What is cryptojacking?

Cryptojacking is defined as the secret use of your computing device to mine cryptocurrency.

Cryptojacking used to be confined to the victim unknowingly installing a program that secretly mines cryptocurrency.

Here's the bad news...

In-browser cryptojacking doesn't need a program to be installed.

I found this out when Jascha, a Hacker Bits subscriber, emailed us about an article in Issue 22 that was doing in-browser cryptojacking.

Below, you'll find out more about in-browser cryptojacking and how to protect yourself.

How does in-browser cryptojacking work?

In-browser cryptojacking uses JavaScript on a web page to mine for cryptocurrencies.

JavaScript runs on just about every website you visit, so the JavaScript code responsible for in-browser mining doesn't need to be installed.

If you think it's nothing, think again...

You load the page, and the in-browser mining code just runs. No need to install, and no need to opt-in.

Currently (Nov 2017), in-browser mining is available for the Monero cryptocurrency.

Cryptojacking JavaScript (thumbnail)

A cryptojacking JavaScript web page uses your computer to mine for cryptocurrencies. 

Cryptojacking Monero

Monero is a privacy-focused cryptocurrency started in 2014. It is one of the few cryptocurrencies that supports in-browser mining. 

Cryptojacking Scripts (thumbnail)

Cryptojacking scripts allow you to quickly install a miner on your website. Coinhive’s set of AuthedMine scripts is the only solution I can recommend.

Cryptojacking How To (thumbnail)

This tutorial is a cryptojacking how-to detailing exactly what you need to setup an opt-in WordPress Coinhive miner for the Monero cryptocurrency.

Cryptojacking Blocker (thumbnail)

The simplest way to protect yourself from cryptojacking is to install a cryptojacking blocker. 

Want to know more about cryptocurrencies?

Checkout Cryptominded for a curated collection of some of the best cryptocurrency resources. The Starters' Guide is fantastic.

If you're okay with being cryptojacked and like living on the edge, you can also checkout Issue 22. The link to A Guide to Crypto Currencies is also a great guide. 

Big thanks... for reviewing earlier versions of this article: Shea Newkirk (aka The 'Stache), Jascha, Brian D. Colwell, Edmond Chan and Kyle Rea.

Update 12/15/2017: The Sun is plagiarizing this article. Not going to link to it, but you can find it with a quick search. They clearly stole passages from this article.

Update 12/19/2017: This article is included in Decryptionary!! Thanks, Dani.

Update 1/11/2018: We're in Blockchain WTF's intermediate glossary!

Update 1/22/2018: Thanks to David for including this article in Bitcoin Security Tips.

Update 1/24/2018: BlockchainHub included this article. Thanks, Valentin!

About the Author

Ray Li

Ray is a software engineer and data enthusiast who has been blogging for over a decade. He loves to learn, teach and grow. You’ll usually find him wrangling data, programming and lifehacking.

Comments 50

  1. Pingback: Websites in Vancouver and Canada among 1000s cryptocurrency mining through users’ computers | sqwabb

  2. Pingback: Homeless in Vancouver: Canadan websites among thousands mining cryptocurrency via users’ computers | Ethereum Blog

  3. Pingback: Cryptojacking & Crypto-coin miners – PANKOV

  4. Pingback: Bitcoin ya empezó a dar indicios de desinflarse -

  5. Pingback: Tu ordenador puede estar generando Bitcoins - Linux para todos

  6. Hi Ray, thank you for stopping by my site and commenting on my curated list of cryptocurrency words and phrases @ . Cryptojacking is definitely a term that can be included in the list as it has growing relevance to the sector. Although not cryptojacking per se, I have experimented with running in browser mining programs on my website to montize my content using JSEcoin. This in-browser miner did, however, inform my guests that it was in action, but, alas, I decided to withdraw it for a number of reasons. If you readers are interested in my experience of this, they can visit my blog to find out more. Thanks Crypto Coin Dude.

    1. Post

      Thanks for visiting and commenting! 🙂 Your JSEcoin tutorial and review are similar to my experiences as well. I did leave the Coinhive miner on one of my subpages as a proof-of-concept, but I don’t think it provides a good experience for folks visiting a web site.

  7. Pingback: GamerGate Supporters Put Spotlight on ... - DANGEROUS

  8. Pingback: Attenzione ai migliaia di siti infetti dal "cryptojacking" - Il Bitcoin

  9. Pingback: Svenska webbplatser drabbade av kryptokapning | Binero blogg

  10. Pingback: GamerGate Supporters Put Spotlight on ... | Welcome to my Playpen

  11. Pingback: Canadian VersaBank builds Digital Safe to protect cryptocurrencies | Bitzamp

  12. Pingback: Tesla Hit By Cryptojacking | CryptoSlate

  13. Pingback: How You’re Helping Hackers Mine Cryptocurrencies—And… By Oksana Tunikova | Technopreneurph

  14. Pingback: كيف يكسب قراصنة العملات الرقمية الكثير من الأموال من وراء قرصنة هواتفنا الذكية؟ – Bit Chain

  15. Pingback: Was something missing from the Cisco Annual Cybersecurity Report? | Beyond the intersection of business and IT


  17. Pingback: The darkside of Bitcoin and Cryptocurrency – Mytechnoride

  18. Pingback: Malicious Cryptominer in Wireless Networks

  19. Pingback: These are the 6 Ways People can Steal Your Bitcoins

  20. I’ve seen cryptojacking done on streaming sites. If your computer (laptop for instance) starts heating up fast and cannot maintain the website with speed an efficiency (for no apparent reason) there is probably some cryptojacking going on.

    Love your stuff btw, feel free to stop by my site as well for crypto resources. 🙂

    1. Post
      1. Thanks for the forward to the crypto resource, Ray! I just wrote two more articles in my cryptocurrency blog: one about a telegram scam leading to a bigger scam and another was about the future of AI (artificial intelligence) in crypto mining. I think you’d love those maybe. Check em out!


  21. Pingback: Cryptojacking Arises - Anti Phishing Solution and Awareness Education

  22. Pingback: Cryptojacking Versus Google: Verbod Op Mining Chrome Extenties

  23. Pingback: Opera rolls out a new mobile browser for one-handed use - UsamaTech - Startup and Technology News - Mobile Reviews and News

  24. Pingback: Opera rolls out a new mobile browser for one-handed use - Latest technology and Gadgets news

  25. Pingback: Who the Fuck Are These Bitcoin Millionaires, Anyway? - Cryptinfo

  26. Pingback: Apple Changes Guidelines for Cryptocurrency Wallets and More -

  27. Pingback: Cybercriminals Opting for Cryptojacking, Kaspersky Lab reports – Coingale

  28. Pingback: 20 Suspects Arrested In China Against Cryptojacking Case That Affected Over 1 Million Computers - Blockchain Stocks

  29. Pingback: Google joins Apple by Banning Crypto Mining Apps

  30. Pingback: Insider Threats: The Most Common and Damaging Security Risk You Face

  31. Pingback: Key Concerns with Hackers - Washington Insurance Agent Convention & Expo

  32. Pingback: New Post has been published on… – Justin Loop

  33. Pingback: Cyberthreats Your Business Isn’t Prepared For - TechSpective - BusinessTelegraph

  34. Pingback: Cyberthreats Your Business Isn’t Prepared for - ExportHub

  35. Pingback: Cryptojacking- An Emerging Threat in the world of Digital Currencies – MyTechTweaks

  36. Pingback: Cyberthreats Your Business Isn’t Prepared For

  37. Pingback: Colorado Computer Support: How To Enhance Your Computer's Safety | Techno FAQ

  38. Pingback: 6 Ways To Protect Your CCTV System From Hackers | Razberi

  39. Pingback: 6Tips for DIY troubleshooting computer issues - DiscussDesk – Programming Blog on PHP Tutorial, JQuery, Ajax, Online Demo, and Download Code

  40. Pingback: 6 Tips for DIY troubleshooting computer issues –

  41. Pingback: Criminals Hacking CPUs to Mine Cryptocurrencies | Allot Blog

  42. Pingback: Important Cybersecurity 2020 Stats - ON - Belleville

  43. Pingback: Avast Ye Scurvy Dog! How "Crypto Pirates" Are Hijacking Your Browser To Mine Monero - The CryptoStache


  45. Pingback: Votre ordinateur génère peut-être des Bitcoins | TOUSLESPC

  46. Pingback: Debunking dangerous cybersecurity myths for your business

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.