René's URL Explorer Experiment


Title: Cryptojacking - Wikipedia

Open Graph Title: Cryptojacking - Wikipedia

Generator: MediaWiki 1.46.0-wmf.7

direct link

Domain: en.wikipedia.org


Hey, it has json ld scripts:
{"@context":"https:\/\/schema.org","@type":"Article","name":"Cryptojacking","url":"https:\/\/en.wikipedia.org\/wiki\/Cryptojacking","sameAs":"http:\/\/www.wikidata.org\/entity\/Q107121219","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q107121219","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2021-04-17T02:06:14Z","dateModified":"2026-01-04T12:43:42Z","headline":"hijacking a target's processing power in order to mine cryptocurrency on the hacker's behalf"}

referrerorigin-when-cross-origin
format-detectiontelephone=no
og:typewebsite

Links:

Jump to contenthttps://en.wikipedia.org/wiki/Cryptojacking#bodyContent
Main pagehttps://en.wikipedia.org/wiki/Main_Page
Contentshttps://en.wikipedia.org/wiki/Wikipedia:Contents
Current eventshttps://en.wikipedia.org/wiki/Portal:Current_events
Random articlehttps://en.wikipedia.org/wiki/Special:Random
About Wikipediahttps://en.wikipedia.org/wiki/Wikipedia:About
Contact ushttps://en.wikipedia.org/wiki/Wikipedia:Contact_us
Helphttps://en.wikipedia.org/wiki/Help:Contents
Learn to edithttps://en.wikipedia.org/wiki/Help:Introduction
Community portalhttps://en.wikipedia.org/wiki/Wikipedia:Community_portal
Recent changeshttps://en.wikipedia.org/wiki/Special:RecentChanges
Upload filehttps://en.wikipedia.org/wiki/Wikipedia:File_upload_wizard
Special pageshttps://en.wikipedia.org/wiki/Special:SpecialPages
https://en.wikipedia.org/wiki/Main_Page
Search https://en.wikipedia.org/wiki/Special:Search
Donatehttps://donate.wikimedia.org/?wmf_source=donate&wmf_medium=sidebar&wmf_campaign=en.wikipedia.org&uselang=en
Create accounthttps://en.wikipedia.org/w/index.php?title=Special:CreateAccount&returnto=Cryptojacking
Log inhttps://en.wikipedia.org/w/index.php?title=Special:UserLogin&returnto=Cryptojacking
Donatehttps://donate.wikimedia.org/?wmf_source=donate&wmf_medium=sidebar&wmf_campaign=en.wikipedia.org&uselang=en
Create accounthttps://en.wikipedia.org/w/index.php?title=Special:CreateAccount&returnto=Cryptojacking
Log inhttps://en.wikipedia.org/w/index.php?title=Special:UserLogin&returnto=Cryptojacking
(Top) https://en.wikipedia.org/wiki/Cryptojacking
1 Notable events https://en.wikipedia.org/wiki/Cryptojacking#Notable_events
2 Detection https://en.wikipedia.org/wiki/Cryptojacking#Detection
3 See also https://en.wikipedia.org/wiki/Cryptojacking#See_also
4 References https://en.wikipedia.org/wiki/Cryptojacking#References
العربيةhttps://ar.wikipedia.org/wiki/%D8%B3%D8%B1%D9%82%D8%A9_%D8%A7%D9%84%D8%B9%D9%85%D9%84%D8%A7%D8%AA_%D8%A7%D9%84%D9%85%D8%B9%D9%85%D8%A7%D8%A9
Catalàhttps://ca.wikipedia.org/wiki/Criptojacking
Españolhttps://es.wikipedia.org/wiki/Criptojacking
Françaishttps://fr.wikipedia.org/wiki/Cryptojacking
한국어https://ko.wikipedia.org/wiki/%ED%81%AC%EB%A6%BD%ED%86%A0%EC%9E%AC%ED%82%B9
Bahasa Indonesiahttps://id.wikipedia.org/wiki/Cryptojacking
മലയാളംhttps://ml.wikipedia.org/wiki/%E0%B4%95%E0%B5%8D%E0%B4%B0%E0%B4%BF%E0%B4%AA%E0%B5%8D%E0%B4%B1%E0%B5%8D%E0%B4%B1%E0%B5%8B%E0%B4%9C%E0%B4%BE%E0%B4%95%E0%B5%8D%E0%B4%95%E0%B4%BF%E0%B4%82%E0%B4%97%E0%B5%8D
日本語https://ja.wikipedia.org/wiki/%E3%82%AF%E3%83%AA%E3%83%97%E3%83%88%E3%82%B8%E3%83%A3%E3%83%83%E3%82%AD%E3%83%B3%E3%82%B0
Polskihttps://pl.wikipedia.org/wiki/Cryptojacking
Українськаhttps://uk.wikipedia.org/wiki/%D0%9A%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B4%D0%B6%D0%B5%D0%BA%D1%96%D0%BD%D0%B3
中文https://zh.wikipedia.org/wiki/%E9%A8%8E%E5%8A%AB%E6%8C%96%E7%A4%A6
Edit linkshttps://www.wikidata.org/wiki/Special:EntityPage/Q107121219#sitelinks-wikipedia
Articlehttps://en.wikipedia.org/wiki/Cryptojacking
Talkhttps://en.wikipedia.org/wiki/Talk:Cryptojacking
Readhttps://en.wikipedia.org/wiki/Cryptojacking
Edithttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=edit
View historyhttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=history
Readhttps://en.wikipedia.org/wiki/Cryptojacking
Edithttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=edit
View historyhttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=history
What links herehttps://en.wikipedia.org/wiki/Special:WhatLinksHere/Cryptojacking
Related changeshttps://en.wikipedia.org/wiki/Special:RecentChangesLinked/Cryptojacking
Upload filehttps://en.wikipedia.org/wiki/Wikipedia:File_Upload_Wizard
Permanent linkhttps://en.wikipedia.org/w/index.php?title=Cryptojacking&oldid=1331088807
Page informationhttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=info
Cite this pagehttps://en.wikipedia.org/w/index.php?title=Special:CiteThisPage&page=Cryptojacking&id=1331088807&wpFormIdentifier=titleform
Get shortened URLhttps://en.wikipedia.org/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FCryptojacking
Download QR codehttps://en.wikipedia.org/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FCryptojacking
Download as PDFhttps://en.wikipedia.org/w/index.php?title=Special:DownloadAsPdf&page=Cryptojacking&action=show-download-screen
Printable versionhttps://en.wikipedia.org/w/index.php?title=Cryptojacking&printable=yes
Wikidata itemhttps://www.wikidata.org/wiki/Special:EntityPage/Q107121219
computerhttps://en.wikipedia.org/wiki/Computer
cryptocurrencieshttps://en.wikipedia.org/wiki/Cryptocurrencies
websiteshttps://en.wikipedia.org/wiki/Website
[1]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-1
[2]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-mm-2
[3]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-3
[4]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-4
Coinhivehttps://en.wikipedia.org/wiki/Coinhive
[5]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-5
Monerohttps://en.wikipedia.org/wiki/Monero
Zcashhttps://en.wikipedia.org/wiki/Zcash
[2]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-mm-2
[6]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-6
malwarehttps://en.wikipedia.org/wiki/Malware
[7]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-urlBrutal_cryptocurrency_mining_malware_crashes_your_PC_when_discovered_|_ZDNet-7
FPGAhttps://en.wikipedia.org/wiki/Field-programmable_gate_array
ASIChttps://en.wikipedia.org/wiki/Application-specific_integrated_circuit
[8]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-8
edithttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=edit§ion=1
Symantechttps://en.wikipedia.org/wiki/NortonLifeLock
botnetshttps://en.wikipedia.org/wiki/Botnet
[9]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-9
parallel processinghttps://en.wikipedia.org/wiki/Parallel_computing
GPUshttps://en.wikipedia.org/wiki/GPU
video cardshttps://en.wikipedia.org/wiki/Video_card
[10]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-10
[11]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-tomsmining-11
[12]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-12
[13]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-13
[14]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-14
trojanshttps://en.wikipedia.org/wiki/Trojan_horse_(computing)
[15]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-15
electronic sportshttps://en.wikipedia.org/wiki/Electronic_sports
E-Sports Entertainmenthttps://en.wikipedia.org/wiki/ESEA_League
[16]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-16
[17]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-17
Yahoo!https://en.wikipedia.org/wiki/Yahoo!
Javahttps://en.wikipedia.org/wiki/Java_(software_platform)
[18]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-18
[19]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-19
Sefnithttps://en.wikipedia.org/wiki/Mevade_Botnet
Microsoft Security Essentialshttps://en.wikipedia.org/wiki/Microsoft_Security_Essentials
[20]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-20
[21]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-21
Harvardhttps://en.wikipedia.org/wiki/Harvard
Dogecoinhttps://en.wikipedia.org/wiki/Dogecoin
[22]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-22
Ars Technicahttps://en.wikipedia.org/wiki/Ars_Technica
YouTubehttps://en.wikipedia.org/wiki/YouTube
JavaScripthttps://en.wikipedia.org/wiki/JavaScript
Monerohttps://en.wikipedia.org/wiki/Monero_(cryptocurrency)
[23]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-23
multiple zero-day vulnerabilities were found on Microsoft Exchange servershttps://en.wikipedia.org/wiki/2021_Microsoft_Exchange_Server_data_breach
remote code executionhttps://en.wikipedia.org/wiki/Remote_code_execution
[24]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-24
edithttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=edit§ion=2
[25]https://en.wikipedia.org/wiki/Cryptojacking#cite_note-25
edithttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=edit§ion=3
Proxy criminal networkshttps://en.wikipedia.org/wiki/Proxy_criminal_networks
edithttps://en.wikipedia.org/w/index.php?title=Cryptojacking&action=edit§ion=4
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-1
"Cryptojackers are hacking websites to mine cryptocurrencies"https://money.cnn.com/2018/02/22/technology/cryptojacking-mining-tesla-websites/index.html
Archivedhttps://web.archive.org/web/20221209040241/https://money.cnn.com/2018/02/22/technology/cryptojacking-mining-tesla-websites/index.html
ahttps://en.wikipedia.org/wiki/Cryptojacking#cite_ref-mm_2-0
bhttps://en.wikipedia.org/wiki/Cryptojacking#cite_ref-mm_2-1
"Cryptojacking malware was secretly mining Monero on many government and university websites"https://techcrunch.com/2018/05/08/coinhive-malware-may-troy-mursch/
TechCrunchhttps://en.wikipedia.org/wiki/TechCrunch
Archivedhttps://web.archive.org/web/20230709085226/https://techcrunch.com/2018/05/08/coinhive-malware-may-troy-mursch/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-3
"A Cross-Stack Approach Towards Defending Against Cryptojacking"https://doi.org/10.1109%2FLCA.2020.3017457
Bibcodehttps://en.wikipedia.org/wiki/Bibcode_(identifier)
2020ICAL...19..126Lhttps://ui.adsabs.harvard.edu/abs/2020ICAL...19..126L
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.1109/LCA.2020.3017457https://doi.org/10.1109%2FLCA.2020.3017457
ISSNhttps://en.wikipedia.org/wiki/ISSN_(identifier)
1556-6056https://search.worldcat.org/issn/1556-6056
S2CIDhttps://en.wikipedia.org/wiki/S2CID_(identifier)
222070383https://api.semanticscholar.org/CorpusID:222070383
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-4
"Cryptomining makes noise: Detecting cryptojacking via Machine Learning"https://doi.org/10.1016%2Fj.comcom.2021.02.016
arXivhttps://en.wikipedia.org/wiki/ArXiv_(identifier)
1910.09272https://arxiv.org/abs/1910.09272
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.1016/j.comcom.2021.02.016https://doi.org/10.1016%2Fj.comcom.2021.02.016
S2CIDhttps://en.wikipedia.org/wiki/S2CID_(identifier)
233402711https://api.semanticscholar.org/CorpusID:233402711
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-5
"Coinhive domain repurposed to warn visitors of hacked sites, routers"https://www.bleepingcomputer.com/news/security/coinhive-domain-repurposed-to-warn-visitors-of-hacked-sites-routers/
Archivedhttps://web.archive.org/web/20221209040222/https://www.bleepingcomputer.com/news/security/coinhive-domain-repurposed-to-warn-visitors-of-hacked-sites-routers/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-6
"What is cryptojacking? How to detect mining malware - MediaFeed"https://mediafeed.org/what-is-cryptojacking-how-to-detect-mining-malware/
Archivedhttps://web.archive.org/web/20221209040220/https://mediafeed.org/what-is-cryptojacking-how-to-detect-mining-malware/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-urlBrutal_cryptocurrency_mining_malware_crashes_your_PC_when_discovered_|_ZDNet_7-0
"Brutal cryptocurrency mining malware crashes your PC when discovered"https://www.zdnet.com/article/brutal-cryptominer-crashes-your-pc-when-discovered/
ZDNethttps://en.wikipedia.org/wiki/ZDNet
Archivedhttps://web.archive.org/web/20221209042118/https://www.zdnet.com/article/brutal-cryptominer-crashes-your-pc-when-discovered/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-8
"Bitcoin's Computing Crisis"https://spectrum.ieee.org/bitcoins-computing-crisis
Archivedhttps://web.archive.org/web/20210514134058/https://spectrum.ieee.org/computing/networks/bitcoins-computing-crisis
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-9
"Bitcoin Botnet Mining"https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=141592a6-e1f5-4aa4-a049-11dc42380516&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
Archivedhttps://web.archive.org/web/20190807222937/https://www.symantec.com/connect/blogs/bitcoin-botnet-mining
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-10
"Malware mints virtual currency using victim's GPU"https://www.theregister.co.uk/2011/08/16/gpu_bitcoin_brute_forcing/
Archivedhttps://web.archive.org/web/20230406093949/http://www.theregister.co.uk/2011/08/16/gpu_bitcoin_brute_forcing/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-tomsmining_11-0
"All About Bitcoin Mining: Road To Riches Or Fool's Gold?"http://www.tomshardware.com/reviews/bitcoin-mining-make-money,3514.html
Archivedhttps://web.archive.org/web/20230414161026/https://www.tomshardware.com/reviews/bitcoin-mining-make-money,3514.html
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-12
"Infosecurity - Researcher discovers distributed bitcoin cracking trojan malware"http://www.infosecurity-magazine.com/view/20211/researcher-discovers-distributed-bitcoin-cracking-trojan-malware/
Archivedhttps://web.archive.org/web/20140703013154/http://www.infosecurity-magazine.com/view/20211/researcher-discovers-distributed-bitcoin-cracking-trojan-malware/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-13
"More Bitcoin malware: this one uses your GPU for mining"https://arstechnica.com/tech-policy/2011/08/symantec-spots-malware-that-uses-your-gpu-to-mine-bitcoins/
Ars Technicahttps://en.wikipedia.org/wiki/Ars_Technica
Archivedhttps://web.archive.org/web/20170822222545/https://arstechnica.com/tech-policy/2011/08/symantec-spots-malware-that-uses-your-gpu-to-mine-bitcoins/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-14
"Trojan.Badminer"https://web.archive.org/web/20141129030053/http://www.symantec.com/security_response/writeup.jsp?docid=2011-081115-5847-99&tabid=2
Symantechttps://en.wikipedia.org/wiki/Symantec_Corporation
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-15
"Mac OS X Trojan steals processing power to produce Bitcoins: Security researchers warn that DevilRobber malware could slow down infected Mac computers"http://www.techworld.com.au/article/405849/mac_os_x_trojan_steals_processing_power_produce_bitcoins
Archivedhttps://web.archive.org/web/20161118230651/http://www.techworld.com.au/article/405849/mac_os_x_trojan_steals_processing_power_produce_bitcoins
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-16
"E-Sports Entertainment settles Bitcoin botnet allegations"https://www.bbc.co.uk/news/technology-25014477
BBC Newshttps://en.wikipedia.org/wiki/BBC_News
Archivedhttps://web.archive.org/web/20221107175231/https://www.bbc.co.uk/news/technology-25014477
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-17
"The Hacker News The Hacker News +1,440,833 ThAlleged Skynet Botnet creator arrested in Germany"http://thehackernews.com/2013/12/alleged-skynet-botnet-creator-arrested.html
Archivedhttps://web.archive.org/web/20190530193218/https://thehackernews.com/2013/12/alleged-skynet-botnet-creator-arrested.html
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-18
"Yahoo malware turned Euro PCs into bitcoin miners"http://www.slashgear.com/yahoo-malware-turned-euro-pcs-into-bitcoin-miners-09312529/
Archivedhttps://web.archive.org/web/20190530192626/https://www.slashgear.com/yahoo-malware-turned-euro-pcs-into-bitcoin-miners-09312529/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-19
"Yahoo malware turned European computers into bitcoin slaves"https://www.theguardian.com/technology/2014/jan/08/yahoo-malware-turned-europeans-computers-into-bitcoin-slaves
ISSNhttps://en.wikipedia.org/wiki/ISSN_(identifier)
0261-3077https://search.worldcat.org/issn/0261-3077
Archivedhttps://web.archive.org/web/20161209073430/https://www.theguardian.com/technology/2014/jan/08/yahoo-malware-turned-europeans-computers-into-bitcoin-slaves
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-20
"Microsoft stopped Tor running automatically on botnet-infected systems"https://www.wired.co.uk/news/archive/2014-01/20/microsoft-removes-tor
Archivedhttps://web.archive.org/web/20221018045017/https://www.wired.co.uk/news/archive/2014-01/20/microsoft-removes-tor
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-21
"US researcher banned for mining Bitcoin using university supercomputers"http://www.pcworld.com/article/2360840/us-researcher-banned-for-mining-bitcoin-using-university-supercomputers.html
Archivedhttps://web.archive.org/web/20190307032015/https://www.pcworld.com/article/2360840/us-researcher-banned-for-mining-bitcoin-using-university-supercomputers.html
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-22
"Harvard Research Computing Resources Misused for 'Dogecoin' Mining Operation"http://www.thecrimson.com/article/2014/2/20/harvard-odyssey-dogecoin/
The Harvard Crimsonhttps://en.wikipedia.org/wiki/The_Harvard_Crimson
Archivedhttps://web.archive.org/web/20221225040528/https://www.thecrimson.com/article/2014/2/20/harvard-odyssey-dogecoin/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-23
"Now even YouTube serves ads with CPU-draining cryptocurrency miners"https://arstechnica.com/information-technology/2018/01/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners
Archivedhttps://web.archive.org/web/20230127104714/https://arstechnica.com/information-technology/2018/01/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners/
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-24
"Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers"https://www.zdnet.com/article/free-money-cyber-criminals-are-installing-cryptojacking-malware-on-unpatched-microsoft-exchange-servers/
Archivedhttps://web.archive.org/web/20230112184123/https://www.zdnet.com/article/free-money-cyber-criminals-are-installing-cryptojacking-malware-on-unpatched-microsoft-exchange-servers
^https://en.wikipedia.org/wiki/Cryptojacking#cite_ref-25
arXivhttps://en.wikipedia.org/wiki/ArXiv_(identifier)
1910.09272https://arxiv.org/abs/1910.09272
doihttps://en.wikipedia.org/wiki/Doi_(identifier)
10.1016/j.comcom.2021.02.016https://doi.org/10.1016%2Fj.comcom.2021.02.016
vhttps://en.wikipedia.org/wiki/Template:Information_security
thttps://en.wikipedia.org/wiki/Template_talk:Information_security
ehttps://en.wikipedia.org/wiki/Special:EditPage/Template:Information_security
Information securityhttps://en.wikipedia.org/wiki/Information_security
Threatshttps://en.wikipedia.org/wiki/Threat_(computer)
Adwarehttps://en.wikipedia.org/wiki/Adware
Advanced persistent threathttps://en.wikipedia.org/wiki/Advanced_persistent_threat
Arbitrary code executionhttps://en.wikipedia.org/wiki/Arbitrary_code_execution
Backdoorshttps://en.wikipedia.org/wiki/Backdoor_(computing)
Forkhttps://en.wikipedia.org/wiki/Fork_bomb
Logichttps://en.wikipedia.org/wiki/Logic_bomb
Timehttps://en.wikipedia.org/wiki/Time_bomb_(software)
Ziphttps://en.wikipedia.org/wiki/Zip_bomb
Hardware backdoorshttps://en.wikipedia.org/wiki/Hardware_backdoor
Code injectionhttps://en.wikipedia.org/wiki/Code_injection
Crimewarehttps://en.wikipedia.org/wiki/Crimeware
Cross-site scriptinghttps://en.wikipedia.org/wiki/Cross-site_scripting
Cross-site leakshttps://en.wikipedia.org/wiki/Cross-site_leaks
DOM clobberinghttps://en.wikipedia.org/wiki/DOM_clobbering
History sniffinghttps://en.wikipedia.org/wiki/History_sniffing
Botnetshttps://en.wikipedia.org/wiki/Botnet
Data breachhttps://en.wikipedia.org/wiki/Data_breach
Drive-by downloadhttps://en.wikipedia.org/wiki/Drive-by_download
Browser Helper Objectshttps://en.wikipedia.org/wiki/Browser_Helper_Object
Viruseshttps://en.wikipedia.org/wiki/Computer_virus
Data scrapinghttps://en.wikipedia.org/wiki/Data_scraping
Denial-of-service attackhttps://en.wikipedia.org/wiki/Denial-of-service_attack
Eavesdroppinghttps://en.wikipedia.org/wiki/Eavesdropping
Email fraudhttps://en.wikipedia.org/wiki/Email_fraud
Email spoofinghttps://en.wikipedia.org/wiki/Email_spoofing
Exploitshttps://en.wikipedia.org/wiki/Exploit_(computer_security)
Fraudulent dialershttps://en.wikipedia.org/wiki/Dialer#Fraudulent_dialer
Hacktivismhttps://en.wikipedia.org/wiki/Hacktivism
Infostealerhttps://en.wikipedia.org/wiki/Infostealer
Insecure direct object referencehttps://en.wikipedia.org/wiki/Insecure_direct_object_reference
Keystroke loggershttps://en.wikipedia.org/wiki/Keystroke_logging
Malwarehttps://en.wikipedia.org/wiki/Malware
Payloadhttps://en.wikipedia.org/wiki/Payload_(computing)
Phishinghttps://en.wikipedia.org/wiki/Phishing
Voicehttps://en.wikipedia.org/wiki/Voice_phishing
Polymorphic enginehttps://en.wikipedia.org/wiki/Polymorphic_engine
Privilege escalationhttps://en.wikipedia.org/wiki/Privilege_escalation
Ransomwarehttps://en.wikipedia.org/wiki/Ransomware
Rootkitshttps://en.wikipedia.org/wiki/Rootkit
Scarewarehttps://en.wikipedia.org/wiki/Scareware
Shellcodehttps://en.wikipedia.org/wiki/Shellcode
Spamminghttps://en.wikipedia.org/wiki/Spamming
Social engineeringhttps://en.wikipedia.org/wiki/Social_engineering_(security)
Spywarehttps://en.wikipedia.org/wiki/Spyware
Software bugshttps://en.wikipedia.org/wiki/Software_bug
Trojan horseshttps://en.wikipedia.org/wiki/Trojan_horse_(computing)
Hardware Trojanshttps://en.wikipedia.org/wiki/Hardware_Trojan
Remote access trojanshttps://en.wikipedia.org/wiki/Remote_access_trojan
Vulnerabilityhttps://en.wikipedia.org/wiki/Vulnerability_(computer_security)
Web shellshttps://en.wikipedia.org/wiki/Web_shell
Wiperhttps://en.wikipedia.org/wiki/Wiper_(malware)
Wormshttps://en.wikipedia.org/wiki/Computer_worm
SQL injectionhttps://en.wikipedia.org/wiki/SQL_injection
Rogue security softwarehttps://en.wikipedia.org/wiki/Rogue_security_software
Zombiehttps://en.wikipedia.org/wiki/Zombie_(computing)
https://en.wikipedia.org/wiki/File:CIAJMK1209-en.svg
Application securityhttps://en.wikipedia.org/wiki/Application_security
Secure codinghttps://en.wikipedia.org/wiki/Secure_coding
Secure by designhttps://en.wikipedia.org/wiki/Secure_by_design
Misuse casehttps://en.wikipedia.org/wiki/Misuse_case
Computer access controlhttps://en.wikipedia.org/wiki/Computer_access_control
Authenticationhttps://en.wikipedia.org/wiki/Authentication
Multi-factor authenticationhttps://en.wikipedia.org/wiki/Multi-factor_authentication
Authorizationhttps://en.wikipedia.org/wiki/Authorization
Computer security softwarehttps://en.wikipedia.org/wiki/Computer_security_software
Antivirus softwarehttps://en.wikipedia.org/wiki/Antivirus_software
Security-focused operating systemhttps://en.wikipedia.org/wiki/Security-focused_operating_system
Data-centric securityhttps://en.wikipedia.org/wiki/Data-centric_security
Software obfuscationhttps://en.wikipedia.org/wiki/Obfuscation_(software)
Data maskinghttps://en.wikipedia.org/wiki/Data_masking
Encryptionhttps://en.wikipedia.org/wiki/Encryption
Firewallhttps://en.wikipedia.org/wiki/Firewall_(computing)
Intrusion detection systemhttps://en.wikipedia.org/wiki/Intrusion_detection_system
Host-based intrusion detection systemhttps://en.wikipedia.org/wiki/Host-based_intrusion_detection_system
Anomaly detectionhttps://en.wikipedia.org/wiki/Anomaly_detection
Information security managementhttps://en.wikipedia.org/wiki/Information_security_management
Information risk managementhttps://en.wikipedia.org/wiki/Information_risk_management
Security information and event managementhttps://en.wikipedia.org/wiki/Security_information_and_event_management
Runtime application self-protectionhttps://en.wikipedia.org/wiki/Runtime_application_self-protection
Site isolationhttps://en.wikipedia.org/wiki/Site_isolation
Computer securityhttps://en.wikipedia.org/wiki/Computer_security
Automotive securityhttps://en.wikipedia.org/wiki/Automotive_security
Cybercrimehttps://en.wikipedia.org/wiki/Cybercrime
Cybersex traffickinghttps://en.wikipedia.org/wiki/Cybersex_trafficking
Computer fraudhttps://en.wikipedia.org/wiki/Computer_fraud
Cybergeddonhttps://en.wikipedia.org/wiki/Cybergeddon
Cyberterrorismhttps://en.wikipedia.org/wiki/Cyberterrorism
Cyberwarfarehttps://en.wikipedia.org/wiki/Cyberwarfare
Electronic warfarehttps://en.wikipedia.org/wiki/Electronic_warfare
Information warfarehttps://en.wikipedia.org/wiki/Information_warfare
Internet securityhttps://en.wikipedia.org/wiki/Internet_security
Mobile securityhttps://en.wikipedia.org/wiki/Mobile_security
Network securityhttps://en.wikipedia.org/wiki/Network_security
Copy protectionhttps://en.wikipedia.org/wiki/Copy_protection
Digital rights managementhttps://en.wikipedia.org/wiki/Digital_rights_management
https://en.wikipedia.org/w/index.php?title=Cryptojacking&oldid=1331088807https://en.wikipedia.org/w/index.php?title=Cryptojacking&oldid=1331088807
Categorieshttps://en.wikipedia.org/wiki/Help:Category
Cryptocurrencieshttps://en.wikipedia.org/wiki/Category:Cryptocurrencies
Malwarehttps://en.wikipedia.org/wiki/Category:Malware
Security breacheshttps://en.wikipedia.org/wiki/Category:Security_breaches
Cybercrimehttps://en.wikipedia.org/wiki/Category:Cybercrime
CS1: unfit URLhttps://en.wikipedia.org/wiki/Category:CS1:_unfit_URL
Articles with short descriptionhttps://en.wikipedia.org/wiki/Category:Articles_with_short_description
Short description is different from Wikidatahttps://en.wikipedia.org/wiki/Category:Short_description_is_different_from_Wikidata
Creative Commons Attribution-ShareAlike 4.0 Licensehttps://en.wikipedia.org/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License
Terms of Usehttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use
Privacy Policyhttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy
Wikimedia Foundation, Inc.https://wikimediafoundation.org/
Privacy policyhttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy
About Wikipediahttps://en.wikipedia.org/wiki/Wikipedia:About
Disclaimershttps://en.wikipedia.org/wiki/Wikipedia:General_disclaimer
Contact Wikipediahttps://en.wikipedia.org/wiki/Wikipedia:Contact_us
Legal & safety contactshttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Legal:Wikimedia_Foundation_Legal_and_Safety_Contact_Information
Code of Conducthttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct
Developershttps://developer.wikimedia.org
Statisticshttps://stats.wikimedia.org/#/en.wikipedia.org
Cookie statementhttps://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement
Mobile viewhttps://en.wikipedia.org/w/index.php?title=Cryptojacking&mobileaction=toggle_view_mobile
https://www.wikimedia.org/
https://www.mediawiki.org/
https://en.wikipedia.org/wiki/Cryptojacking
https://en.wikipedia.org/wiki/Cryptojacking
https://en.wikipedia.org/wiki/Cryptojacking
https://en.wikipedia.org/wiki/Cryptojacking
https://en.wikipedia.org/wiki/Cryptojacking
https://en.wikipedia.org/wiki/Cryptojacking
https://en.wikipedia.org/wiki/Cryptojacking
Add topic https://en.wikipedia.org/wiki/Cryptojacking

Viewport: width=1120

Robots: max-image-preview:standard


URLs of crawlers that visited me.