Impact of Crypto-Mining Malware on System Resource Utilization
Keywords:
Component, Formatting, Style, Styling, InsertAbstract
Nowadays, the whole world works in modern technology. Peoples are paying more attention to complete the process in a sophisticated way without putting the much human effort. End-user thinks that only poor knowledge about application usage leads to data security issues. But application providing companies camouflage the truth behind the name of the user sophistication. Even a small piece of a script code can make the huge data security issues. That type of problems is called cryptocurrency malware. Cryptomining malware is nothing but software code and designed to take system resources without the knowledge of authorized end users. The role of cryptomining is stealing computer’s resources with the help of auto inject of malware code in a crook way while making online communications on websites. A website owner uses these malware codes to take visitor's system utilization to gain more earning. Cryptomining malware easily injects electronic devices like computers, smart phones to increase earnings from cryptocurrency mining
References
[1] https://malwaretips.com/blogs/remove-coinhive-miner-virus
[2] https://www.getastra.com/blog/911/remove-crypto-mining-malware-cms-wordpress-magento-drupal/
[3] https://www.cyber.nj.gov/threat-profiles/exploit-kit-variants/rig
[4] https://en.wikipedia.org/wiki/Fireball_(software)
[6] https://www.theregister.co.uk/2018/02/11/browsealoud_compromised_coinhive
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
