1. CYBER GYAN VIRTUAL INTERNSHIP PROGRAM
Centre for Development of Advanced Computing (CDAC), Noida
Submitted By:
OM JAIN
Project Trainee, (JULY-AUGUST) 2024
2. Evaluation of Anti-Cryptojacking Tools
and Utilities Project
Gain practical experience in cybersecurity by exploring and
evaluating anti-crypto jacking tools and utilities. This project involves
researching and testing various tools designed to detect and prevent
crypto jacking activities, identifying their effectiveness, and
documenting their usage. Participants will focus on understanding
the importance of defending against crypto jacking attacks and
developing strategies to protect organizations from this threat.
3. PROBLEM STATEMENT
• Cryptojacking is a form of cyberattack where unauthorized users exploit
computing resources to mine cryptocurrency without the owner’s consent.
• It not only slows down systems but also increases electricity costs and degrades
hardware performance.
• Evaluating anti-cryptojacking tools and utilities is crucial to identify their
effectiveness in mitigating these threats.
4. TECHNOLOGY/TOOLS TO BE USED
• Virtualization & Testing Environment: Virtual Machines (VMs) ,
Docker Containers
• Anti-Cryptojacking Tools: Browser Extensions, Endpoint Security
Software, Ad Blockers
• Sandboxing Tools: Cuckoo Sandbox, Any.Run
• Network Analysis Tools: Wireshark, NetFlow or nTop
• Automation Tools: Selenium, Python Scripts
• Machine Learning Tools (Optional for Advanced Evaluation):
TensorFlow or Scikit-learn , Jupyter Notebooks
5. ABOUT THE ATTACK/TOPIC/PROBLEM
STATEMENT
Background:
Cryptojacking is an emerging cyber threat where attackers secretly use a victim's computing
resources to mine cryptocurrencies. This unauthorized mining often occurs through malicious
scripts in websites or malware on devices, leading to reduced system performance, increased
energy consumption, and hardware damage. With the rise of cryptocurrency, cryptojacking attacks
have grown significantly, requiring effective countermeasures.
Purpose:
The purpose of this project is to evaluate and analyze the effectiveness of anti-
cryptojacking tools and utilities. By testing these solutions against various cryptojacking
techniques, the project aims to identify the most reliable tools for detecting, blocking, and
mitigating cryptojacking activities. This evaluation will provide recommendations for users
and organizations to safeguard their systems from unauthorized mining activities.
6. WHAT ARE THE REASONS BEHIND THE PROBLEM(TELL ABOUT
THE ISSUES WHY THIS PROBLEM/ATTACKS ARE HAPPENING)
• Rising Value of Cryptocurrencies: As the value of cryptocurrencies (like Bitcoin,
Monero) continues to rise, cybercriminals see cryptojacking as an easy, lucrative way to
profit without investing in hardware.
• Low Technical Barriers: Cryptojacking scripts (e.g., CoinHive) are easily available, making
it simple for attackers to insert them into websites or distribute through malware, requiring
minimal technical expertise.
• Lack of Awareness: Many users and organizations are unaware of cryptojacking, making
their systems vulnerable. Most people don't realize their devices are being hijacked for
mining due to its stealthy nature.
• Ineffective Security Measures: Traditional antivirus and security solutions may not be
equipped to detect cryptojacking scripts, especially browser-based mining, allowing these
threats to bypass detection.
7. SUGGEST SOME POSSIBLE
SOLUTIONS/COUNTERMEASURES
• Use Anti-Cryptojacking Browser Extensions: Tools like No Coin, MinerBlock, or
AdBlock Plus can block malicious mining scripts from running in browsers by filtering
out cryptojacking code.
• Install Robust Endpoint Security Solutions: Use updated antivirus and
antimalware software (e.g., Malwarebytes, Kaspersky, Norton) that includes
cryptojacking protection. These solutions monitor CPU usage and block known mining
scripts or malware.
• Network Traffic Monitoring: Deploy tools like Wireshark, NetFlow, or Cisco
Umbrella to detect unusual outbound traffic, which may indicate cryptojacking activity.
Intrusion Detection Systems (IDS) can also be configured to flag mining traffic.
• Utilize Ad Blockers: Ad blockers like uBlock Origin and AdGuard can prevent
cryptojacking scripts hidden in malicious ads from executing, which is a common
attack vector for browser-based cryptojacking.