Sweden Sees Surge of Cybercrime with Crypto-Jacking Cases up 10,000%
- Criminals are switching to hijacking victims' computers to mine cryptocurrency

With the rise of the Blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tampe Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tampe Read this Term technology, we have seen the birth of a new type of cybercrime - crypto-jacking. In Sweden, this new scheme is currently enjoying a worrying growth as more and more electronic devices are getting attacked by hackers, reported TheLocal.se.
According to cybersecurity firm Symantec, the number of cyber security threats, as well as the number of methods to access data illegally, exploit computer power and extort money is steadily increasing.
However, the pace at which this new type of cybercrime is growing is phenomenal. Fueled by the massive growth of Cryptocurrencies Cryptocurrencies By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the netw By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the netw Read this Term since mid-2017, the number of crypto-jacking cases went up by 10,000 percent in the last quarter 2017 – twice the global growth rate for the same period, according to Symantec numbers.
What is crypto-jacking?
Crypto-jacking is basically the process of using the computation power of a person’s device to mine cryptocurrencies without their consent. This is mainly done to mine coins like Monero and Bytecoin, which are more CPU-friendly than major coins like Bitcoin and Ethereum.
“The explosive growth in coin mining was one of the biggest trends on the cyber security threat landscape in 2017,” Symantec said.
A file or script, known as 'coinminer', is used by hackers to mine cryptocurrencies with the victims’ devices. This type of crime is as lucrative as it is hard to detect, as the victim is not enduring any immediate loss and in most cases won't even notice that their computer is being used, other than it feeling slower than usual.
Hackers are even switching from ransom-based malwares like Ransomware to crypto-jacking due to the latter's high risk-reward ratio.
Cyber-criminals are even targeting large enterprise rigs to mine cryptocurrencies, as was the case with the hijacking of Tesla’s cloud environment. Other companies like Aviva and Gemalta have also become victims of such crimes last year.
“Cybercriminals will continue to try and harness more and more of our resources for mining. So while a great portion of these threats are browser-based, hijacking PCs, Macs and smartphones, attackers are moving to obtain more processing power to drive greater profit,” Symantec’s director of Security Response Kevin Haley told The Verge.
With the rise of the Blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tampe Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tampe Read this Term technology, we have seen the birth of a new type of cybercrime - crypto-jacking. In Sweden, this new scheme is currently enjoying a worrying growth as more and more electronic devices are getting attacked by hackers, reported TheLocal.se.
According to cybersecurity firm Symantec, the number of cyber security threats, as well as the number of methods to access data illegally, exploit computer power and extort money is steadily increasing.
However, the pace at which this new type of cybercrime is growing is phenomenal. Fueled by the massive growth of Cryptocurrencies Cryptocurrencies By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the netw By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the netw Read this Term since mid-2017, the number of crypto-jacking cases went up by 10,000 percent in the last quarter 2017 – twice the global growth rate for the same period, according to Symantec numbers.
What is crypto-jacking?
Crypto-jacking is basically the process of using the computation power of a person’s device to mine cryptocurrencies without their consent. This is mainly done to mine coins like Monero and Bytecoin, which are more CPU-friendly than major coins like Bitcoin and Ethereum.
“The explosive growth in coin mining was one of the biggest trends on the cyber security threat landscape in 2017,” Symantec said.
A file or script, known as 'coinminer', is used by hackers to mine cryptocurrencies with the victims’ devices. This type of crime is as lucrative as it is hard to detect, as the victim is not enduring any immediate loss and in most cases won't even notice that their computer is being used, other than it feeling slower than usual.
Hackers are even switching from ransom-based malwares like Ransomware to crypto-jacking due to the latter's high risk-reward ratio.
Cyber-criminals are even targeting large enterprise rigs to mine cryptocurrencies, as was the case with the hijacking of Tesla’s cloud environment. Other companies like Aviva and Gemalta have also become victims of such crimes last year.
“Cybercriminals will continue to try and harness more and more of our resources for mining. So while a great portion of these threats are browser-based, hijacking PCs, Macs and smartphones, attackers are moving to obtain more processing power to drive greater profit,” Symantec’s director of Security Response Kevin Haley told The Verge.