https://thehackernews.com/2025/06/cryptojacking-campaign-exploits-devops.html
https://news.drweb.com/show/?c=5&i=15036&lng=en
https://securelist.com/dero-miner-infects-containers-through-docker-api/116546/
https://securelist.com/librarian-ghouls-apt-wakes-up-computers-to-steal-data-and-mine-crypto/116536/
https://www.it-daily.net/en/shortnews-en/cryptojacking-campaign-abuses-devops-apis-with-github-tools
https://thehackernews.com/2025/06/cryptojacking-campaign-exploits-devops.html
https://thehackernews.com/2025/05/new-self-spreading-malware-infects.html
Cryptojackers don’t care about your photos or passwords , they want your processing power. The theft is silent, the damage gradual, and the profits theirs.
Stay alert, monitor your systems, and remember:
“If your computer sounds like it’s working hard for no reason, it might be working for someone else.”