SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
CYBER GYAN VIRTUAL INTERNSHIP PROGRAM
Centre for Development of Advanced Computing (CDAC), Noida
Submitted By:
OM JAIN
Project Trainee, (JULY-AUGUST) 2024
Evaluation of Anti-Cryptojacking Tools
and Utilities Project
Gain practical experience in cybersecurity by exploring and
evaluating anti-crypto jacking tools and utilities. This project involves
researching and testing various tools designed to detect and prevent
crypto jacking activities, identifying their effectiveness, and
documenting their usage. Participants will focus on understanding
the importance of defending against crypto jacking attacks and
developing strategies to protect organizations from this threat.
PROBLEM STATEMENT
• Cryptojacking is a form of cyberattack where unauthorized users exploit
computing resources to mine cryptocurrency without the owner’s consent.
• It not only slows down systems but also increases electricity costs and degrades
hardware performance.
• Evaluating anti-cryptojacking tools and utilities is crucial to identify their
effectiveness in mitigating these threats.
TECHNOLOGY/TOOLS TO BE USED
• Virtualization & Testing Environment: Virtual Machines (VMs) ,
Docker Containers
• Anti-Cryptojacking Tools: Browser Extensions, Endpoint Security
Software, Ad Blockers
• Sandboxing Tools: Cuckoo Sandbox, Any.Run
• Network Analysis Tools: Wireshark, NetFlow or nTop
• Automation Tools: Selenium, Python Scripts
• Machine Learning Tools (Optional for Advanced Evaluation):
TensorFlow or Scikit-learn , Jupyter Notebooks
ABOUT THE ATTACK/TOPIC/PROBLEM
STATEMENT
Background:
Cryptojacking is an emerging cyber threat where attackers secretly use a victim's computing
resources to mine cryptocurrencies. This unauthorized mining often occurs through malicious
scripts in websites or malware on devices, leading to reduced system performance, increased
energy consumption, and hardware damage. With the rise of cryptocurrency, cryptojacking attacks
have grown significantly, requiring effective countermeasures.
Purpose:
The purpose of this project is to evaluate and analyze the effectiveness of anti-
cryptojacking tools and utilities. By testing these solutions against various cryptojacking
techniques, the project aims to identify the most reliable tools for detecting, blocking, and
mitigating cryptojacking activities. This evaluation will provide recommendations for users
and organizations to safeguard their systems from unauthorized mining activities.
WHAT ARE THE REASONS BEHIND THE PROBLEM(TELL ABOUT
THE ISSUES WHY THIS PROBLEM/ATTACKS ARE HAPPENING)
• Rising Value of Cryptocurrencies: As the value of cryptocurrencies (like Bitcoin,
Monero) continues to rise, cybercriminals see cryptojacking as an easy, lucrative way to
profit without investing in hardware.
• Low Technical Barriers: Cryptojacking scripts (e.g., CoinHive) are easily available, making
it simple for attackers to insert them into websites or distribute through malware, requiring
minimal technical expertise.
• Lack of Awareness: Many users and organizations are unaware of cryptojacking, making
their systems vulnerable. Most people don't realize their devices are being hijacked for
mining due to its stealthy nature.
• Ineffective Security Measures: Traditional antivirus and security solutions may not be
equipped to detect cryptojacking scripts, especially browser-based mining, allowing these
threats to bypass detection.
SUGGEST SOME POSSIBLE
SOLUTIONS/COUNTERMEASURES
• Use Anti-Cryptojacking Browser Extensions: Tools like No Coin, MinerBlock, or
AdBlock Plus can block malicious mining scripts from running in browsers by filtering
out cryptojacking code.
• Install Robust Endpoint Security Solutions: Use updated antivirus and
antimalware software (e.g., Malwarebytes, Kaspersky, Norton) that includes
cryptojacking protection. These solutions monitor CPU usage and block known mining
scripts or malware.
• Network Traffic Monitoring: Deploy tools like Wireshark, NetFlow, or Cisco
Umbrella to detect unusual outbound traffic, which may indicate cryptojacking activity.
Intrusion Detection Systems (IDS) can also be configured to flag mining traffic.
• Utilize Ad Blockers: Ad blockers like uBlock Origin and AdGuard can prevent
cryptojacking scripts hidden in malicious ads from executing, which is a common
attack vector for browser-based cryptojacking.
THANKYOU

More Related Content

PDF
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
PPTX
The-Evolving-Cybersecurity-Landscape.pptx
PPTX
Cyber Security: Understanding Emerging Threats and Defense Strategies
PPTX
Cyber Security – Emerging Threats and Countermeasures
PDF
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
PDF
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
PDF
Top Cybersecurity Threats Impacting Your Business in 2023
PPTX
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
The-Evolving-Cybersecurity-Landscape.pptx
Cyber Security: Understanding Emerging Threats and Defense Strategies
Cyber Security – Emerging Threats and Countermeasures
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Top Cybersecurity Threats Impacting Your Business in 2023
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY

Similar to cybergyanppt.pptx centre for development of (20)

PDF
Ransomware attack
PPTX
Cybersecurity Basics of awareness presentation .pptx
PDF
The latest trends in cybersecurity and how to protect yourself.pdf
PPTX
Carm presentation new logo may 14
DOCX
Report on Software Vulnerabilities in the financial industry
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPTX
Computing safety
PDF
Top 10 Threats to Cloud Security
PPTX
CyberSecurity3_For_better_Understanding_ofCyberSecurity.pptx
PDF
2024-Cybersecurity-Outlook for all engineering students
PPTX
The Evolution of Cybercrime
PPTX
CyberSecurity Assignment.pptx
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PPTX
Cybersecurity Training For Sales People.pptx
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con
DOCX
56 JULY 2017 WWW.COM.docx
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PPTX
First line of defense for cybersecurity : AI
Ransomware attack
Cybersecurity Basics of awareness presentation .pptx
The latest trends in cybersecurity and how to protect yourself.pdf
Carm presentation new logo may 14
Report on Software Vulnerabilities in the financial industry
Today's Cyber Challenges: Methodology to Secure Your Business
Computing safety
Top 10 Threats to Cloud Security
CyberSecurity3_For_better_Understanding_ofCyberSecurity.pptx
2024-Cybersecurity-Outlook for all engineering students
The Evolution of Cybercrime
CyberSecurity Assignment.pptx
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
Cybersecurity Training For Sales People.pptx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con
56 JULY 2017 WWW.COM.docx
I’ve Been Hacked  The Essential Steps to Take Next
First line of defense for cybersecurity : AI
Ad

Recently uploaded (20)

PDF
CAB UNIT 1 with computer details details
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
PDF
Presented by ATHUL KRISHNA.S_20250813_191657_0000.pdf
PPTX
unit1d-communitypharmacy-240815170017-d032dce8.pptx
PPTX
Clauses_Part1.hshshpjzjxnznxnxnndndndndndndndnndptx
PDF
GENERATOR AND IMPROVED COIL THEREFOR HAVINGELECTRODYNAMIC PROPERTIES
PDF
ISS2022 present sdabhsa hsdhdfahasda ssdsd
PPTX
vortex flow measurement in instrumentation
PPTX
Subordinate_Clauses_BlueGradient_Optimized.pptx
PPTX
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
PPTX
A Clear View_ Interpreting Scope Numbers and Features
PDF
Topic-1-Main-Features-of-Data-Processing.pdf
PDF
Dozuki_Solution-hardware minimalization.
PPTX
AI_ML_Internship_WReport_Template_v2.pptx
PDF
ICT grade for 8. MATATAG curriculum .P2.pdf
PPTX
Growth Capital Investment - Espresso Capital.pptx
PPTX
RTS MASTER DECK_Household Convergence Scorecards. Use this file copy.pptx
PPT
System Unit Components and its Functions
PDF
Printing Presentation to show beginners.
PPTX
ELETRONIC-PRODUCTS-ASSEMBLY-AND-SERVICING-NC-II-WEEK-1-Copy.pptx
CAB UNIT 1 with computer details details
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
Presented by ATHUL KRISHNA.S_20250813_191657_0000.pdf
unit1d-communitypharmacy-240815170017-d032dce8.pptx
Clauses_Part1.hshshpjzjxnznxnxnndndndndndndndnndptx
GENERATOR AND IMPROVED COIL THEREFOR HAVINGELECTRODYNAMIC PROPERTIES
ISS2022 present sdabhsa hsdhdfahasda ssdsd
vortex flow measurement in instrumentation
Subordinate_Clauses_BlueGradient_Optimized.pptx
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
A Clear View_ Interpreting Scope Numbers and Features
Topic-1-Main-Features-of-Data-Processing.pdf
Dozuki_Solution-hardware minimalization.
AI_ML_Internship_WReport_Template_v2.pptx
ICT grade for 8. MATATAG curriculum .P2.pdf
Growth Capital Investment - Espresso Capital.pptx
RTS MASTER DECK_Household Convergence Scorecards. Use this file copy.pptx
System Unit Components and its Functions
Printing Presentation to show beginners.
ELETRONIC-PRODUCTS-ASSEMBLY-AND-SERVICING-NC-II-WEEK-1-Copy.pptx
Ad

cybergyanppt.pptx centre for development of

  • 1. CYBER GYAN VIRTUAL INTERNSHIP PROGRAM Centre for Development of Advanced Computing (CDAC), Noida Submitted By: OM JAIN Project Trainee, (JULY-AUGUST) 2024
  • 2. Evaluation of Anti-Cryptojacking Tools and Utilities Project Gain practical experience in cybersecurity by exploring and evaluating anti-crypto jacking tools and utilities. This project involves researching and testing various tools designed to detect and prevent crypto jacking activities, identifying their effectiveness, and documenting their usage. Participants will focus on understanding the importance of defending against crypto jacking attacks and developing strategies to protect organizations from this threat.
  • 3. PROBLEM STATEMENT • Cryptojacking is a form of cyberattack where unauthorized users exploit computing resources to mine cryptocurrency without the owner’s consent. • It not only slows down systems but also increases electricity costs and degrades hardware performance. • Evaluating anti-cryptojacking tools and utilities is crucial to identify their effectiveness in mitigating these threats.
  • 4. TECHNOLOGY/TOOLS TO BE USED • Virtualization & Testing Environment: Virtual Machines (VMs) , Docker Containers • Anti-Cryptojacking Tools: Browser Extensions, Endpoint Security Software, Ad Blockers • Sandboxing Tools: Cuckoo Sandbox, Any.Run • Network Analysis Tools: Wireshark, NetFlow or nTop • Automation Tools: Selenium, Python Scripts • Machine Learning Tools (Optional for Advanced Evaluation): TensorFlow or Scikit-learn , Jupyter Notebooks
  • 5. ABOUT THE ATTACK/TOPIC/PROBLEM STATEMENT Background: Cryptojacking is an emerging cyber threat where attackers secretly use a victim's computing resources to mine cryptocurrencies. This unauthorized mining often occurs through malicious scripts in websites or malware on devices, leading to reduced system performance, increased energy consumption, and hardware damage. With the rise of cryptocurrency, cryptojacking attacks have grown significantly, requiring effective countermeasures. Purpose: The purpose of this project is to evaluate and analyze the effectiveness of anti- cryptojacking tools and utilities. By testing these solutions against various cryptojacking techniques, the project aims to identify the most reliable tools for detecting, blocking, and mitigating cryptojacking activities. This evaluation will provide recommendations for users and organizations to safeguard their systems from unauthorized mining activities.
  • 6. WHAT ARE THE REASONS BEHIND THE PROBLEM(TELL ABOUT THE ISSUES WHY THIS PROBLEM/ATTACKS ARE HAPPENING) • Rising Value of Cryptocurrencies: As the value of cryptocurrencies (like Bitcoin, Monero) continues to rise, cybercriminals see cryptojacking as an easy, lucrative way to profit without investing in hardware. • Low Technical Barriers: Cryptojacking scripts (e.g., CoinHive) are easily available, making it simple for attackers to insert them into websites or distribute through malware, requiring minimal technical expertise. • Lack of Awareness: Many users and organizations are unaware of cryptojacking, making their systems vulnerable. Most people don't realize their devices are being hijacked for mining due to its stealthy nature. • Ineffective Security Measures: Traditional antivirus and security solutions may not be equipped to detect cryptojacking scripts, especially browser-based mining, allowing these threats to bypass detection.
  • 7. SUGGEST SOME POSSIBLE SOLUTIONS/COUNTERMEASURES • Use Anti-Cryptojacking Browser Extensions: Tools like No Coin, MinerBlock, or AdBlock Plus can block malicious mining scripts from running in browsers by filtering out cryptojacking code. • Install Robust Endpoint Security Solutions: Use updated antivirus and antimalware software (e.g., Malwarebytes, Kaspersky, Norton) that includes cryptojacking protection. These solutions monitor CPU usage and block known mining scripts or malware. • Network Traffic Monitoring: Deploy tools like Wireshark, NetFlow, or Cisco Umbrella to detect unusual outbound traffic, which may indicate cryptojacking activity. Intrusion Detection Systems (IDS) can also be configured to flag mining traffic. • Utilize Ad Blockers: Ad blockers like uBlock Origin and AdGuard can prevent cryptojacking scripts hidden in malicious ads from executing, which is a common attack vector for browser-based cryptojacking.