首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:Crypto Jacking a Technique to Leverage Technology to Mine Crypto Currency
  • 本地全文:下载
  • 作者:Haitham Hilal Al Hajri ; Badar Mohammed Al Mughairi ; Mohammad Imtiaz Hossain
  • 期刊名称:International Journal of Academic Research in Business and Social Sciences
  • 电子版ISSN:2222-6990
  • 出版年度:2019
  • 卷号:9
  • 期号:3
  • 页码:1220-1231
  • DOI:10.6007/IJARBSS/v9-i3/5791
  • 语种:English
  • 出版社:Human Resource Management Academic Research Society
  • 摘要:Society dependency on technology is becoming an obligation of modern life society, hence the advancement and innovation on Information and Communication Technologies Sector, especially when it comes to the development of infrastructure and various services provided by many vendors governmental or commercial. It is all, due to the constant revaluation of technology used by society today. Blockchain made its first debit as a proof of concept on money exchange platforms back in 2008, where the born of the first cryptocurrency. However the technology had more potential than just platform of exchanging valuable currency, it has spanned, out to open a whole work of possibility to enhance today modern day society further. However, as usually, cyber-criminals have found a way to leverage this technology to benefit them by exploiting the technology weaknesses to carry own their deeds. This paper will demonstrated the phenomenon of the crypto jacking and other related methods utilised by a hacker to leverage mining crypto. The objective of this paper is to investigate the state-of-the-art crypto mining attacks by overviewing different types of malware like crypto-jacking. With the current revaluation of technology, cybercriminals are being creative on discovering and implementing methods to abuse the leverage technology to meet their deeds, and lately, the majority of cybercriminals are experimenting with cryptocurrency and methods or techniques to mine cryptocurrency effectively and anonymously, the attack is known by Cryptojacking. The results from static and dynamic analysis uncover the techniques employed by the malware to exploit potential victims. The study concludes that enterprises face the greatest risk of cryptojacking due to the broad attack surface and moderate consequence severity. This research recommends anticipating trends in cybercrime monetization to inform defense strategies and increased communication about cyberattack information to better understand and defend against the cryptojacking threat.
国家哲学社会科学文献中心版权所有