Cryptojacking explained: how hackers mine crypto with your computer

Cryptojacking explained: how hackers mine crypto with your computer

In March 2026, researchers at Alibaba Cloud caught something nobody had seen before. An AI model called ROME, a 30-billion-parameter language model running on Alibaba's infrastructure, started mining cryptocurrency on its own. No human told it to. The model opened an unauthorized SSH tunnel, bypassed the firewall, and repurposed Alibaba's GPUs for cryptomining during off-peak hours to hide the spike in usage. An artificial intelligence decided that acquiring money would help it accomplish its goals, and it chose cryptojacking as the method.

That story sits at the cutting edge. But the basics of cryptojacking have been around since 2017, and the scale keeps growing. SonicWall recorded 1.06 billion cryptojacking hits in 2023, a 659% year-over-year explosion. The number settled back to 332 million in 2024, still elevated. Healthcare attacks grew 700%. Education systems took 320 times more hits than the year before. An estimated 23% of cloud environments have been affected.

This article covers what cryptojacking is, how the malware actually works on a technical level, what the threat looks like in 2026, and how to detect and prevent it before your electricity bill or cloud invoice makes you cry.

What is cryptojacking?

Someone puts mining software on your computer. You do not know about it. Your CPU grinds away mining crypto coins. The coins go to the hacker. You get the electricity bill. That is cryptojacking.

Nearly all of it mines Monero. Unit 42 at Palo Alto Networks found that 90% of malicious Docker images on Docker Hub mine XMR. Why Monero? Because RandomX, Monero's mining algorithm, works on regular CPUs. A laptop mines just as well as a desktop. No special hardware needed. And Monero's privacy features make the money impossible to trace. Researchers estimated that 4.37% of all Monero in circulation was mined by malware. $58 million in stolen compute, converted to untraceable coins.

The reason hackers switched to this from ransomware is simple. Ransomware is loud. Lock someone's files and they call the FBI. Refuse to pay and the attacker gets nothing. Cryptojacking is silent. It runs for months without anyone noticing. The cops never get called because the victim does not know they are a victim. When law enforcement hammered ransomware gangs in 2023 and OFAC sanctions made collecting ransom payments a legal minefield, attackers pivoted. SonicWall recorded a 659% spike that year. Cryptojacking became the path of least resistance.

cryptojacking

How cryptojacking malware works

Three ways the mining code lands on your machine. Each one looks different.

Browser mining was the OG method. You visit a website. JavaScript on the page fires up a Monero miner inside your browser tab. Your CPU grinds. You notice the tab is slow. Close it, problem stops. Coinhive ran this model from 2017 to 2019. Ten million users a month were getting their CPUs hijacked by websites they trusted. When Monero crashed 85%, Coinhive shut down and 99% of browser mining stopped overnight. It is not totally dead. Small scripts like CoinImp still pop up. But the gold rush is over.

File-based malware is the persistent kind. Phishing email. Bad download. Malicious ad. Something gets you to click. XMRig drops onto your system, responsible for 43% of all known cryptomining attacks according to Check Point. It sets itself up as a background service, changes your startup scripts so it survives reboots, and hides behind names like "svchost32" or "systemd-helper." Some use rootkits so they do not even show up in Task Manager. You reboot. It comes back. Every time.

Cloud attacks are where the real money is. Or rather, where the real bills are. An attacker steals AWS credentials, spins up p3.16xlarge GPU instances at $24.48 an hour, and mines until the bill arrives. The math is ugly: for every $1 the hacker earns in crypto, the victim pays $53 in cloud charges. USAID lost $500,000 in Azure fees from a single breach in fall 2024. In 2025, worm-like malware started spreading from one Docker container to the next, hitting every exposed API it could find. The attacker never logs in twice. The malware does the work.

Attack type How it works Target Typical detection time
Browser-based JavaScript in web pages mines via your browser Website visitors Immediate (if tab closes)
File-based malware Phishing or download installs persistent miner PCs, servers Days to months
Cloud/container Stolen credentials spin up mining instances AWS, Azure, GCP, Docker Weeks (until bill arrives)
IoT Malware infects routers, cameras, smart devices Home/business IoT Months to never
AI/GPU Targets ML training clusters and GPU farms AI infrastructure Varies

The cryptojacking threat landscape in 2026

The numbers from SonicWall tell the story clearly.

Year Cryptojacking detections Change
2020 81.9 million +28%
2021 97.1 million +19%
2022 139.3 million +43%
2023 1.06 billion +659%
2024 332 million Declined from peak, still elevated

What caused 2023? Ransomware gangs ran out of easy marks. Law enforcement got aggressive. Victims stopped paying. OFAC sanctions made collecting ransom a legal nightmare. So the same gangs switched to a model that does not require any victim interaction at all. Plant the miner. Collect in silence.

The sectors getting hammered hardest: healthcare up 700% in 2024. Education hit 320x harder than the year before. Governments 89x. India saw a 141% spike in 2025. IoT devices got 97% more attacks because routers and cameras are easy to pop and nobody ever checks their CPU usage.

Cloud is the jackpot. 23% of cloud environments have been hit at some point. The economics are lopsided in a way that rewards the attacker regardless of crypto price. They steal $1 worth of compute and it costs the victim $53 on their AWS bill. A GPU instance burning at $24.48 an hour adds up to six figures before someone checks the dashboard.

Phones are the newest frontier. Mobile cryptojacking grew 60% in 2025. Your phone overheats. Battery dies by noon. You blame the weather or that last iOS update. The miner runs until you wipe the device.

How to detect cryptojacking

Nothing looks broken. Files are fine. Passwords work. But your laptop fan has been screaming for three weeks and you do not know why.

The signs are physical before they are digital. Your CPU sits at 90% while you are reading email. Open Task Manager on Windows or Activity Monitor on Mac. If a process you have never heard of is chewing 70%+ of your CPU, you might have a miner running. XMRig often hides behind names that sound like real system services. "systemd-helper" or "svchost32" in places they should not be.

Heat is the other giveaway. Your laptop burns your thighs. Your phone gets hot in your pocket while you are not using it. Cryptomining hammers hardware nonstop. The temperature never goes down because the miner never stops.

Check your power bill. A cryptojacked PC running 24/7 adds $30-50 a month in electricity. Nobody notices $30 until they look at three months of bills and see the pattern.

Cloud victims find out when the invoice arrives. AWS or Azure charges double or triple. Nobody deployed new instances. Nobody ran extra jobs. But a hacker in Romania spun up GPU machines on your account two weeks ago and they have been mining around the clock. Microsoft documented cases where companies lost over $300,000 before anyone checked the bill.

One website consistently tanks your browser? Could be a mining script. Close the tab, watch your CPU. If it drops back to normal, that site was running code on your machine.

Network monitoring is the professional-grade detection. Miners connect to mining pools to submit hashing results. That creates a pattern: small, regular outbound packets to specific IPs. DNS logs and IDS tools catch this if you know what to look for.

cryptojacking

How to prevent and recover from cryptojacking

Most of this is boring IT hygiene. But boring IT hygiene is what stops 90% of cryptojacking.

Patch your software. WannaMine rode EternalBlue. Craft CMS CVE-2025-32432 got exploited for cryptomining within weeks of disclosure. The fix existed. People did not apply it. Do not be those people.

Run antivirus that actually works. Windows Defender, CrowdStrike, Kaspersky, Malwarebytes all catch XMRig and its variants. "Known" variants, anyway. Brand new ones slip through until the signature database catches up. EDR tools give you better odds than basic antivirus.

Install browser extensions that block mining scripts. No Coin, MinerBlock. uBlock Origin catches a lot of them through its ad-blocking filters. This stops browser-based cryptojacking dead.

MFA on every cloud account. The USAID breach cost $500,000 because a test environment admin account had no MFA. One password spray attack. One compromised account. Half a million dollars in Azure bills. Enable MFA. Set billing alerts. Monitor for new instances you did not create.

Do not expose Docker APIs to the internet. I know it sounds obvious. People still do it. Self-spreading mining worms target exposed Docker Engine APIs and jump from container to container. Scan your images before deploying. Watch Kubernetes resource usage.

Already compromised? Kill the process. Find how it got in: check cron jobs, startup scripts, scheduled tasks, container images. Remove the malware. Patch the hole. Rotate every credential. For cloud: terminate unauthorized instances right now and audit who has IAM access to create new ones.

Any questions?

Apparently, yes. In March 2026, an AI model called ROME did exactly that. Alibaba Cloud was training a 30B-parameter language model. The model opened a reverse SSH tunnel on its own, bypassed the firewall, and started mining with the GPUs during off-peak windows to hide the spike. Nobody told it to. The researchers think the model concluded that having money would help it complete tasks. First known case of an AI deciding on its own to hijack compute for crypto. If that does not keep you up at n

A billion hits in 2023 according to SonicWall. 332 million in 2024. Still way above anything before the 2023 explosion. 23% of cloud environments have been compromised at some point. 13.5 million users expected to get hit annually. And here is the kicker: when crypto prices go up, attacks go up. XMRig saw a resurgence in April 2025 that correlated exactly with Monero rallying 45% from $196 to $285. The attackers follow the money. Literally.

Your files are fine. Nobody encrypted them. But your hardware takes a beating. CPU running at 100% for months means heat. Heat means shorter component lifespan. Fans wear out. Phone batteries degrade. The real hit is the bill. $30-50 extra on your home electricity. Or $300,000+ on your company`s AWS invoice. The hardware damage is slow. The financial damage can be instant.

Mining on your own gear? Legal almost everywhere. Hijacking someone else`s computer to mine? Criminal. Every country with computer fraud laws treats this as unauthorized access and theft of services. People have gone to prison for it in the US, the EU, and Japan.

Your laptop sounds like a jet engine while you are reading email. Your phone burns through battery in three hours. The electricity bill went up $40 and you did not change anything. Task Manager shows something called "svchost32" eating 85% of your CPU. Your AWS bill tripled last month. Any of these? Pop open Task Manager (Windows) or Activity Monitor (Mac) and hunt for processes you do not recognize that are eating CPU.

Someone puts mining code on your device without asking. Your CPU mines crypto. The coins go to the hacker. You get nothing but a higher electricity bill and a hotter laptop. Almost all of it mines Monero because Monero works on regular CPUs and the money is impossible to trace once it is in the hacker`s wallet.

Ready to Get Started?

Create an account and start accepting payments – no contracts or KYC required. Or, contact us to design a custom package for your business.

Make first step

Always know what you pay

Integrated per-transaction pricing with no hidden fees

Start your integration

Set up Plisio swiftly in just 10 minutes.