Back to blog
Crypto Basics

What is Cryptojacking? - A Comprehensive Guide

Learn everything about cryptojacking in this comprehensive guide. Understand what it is and how to protect yourself from this cybersecurity threat.
S. Vishwa
9 Minutes
Want Smarter Crypto Picks—Free?
See unbiased Token Metrics Ratings for BTC, ETH, and top alts.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
 No credit card | 1-click unsubscribe

In today's digital age, cybercriminals are constantly coming up with new ways to exploit unsuspecting victims. One such method is cryptojacking, a type of cybercrime that involves the unauthorized use of people's devices for cryptocurrency mining. 

In this comprehensive guide, we will learn everything about cryptojacking, exploring what it is, how it works, and how you can protect yourself from falling victim to this insidious threat.

What is Cryptojacking?

Before we delve into the intricacies of cryptojacking, it is essential to have a basic understanding of cryptocurrency. 

Cryptocurrency refers to digital or virtual money that takes the form of tokens or "coins." While Bitcoin is the most well-known cryptocurrency, there are approximately 3,000 other forms in circulation.

These digital currencies operate using a distributed database called the blockchain, which records all transactions and ensures their integrity.

The Role of Miners - To produce new blocks in the blockchain, cryptocurrencies rely on individuals known as miners. These miners provide computing power to solve complex mathematical problems, for which they are rewarded with cryptocurrency. 

In the case of larger cryptocurrencies like Bitcoin, dedicated computer rigs are used to complete these calculations, consuming a significant amount of electricity.

The Rise and Fall of Cryptojacking - Cryptojacking emerged as a response to the high costs associated with traditional cryptocurrency mining. 

By surreptitiously using other people's devices, cybercriminals can mine for cryptocurrency without the need for expensive hardware or the burden of electricity bills. The cryptocurrency of choice for cryptojackers is often Monero due to its difficulty to trace.

However, cryptojacking has faced challenges in recent years. Law enforcement crackdowns and the shutdown of prominent cryptojacking platforms like Coinhive have had a dampening effect on this form of cybercrime. 

Coinhive, a site that provided JavaScript code for website owners to mine Monero using their visitors' devices, was widely abused by hackers and ultimately shut down in 2019.

How Does Cryptojacking Work?

Methods of Infection - Cybercriminals employ various methods to infect devices and initiate cryptojacking. 

One common approach is through malicious links embedded in phishing emails, which load crypto mining code onto the victim's computer upon clicking. 

Another method involves injecting JavaScript code into websites or online ads, which automatically executes when the victim's browser loads the content.

Cryptojacking
Image Source - https://www.imperva.com/learn/application-security/cryptojacking/

The Impact on Performance - Cryptojacking scripts do not directly damage computers or steal data. Instead, they exploit the device's processing power to mine cryptocurrency, resulting in decreased performance. 

Victims may experience slower system speed, frequent crashes, and shorter battery life. In business settings, the collective impact of cryptojacked systems can lead to increased IT costs and electricity consumption.

The Spread of Cryptojacking - Some cryptojacking scripts possess worming capabilities, allowing them to infect other devices and servers on a network. This makes them harder to detect and remove. 

Additionally, some websites may request users' permission to mine cryptocurrency while on their site, positioning it as a fair exchange for free content. 

However, malicious cryptojacking scripts continue to run even after the user leaves the initial site, often remaining hidden in the background.

How to Detect Cryptojacking?

Signs of Infection - Detecting cryptojacking can be challenging, as the process is often hidden or disguised as a legitimate activity on the victim's device. 

However, there are several signs to watch out for. Decreased performance, such as slow system speed and frequent crashes, is a common indicator. Overheating devices, noticeable through an unusually fast-running fan, can also suggest the presence of cryptojacking scripts. 

Monitoring CPU usage, especially during periods of low media content, can reveal spikes that may be attributed to cryptojacking activities.

Monitoring CPU Usage - A useful method for detecting cryptojacking is to monitor CPU usage using system tools like the Activity Monitor or Task Manager. 

Unusually high CPU usage when no resource-intensive tasks are being performed can indicate the presence of cryptojacking scripts. 

However, it's important to note that some scripts may attempt to disguise themselves or mask their activities as legitimate processes, making detection more challenging.

The Importance of Vigilance - Being vigilant and proactive is crucial in the fight against cryptojacking. Regularly monitoring your device's performance, staying informed about the latest cybersecurity trends, and investing in comprehensive cybersecurity solutions can help detect and prevent cryptojacking attacks.

How to Protect Yourself from Cryptojacking?

Invest in Comprehensive Cybersecurity - To protect yourself from cryptojacking and other cyber threats, it is essential to invest in comprehensive cybersecurity solutions. Cybersecurity provider can help detect and mitigate the risks associated with cryptojacking. 

Additionally, keeping your operating system and applications up to date with the latest software updates and patches is crucial.

Stay Informed About Latest Trends - Cybercriminals are constantly evolving their techniques, including the methods they use for cryptojacking. 

Staying informed about the latest trends and developments in cybersecurity can help you detect and protect against emerging threats.

Utilize Browser Extensions - Browser extensions designed to block cryptojacking scripts can be an effective defense against this form of cybercrime. Extensions like minerBlock, No Coin, and Anti Miner can help prevent cryptojacking activities when browsing the web.

Leverage Ad Blockers - Since cryptojacking scripts are often delivered through online ads, installing an ad blocker can be an additional layer of protection. 

Ad Blocker Plus is a popular ad-blocking tool that can detect and block malicious cryptojacking code.

Disabling JavaScript - Disabling JavaScript in your browser settings can prevent cryptojacking code from executing on your device. 

However, it's important to note that disabling JavaScript may also affect the functionality of certain websites and services, so exercise caution when employing this method.

Blocking Known Cryptojacking Pages - To further protect yourself from cryptojacking, you can create a whitelist of trusted websites and block known cryptojacking pages. This approach ensures that only verified websites are allowed, reducing the risk of encountering cryptojacking scripts.

Examples of Cryptojacking Attacks

Cryptojacking attacks have been observed in various contexts, targeting both individual users and organizations. Here are some notable examples:

App Store Exploitation - In 2019, several apps were discovered in the Microsoft Store that secretly mined cryptocurrency using the resources of unsuspecting users. 

These apps were downloaded by users who encountered them through keyword searches or on lists of top free apps. 

Upon launching the apps, users unknowingly downloaded cryptojacking JavaScript code, resulting in significant resource consumption and slower device performance.

Compromised Websites - In 2018, the Los Angeles Times' Homicide Report page was found to have embedded cryptojacking code. 

Visitors to the page had their devices used to mine the cryptocurrency Monero. The minimal impact on device performance made it difficult to detect the presence of the cryptojacking script.

Industrial Control System Attack - Also in 2018, a European water utility control system fell victim to a cryptojacking attack. 

The operational technology network of the utility plant was targeted, severely impacting the plant's management capabilities.

This incident marked the first known instance of a cryptojacking attack against an industrial control system.

YouTube Ads and Router Infections - Cryptojackers have even utilized platforms like YouTube and infected routers to carry out their activities. 

In early 2018, the CoinHive miner was found running on YouTube ads through Google's DoubleClick platform. 

Additionally, a massive cryptojacking attack infected over 200,000 MikroTik routers in Brazil during July and August of the same year, injecting CoinHive code into a significant amount of web traffic.

Legal and Ethical Implications of Cryptojacking

The Motive Behind Cryptojacking - The primary motivation behind cryptojacking is financial gain. Mining cryptocurrencies can be highly profitable, but the costs associated with traditional mining methods often limit the potential for profit. 

Cryptojacking provides an illicit yet cost-effective way for cybercriminals to mine valuable coins without incurring significant expenses.

The Victim's Perspective - From the victim's perspective, cryptojacking represents a violation of privacy and the unauthorized use of computing resources. 

While the direct impact may seem minimal, the cumulative effect of multiple cryptojacked systems can result in real costs for businesses and individuals.

Cybersecurity and the Fight Against Cryptojacking

The fight against cryptojacking relies on robust cybersecurity measures and the commitment of individuals, businesses, and law enforcement agencies. 

By investing in comprehensive cybersecurity solutions, staying informed about emerging threats, and adopting preventive measures, we can collectively combat the menace of cryptojacking.

Frequently Asked Questions

Q1. What types of devices are most vulnerable to cryptojacking?

Any device with internet access can potentially fall victim to cryptojacking. However, the more powerful the device (like high-performance PCs), the more attractive it is for cryptojackers.

Q2. Why is cryptojacking seen as an easier way for criminals to make money compared to other forms of cybercrime?

Cryptojacking often goes unnoticed for a long time compared to other cybercrimes like hacking or ransomware. Thus, it allows cybercriminals to continuously earn money with less risk of being detected and stopped.

Q3. Can cryptojacking affect mobile devices like smartphones and tablets?

Yes, any device with processing power and an internet connection can be a target for cryptojacking, including smartphones and tablets.

Q4. If a device is infected, is there a way to trace the mined cryptocurrency back to the cryptojacker?

Tracing the mined cryptocurrency to its source can be challenging due to the anonymity features in cryptocurrencies like Monero, which are commonly used in cryptojacking.

Q5. How does cryptojacking affect businesses differently than individual users?

For businesses, the cumulative impact of many cryptojacked systems can lead to increased IT costs, electricity consumption, and potentially compromised business operations.

Q6. What can be done if my device has already been infected with a cryptojacking script?

In case of an infection, users should run a reputable antivirus or anti-malware software that can detect and remove the script. 

It's also important to update all software and operating systems to their latest versions as updates often contain security fixes.

Q7. Are there any legal consequences for those who are caught cryptojacking?

Cryptojacking is illegal and those caught engaging in this activity can face serious legal repercussions, including fines and imprisonment.

Conclusion

Cryptojacking is a form of cybercrime that exploits the computing resources of unsuspecting victims for cryptocurrency mining. 

By understanding how cryptojacking works and implementing effective protective measures, we can safeguard ourselves and our devices against this insidious threat.

Through comprehensive cybersecurity, vigilance, and staying informed about the latest trends, we can play an active role in combating cryptojacking and ensuring a secure digital environment for all.

Disclaimer

The information provided on this website does not constitute investment advice, financial advice, trading advice, or any other sort of advice and you should not treat any of the website's content as such.

Token Metrics does not recommend that any cryptocurrency should be bought, sold, or held by you. Do conduct your own due diligence and consult your financial advisor before making any investment decisions.

Build Smarter Crypto Apps &
AI Agents in Minutes, Not Months
Real-time prices, trading signals, and on-chain insights all from one powerful API.
Grab a Free API Key
About Token Metrics
Token Metrics: AI-powered crypto research and ratings platform. We help investors make smarter decisions with unbiased Token Metrics Ratings, on-chain analytics, and editor-curated “Top 10” guides. Our platform distills thousands of data points into clear scores, trends, and alerts you can act on.
30 Employees
analysts, data scientists, and crypto engineers
Daily Briefings
concise market insights and “Top Picks”
Transparent & Compliant
Sponsored ≠ Ratings; research remains independent
Want Smarter Crypto Picks—Free?
See unbiased Token Metrics Ratings for BTC, ETH, and top alts.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
 No credit card | 1-click unsubscribe
Token Metrics Team
Token Metrics Team

Recent Posts

Research

What Is a Crypto Index? Why Weekly Rebalancing Matters (2025)

Token Metrics Team
4

Understanding how to efficiently manage exposure in the dynamic world of cryptocurrency can seem daunting. Crypto indices provide a structured approach, helping investors and traders maintain diversified exposure without constant oversight. This article explores what crypto indices are, how they work, and why their rebalancing strategies are crucial in 2025.

What Is a Crypto Index?

A crypto index is a rules-based basket of digital assets that tracks a specific set of cryptocurrencies, such as the top-100 by market capitalization. These indices are designed to reflect broad market trends while reducing the complexity of individual asset management. They typically rebalance periodically to maintain consistent exposure, adapting to market fluctuations over time.

How Crypto Indices Work

The core mechanism involves a few key processes:

Benefits of Using Crypto Indices

Crypto indices offer several advantages:

How to Get Early Access to a Crypto Index

Investors interested in accessing crypto indices can follow a straightforward process:

Decision Guide: Is This for You?

Crypto indices may suit different kinds of investors:

Understanding your trading style and risk appetite can help determine if a crypto index fits within your broader strategy.

Discover Crypto Gems with Token Metrics AI

Get Started For Free

FAQs

What is a crypto index?

A crypto index is a rules-based basket that tracks a defined set of assets (e.g., the top-100 by market cap), with a scheduled rebalance to keep exposure aligned. Token Metrics applies that idea and adds a regime switch to stablecoins.

How often does TM Global 100 rebalance?

Weekly. Constituents and weights update on schedule; if the market regime changes, the portfolio can switch between tokens and stablecoins outside that cadence.

What triggers the move to stablecoins?

A proprietary market signal. Bullish: hold the top-100 basket. Bearish: exit to stablecoins and wait for a re-entry signal.

Can I fund with USDC or fiat?

At launch, funding options including wallet-funding supported by the embedded smart wallet and supported chains; USDC payouts are available when selling. Details are available during the buy/sell process.

Is the wallet custodial?

No. The embedded wallet is self-custodial—you control your funds and keys.

How are fees shown?

Before confirming, you'll see estimated gas costs, platform fees, max slippage, and minimum expected value.

How do I join the waitlist?

Visit the Token Metrics indices hub, open TM Global 100, and tap “Join Waitlist.” We will notify you once trading opens.

Security, Risk & Transparency

Self-custody: Embedded smart wallet with user-controlled keys. Transparency: Clear rules, holdings Treemap, and transactions logs. Fees: Shown before confirmation. Limitations: Signals can be wrong, no performance guarantees. Availability may vary by region and device.

Disclaimer

Crypto is volatile and can lose value. Past performance does not predict future results. This article is for research and educational purposes only, not financial advice.

Research

Predictable Crypto: The Index That Moves to Stablecoins When It Should (2025)

Token Metrics Team
4

If you’ve ever wished for a crypto index that participates broadly in bull markets yet steps aside when risk turns south, this is it. Token Metrics Global 100 is a rules-based index that holds the top 100 crypto assets when our market signal is bullish—and moves fully to stablecoins when it isn’t. It rebalances weekly, shows transparent holdings and transaction logs, and can be purchased in one click with an embedded wallet. That’s disciplined exposure, minus the micromanagement. → Join the waitlist to be first to trade TM Global 100.

Why Indices Matters in October 2025

Two things define this cycle: speed and uncertainty. Narratives rotate in weeks, not months, and individual-coin risk can swamp portfolios. Indices let you own the market when conditions warrant, while a regime-switching approach aims to sidestep drawdowns by cutting risk to stablecoins. (A crypto index is a rules-based basket tracking a defined universe—here, a top-100 market-cap set—with scheduled rebalances.)

How the TM Global 100 Index Works

Regime switching: Bull: hold the top 100 by market cap. Bear: move fully to stablecoins, wait for a bullish re-entry signal.

Weekly rebalancing: Updates weights and constituents to reflect the current top-100 list.

Transparency: A Strategy modal explains rules; a Gauge shows the live market signal; Holdings appear in Treemap + Table; and every rebalance/transaction is logged.

What you’ll see on launch: Price tile • “100 tokens” • “rebalances weekly” • one-click Buy Index flow. → See the strategy and rules. (TM Global 100 strategy)

Benefits at a Glance (Why This Beats DIY)

Time back: No more tracking 100 tickers or manual reweights. The weekly job runs for you.

Discipline on drawdowns: The stablecoin switch enforces risk management when the signal turns.

Less execution drag: One embedded wallet checkout vs. dozens of small trades that add slippage and fees.

See everything: Gauge → Treemap → Transactions Log—know what you hold, and what changed.

Own the market when it’s worth it: Capture broad upside in bullish regimes with top-100 breadth.

Step-by-Step: How to Get Early Access (Waitlist)

Open the Token Metrics Indices hub.

Tap TM Global 100 and select Join Waitlist.

(Optional) Connect wallet to preview the one-click Buy flow and funding options.

On launch, you’ll receive an email and in-app prompt.

Click Buy Index → review fees/slippage/holdings → confirm. Most users finish in ~90 seconds.

Track your position under My Indices with real-time P&L and a full transactions history. → Join the waitlist to be first to trade TM Global 100.

Decision Guide: Is This Right for You?

  • Hands-Off Allocator: Want broad exposure without micromanaging? Consider TM Global 100 for rules-based coverage.
  • Active Trader: Prefer a disciplined core that exits to stables while you run satellite bets.
  • TM Member/Prospect: Already read our research? This turns it into an actionable, one-click index.
  • New to On-Chain: Embedded wallet + clear fees and logs lower the operational lift.
  • Skeptical of Black Boxes: Full strategy copy, holdings, and rebalance logs are visible—no mystery knobs.

FAQs

What is a “crypto index”?

A rules-based basket that tracks a defined universe (here: top-100 market cap), with scheduled rebalances and clear inclusion criteria.

How often does the index rebalance?

Weekly, with additional full-portfolio switches when the market regime changes.

What triggers the move to stablecoins?

A proprietary market signal. Bullish: hold top-100. Bearish: move fully to stablecoins until re-entry.

Can I fund with USDC or fiat?

You’ll use the embedded wallet and supported on-chain assets; USDC is supported for selling. Funding options surface based on chain/wallet at checkout.

Is the wallet custodial?

No. It’s an embedded, self-custodial smart wallet—you control funds.

How are fees shown?

At checkout, you’ll see estimated gas, platform fee, max slippage, and minimum expected value before confirming.

How do I join the waitlist?

Visit the Indices hub, open TM Global 100, and tap Join Waitlist; we’ll notify you at launch.

Security, Risk & Transparency

Self-custody: Embedded smart wallet; you hold keys.

Operational clarity: Strategy modal, Holdings treemap/table, and Transactions log.

Fee & slippage preview: All shown before you confirm.

Regime logic limits: Signals can be wrong; switching can incur spreads and gas.

Region notes: Chain and asset support may vary by user wallet and jurisdiction.

Crypto is volatile and can lose value. Past performance is not indicative of future results. This article is for research/education, not financial advice.

Conclusion

If you want broad upside when it’s worth it and stablecoins when it’s not—with weekly rebalances, transparent logs, and a 90-second buy flow—Token Metrics Global 100 was built for you. Join the waitlist now and be first to trade at launch.

Research

How Do People Research Tokens and Coins Before Buying? A Complete Guide

Talha Ahmad
5 min

The cryptocurrency market has evolved from a niche digital experiment into a multi-trillion-dollar asset class. With thousands of tokens and coins available across hundreds of exchanges, the question isn't whether you should research before buying—it's how to conduct that research effectively. Smart investors know that thorough due diligence is the difference between identifying the next promising project and falling victim to a costly mistake.

The Foundation: Understanding What You're Buying

Before diving into specific research methods, successful crypto investors start by understanding the fundamental difference between various digital assets. Bitcoin operates as digital gold and a store of value, while Ethereum functions as a programmable blockchain platform. Other tokens serve specific purposes within their ecosystems—governance rights, utility functions, or revenue-sharing mechanisms.

The first step in any research process involves reading the project's whitepaper. This technical document outlines the problem the project aims to solve, its proposed solution, tokenomics, and roadmap. While whitepapers can be dense, they reveal whether a project has substance or merely hype. Pay attention to whether the team clearly articulates a real-world problem and presents a viable solution.

Analyzing the Team and Development Activity

A cryptocurrency project is only as strong as the team behind it. Investors scrutinize founder backgrounds, checking their LinkedIn profiles, previous projects, and industry reputation. Have they built successful companies before? Do they have relevant technical expertise? Anonymous teams aren't automatically red flags, but they require extra scrutiny and compelling reasons for their anonymity.

Development activity serves as a crucial health indicator for any blockchain project. GitHub repositories reveal whether developers are actively working on the project or if it's effectively abandoned. Regular commits, open issues being addressed, and community contributions all signal a vibrant, evolving project. Conversely, repositories with no activity for months suggest a project that may be dying or was never serious to begin with.

Diving Into Tokenomics and Supply Mechanics

Understanding a token's economic model is essential for predicting its long-term value potential. Investors examine total supply, circulating supply, and emission schedules. Is the token inflationary or deflationary? How many tokens do the team and early investors hold, and when do those tokens unlock? Large unlock events can trigger significant price drops as insiders sell.

The token's utility within its ecosystem matters tremendously. Does holding the token provide governance rights, staking rewards, or access to platform features? Tokens without clear utility often struggle to maintain value over time. Smart researchers also investigate how value accrues to token holders—whether through buybacks, burning mechanisms, or revenue sharing.

Evaluating Market Metrics and Trading Data

Price action tells only part of the story, but market metrics provide valuable context. Trading volume indicates liquidity—can you buy or sell significant amounts without drastically moving the price? Market capitalization helps determine a token's relative size and potential growth runway. A small-cap project has more room to grow but carries higher risk.

On-chain metrics offer deeper insights into token health. Active addresses, transaction volume, and network usage reveal actual adoption versus speculation. High trading volume on exchanges with minimal on-chain activity might indicate wash trading or manipulation. Token distribution matters too—if a small number of wallets hold most of the supply, the token faces centralization risks and potential price manipulation.

Leveraging Advanced Analytics Platforms

Professional crypto investors increasingly rely on sophisticated analytics platforms that aggregate multiple data sources and provide actionable insights. Token Metrics has emerged as a leading crypto trading and analytics platform, offering comprehensive research tools that save investors countless hours of manual analysis.

Token Metrics combines artificial intelligence with expert analysis to provide ratings and predictions across thousands of cryptocurrencies. The platform evaluates projects across multiple dimensions—technology, team, market metrics, and risk factors—delivering clear scores that help investors quickly identify promising opportunities. Rather than manually tracking dozens of metrics across multiple websites, users access consolidated dashboards that present the information that matters most.

The platform's AI-driven approach analyzes historical patterns and current trends to generate price predictions and trading signals. For investors overwhelmed by the complexity of crypto research, Token Metrics serves as an invaluable decision-support system, translating raw data into understandable recommendations. The platform covers everything from established cryptocurrencies to emerging DeFi tokens and NFT projects, making it a one-stop solution for comprehensive market research.

Assessing Community and Social Sentiment

Cryptocurrency projects thrive or die based on their communities. Active, engaged communities signal genuine interest and adoption, while astroturfed communities relying on bots and paid shillers raise red flags. Investors monitor project Discord servers, Telegram channels, and Twitter activity to gauge community health.

Social sentiment analysis has become increasingly sophisticated, with tools tracking mentions, sentiment polarity, and influencer engagement across platforms. Sudden spikes in social volume might indicate organic excitement about a partnership or product launch—or orchestrated pump-and-dump schemes. Experienced researchers distinguish between authentic enthusiasm and manufactured hype.

Understanding Regulatory and Security Considerations

The regulatory landscape significantly impacts cryptocurrency projects. Researchers investigate whether projects have faced regulatory scrutiny, registered as securities, or implemented compliance measures. Geographic restrictions, potential legal challenges, and regulatory clarity all affect long-term viability.

Security audits from reputable firms like CertiK, Trail of Bits, or ConsenSys Diligence provide crucial assurance about smart contract safety. Unaudited contracts carry significant risk of exploits and bugs. Researchers also examine a project's history—has it been hacked before? How did the team respond to security incidents?

Reading Between the Lines: Red Flags and Warning Signs

Experienced investors develop instincts for spotting problematic projects. Guaranteed returns and promises of unrealistic gains are immediate red flags. Legitimate projects acknowledge risk and market volatility rather than making impossible promises. Copied whitepapers, stolen team photos, or vague technical descriptions suggest scams.

Pressure tactics like "limited time offers" or artificial scarcity designed to force quick decisions without research are classic manipulation techniques. Projects with more focus on marketing than product development, especially those heavily promoted by influencers being paid to shill, warrant extreme skepticism.

The Research Never Stops

Cryptocurrency research isn't a one-time activity but an ongoing process. Markets evolve rapidly, projects pivot, teams change, and new competitors emerge. Successful investors establish systems for monitoring their holdings and staying updated on developments. Setting up Google Alerts, following project social channels, and regularly reviewing analytics help maintain awareness of changing conditions.

Whether you're evaluating established cryptocurrencies or exploring emerging altcoins, thorough research remains your best defense against losses and your greatest tool for identifying opportunities. The time invested in understanding what you're buying pays dividends through better decision-making and improved portfolio performance in this dynamic, high-stakes market.

‍

Choose from Platinum, Gold, and Silver packages
Reach with 25–30% open rates and 0.5–1% CTR
Craft your own custom ad—from banners to tailored copy
Perfect for Crypto Exchanges, SaaS Tools, DeFi, and AI Products