skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Ovum view


Mining cryptocurrency can be big business, with organizations and individuals alike mining cryptocurrency to generate income. The processing power needed to mine cryptocurrencies has resulted in a new kind of threat known as cryptojacking, which illicitly uses as much of a device’s CPU as it can muster. The past few months have seen a huge rise in cryptojacking, yet many organizations are unaware of it and what it can do. Preventive measures include awareness (for the service desk), education (around phishing, for users), and technology deployments.

Cryptojacking is a recently emerged threat that needs to be addressed

Mining cryptocurrency takes a significant amount of computing power, more than individual computers can provide. If an individual or organization decides to pursue this way of making money, significant investment is required into the computing power needed, as well as the cost of the electricity to run the computers.

Some organizations have chosen to use crypto mining as a replacement for ad revenue. Entirely above board, users can make a choice to accept that website using their computer to mine cryptocurrency for the period that the individual is on their website.

However, the new threat on the block, cryptojacking, which often uses botnets, takes over other computers (without the user’s knowledge or consent) to harness computing power in the quest for cryptocurrency, using methods including a phishing link in an email, content in a browser, or online advertisements. According to the Internet Security Threat Report (ISTR) from Symantec, cryptojacking attacks went up by 8,500% in 2017, with the vast majority of the increase taking place in the final quarter of the year when the value of many publicly traded cryptocurrencies soared.

Users might notice their computer running more slowly than usual, but other than that may be unaware that their machine has been cryptojacked and is being used to mine cryptocurrency. Yet, it still costs organizations and individuals in productivity and computing power.

Having only fairly recently emerged as a threat, defending against cryptojacking first requires that those charged with protecting an organization’s information and systems know about it and the effects on processing power. When users contact a helpdesk with a problem that includes a slow-running computer, cryptojacking can then be included in the analysis of the machine.

Installing preventive measures such as ad blockers and anti-cryptomining extensions can contribute to protecting the organization. Ad blockers have a well-known downside, in that some websites can prove more difficult to navigate, and specific websites may need pop-ups-enabling (a time-consuming exercise for the service desk or user). Anti-cryptomining extensions can also be used to pick up both authorized and unauthorized cryptomining on a machine.

As with most threats, organizations need to protect in layers: awareness and education (covering people and process) supplemented by technological controls.

A version of this article was originally produced for Computer Weekly in April 2018.


Further reading

ICT Enterprise Insights 2017/18 – Global: ICT Drivers and Technology Priorities, PT0099-000002 (September 2017)


Maxine Holt, Research Director, Infrastructure Solutions

Recommended Articles

  • Service Provider Markets, Consumer & Entertainment Services,...

    MWC 2018 Highlights

    By Ronan De Renesse 27 Feb 2018

    Over 20 of our senior Ovum analysts and consultants attended this year’s Mobile World Congress in Barcelona at the end of February. In between meetings, briefings and presentations, our analyst team were blogging and tweeting about key developments, trends and rumors. Have a look through our daily MWC 2018 Highlights to find out what happened.

    Topics 5G AI IoT Cloud Payments SDN/NFV Smart home

  • Enterprise Decision Maker, Enterprise IT Strategy and Select...

    2017 Trends to Watch: Big Data

    By Tony Baer 21 Nov 2016

    The breakout use case for big data will be fast data. The Internet of Things (IoT) is increasing the urgency for enterprises to embrace real-time streaming analytics, as use cases from mobile devices and sensors become compelling to a wide range of industry sectors.

    Topics Big data and analytics IoT

  • Consumer & Entertainment Services

    US pay TV: Is it facing an existential threat?

    By Adam Thomas 28 Mar 2018

    With US pay TV having endured the worst year in its history, thoughts have inevitably turned to the future. The likelihood remains that the immediate future will remain highly uncomfortable for everyone except the scaled multinational digital platforms.


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700

Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

+44 (0) 207 551 9047 - Operational from 09.00 - 17.00 UK time

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 7770704398 or email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now