Crypto jacking is the malicious use of a person’s computing power to mine cryptocurrencies without consent. Hackers do this by either getting the victim

Crypto-jacking: Meaning

Introduction

Crypto jacking is the malicious use of a person’s computing power to mine cryptocurrencies without consent.

Hackers do this by either getting the victim to click on any kinds of malicious links sent through an email that loads cryptomining codes on their computers, or by infecting a whole website or online ad with JavaScript code that further auto-executes once loaded in the victim’s browser.

Cryptomining codes then works in the background as unsuspecting victims use their computers normally. 

The only sign they might notice is slower performance of the device.

How does it work?

Method 1

Method one is to trick Crypto jacking victims into loading cryptomining code onto their computers. 

This is done through phishing tactics: Victims first receives a legitimate-looking email that encourages them to click on a link present in that email

The link then runs code that places the cryptomining script on the victim’s device. 

The script then runs in the background of the victim’s device.

Method 2

The other method includes injecting a script on to a website or through an ad that is delivered to multiple websites.

 Once victim visits those particular websites, the infected ad pops up in their browsers further leading to the script to automatically execute. 

However, no code is stored on the victims’ computers. 

Irrespective of the method used, the malicious code runs complex mathematical problems on the victims’ device and sends the results to a server that is controlled by the hacker.

Some cryptomining scripts are also capable of ‘worming’ that further allows them to infect other devices and servers present on the same network. 

It further makes it even difficult to remove.

Crypto jacking

परिचय

क्रिप्टोजैकिंग à¤•à¤¿à¤¸à¥€ à¤µà¥à¤¯à¤•à¥à¤¤à¤¿ à¤•à¥€ à¤•à¤‚प्यूटिंग à¤¶à¤•à¥à¤¤à¤¿ à¤•à¤¾ à¤¦à¥à¤°à¥à¤­à¤¾à¤µà¤¨à¤¾à¤ªà¥‚र्ण à¤‰à¤ªà¤¯à¥‹à¤— à¤¬à¤¿à¤¨à¤¾ à¤¸à¤¹à¤®à¤¤à¤¿ à¤•à¥‡ à¤®à¥‡à¤°à¥€ à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿà¥‹à¤•à¤°à¥‡à¤‚सी à¤•à¤¾ à¤‰à¤ªà¤¯à¥‹à¤— à¤¹à¥ˆà¥¤

हैकर्स à¤¯à¤¾ à¤¤à¥‹ à¤ªà¥€à¤¡à¤¼à¤¿à¤¤ à¤•à¥‹ à¤ˆà¤®à¥‡à¤² à¤•à¥‡ à¤®à¤¾à¤§à¥à¤¯à¤® à¤¸à¥‡ à¤­à¥‡à¤œà¥‡ à¤—ए à¤•à¤¿à¤¸à¥€ à¤­à¥€ à¤ªà¥à¤°à¤•à¤¾à¤° à¤•à¥‡ à¤¦à¥à¤°à¥à¤­à¤¾à¤µà¤¨à¤¾à¤ªà¥‚र्ण à¤²à¤¿à¤‚क à¤ªà¤° à¤•à¥à¤²à¤¿à¤• à¤•à¤°à¤¨à¥‡ à¤•à¥‡ à¤²à¤¿à¤ à¤•à¤°à¤¤à¥‡ à¤¹à¥ˆà¤‚, à¤œà¥‹ à¤‰à¤¨à¤•à¥‡ à¤•à¤‚प्यूटर à¤ªà¤° à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿà¥‹à¤®à¤¿à¤¨à¤¿à¤‚ग à¤•à¥‹à¤¡ à¤²à¥‹à¤¡ à¤•à¤°à¤¤à¤¾ à¤¹à¥ˆ, à¤¯à¤¾ à¤œà¤¾à¤µà¤¾à¤¸à¥à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿ à¤•à¥‹à¤¡ à¤•à¥‡ à¤¸à¤¾à¤¥ à¤à¤• à¤ªà¥‚री à¤µà¥‡à¤¬à¤¸à¤¾à¤‡à¤Ÿ à¤¯à¤¾ à¤‘नलाइन à¤µà¤¿à¤œà¥à¤žà¤¾à¤ªà¤¨ à¤•à¥‹ à¤¸à¤‚क्रमित à¤•à¤°à¤¤à¤¾ à¤¹à¥ˆ à¤œà¥‹ à¤ªà¥€à¤¡à¤¼à¤¿à¤¤ à¤®à¥‡à¤‚ à¤à¤• à¤¬à¤¾à¤° à¤²à¥‹à¤¡ à¤¹à¥‹à¤¨à¥‡ à¤ªà¤° à¤‘टो–निष्पादित à¤•à¤°à¤¤à¤¾ à¤¹à¥ˆà¥¤ à¤¬à¥à¤°à¤¾à¤‰à¤œà¤¼à¤°à¥¤

क्रिप्टोमाइनिंग à¤•à¥‹à¤¡ à¤¤à¤¬ à¤ªà¥ƒà¤·à¥à¤ à¤­à¥‚मि à¤®à¥‡à¤‚ à¤•à¤¾à¤® à¤•à¤°à¤¤à¤¾ à¤¹à¥ˆ, à¤•à¥à¤¯à¥‹à¤‚कि à¤¬à¤¿à¤¨à¤¾ à¤¸à¥‹à¤šà¥‡â€“समझे à¤ªà¥€à¤¡à¤¼à¤¿à¤¤ à¤¸à¤¾à¤®à¤¾à¤¨à¥à¤¯ à¤°à¥‚प à¤¸à¥‡ à¤…पने à¤•à¤‚प्यूटर à¤•à¤¾ à¤‰à¤ªà¤¯à¥‹à¤— à¤•à¤°à¤¤à¥‡ à¤¹à¥ˆà¤‚।

एकमात्र à¤¸à¤‚केत à¤œà¥‹ à¤µà¥‡ à¤¨à¥‹à¤Ÿà¤¿à¤¸ à¤•à¤° à¤¸à¤•à¤¤à¥‡ à¤¹à¥ˆà¤‚ à¤µà¤¹ à¤¡à¤¿à¤µà¤¾à¤‡à¤¸ à¤•à¤¾ à¤§à¥€à¤®à¤¾ à¤ªà¥à¤°à¤¦à¤°à¥à¤¶à¤¨ à¤¹à¥ˆà¥¤

यह à¤•à¥ˆà¤¸à¥‡ à¤•à¤¾à¤® à¤•à¤°à¤¤à¤¾ à¤¹à¥ˆ?

विधि 1

विधि à¤à¤• à¤¹à¥ˆ à¤ªà¥€à¤¡à¤¼à¤¿à¤¤à¥‹à¤‚ à¤•à¥‹ à¤…पने à¤•à¤‚प्यूटर à¤ªà¤° à¤•à¥‹à¤¡à¤¿à¤‚ग à¤•à¥‹à¤¡ à¤²à¥‹à¤¡ à¤•à¤°à¤¨à¥‡ à¤®à¥‡à¤‚।

यह à¤«à¤¼à¤¿à¤¶à¤¿à¤‚ग à¤°à¤£à¤¨à¥€à¤¤à¤¿ à¤•à¥‡ à¤®à¤¾à¤§à¥à¤¯à¤® à¤¸à¥‡ à¤•à¤¿à¤¯à¤¾ à¤œà¤¾à¤¤à¤¾ à¤¹à¥ˆ: à¤ªà¥€à¤¡à¤¼à¤¿à¤¤ à¤ªà¤¹à¤²à¥‡ à¤à¤• à¤µà¥ˆà¤§ à¤¦à¤¿à¤–ने à¤µà¤¾à¤²à¤¾ à¤ˆà¤®à¥‡à¤² à¤ªà¥à¤°à¤¾à¤ªà¥à¤¤ à¤•à¤°à¤¤à¥‡ à¤¹à¥ˆà¤‚ à¤œà¥‹ à¤‰à¤¨à¥à¤¹à¥‡à¤‚ à¤‰à¤¸ à¤ˆà¤®à¥‡à¤² à¤®à¥‡à¤‚ à¤®à¥Œà¤œà¥‚द à¤²à¤¿à¤‚क à¤ªà¤° à¤•à¥à¤²à¤¿à¤• à¤•à¤°à¤¨à¥‡ à¤•à¥‡ à¤²à¤¿à¤ à¤ªà¥à¤°à¥‹à¤¤à¥à¤¸à¤¾à¤¹à¤¿à¤¤ à¤•à¤°à¤¤à¤¾ à¤¹à¥ˆà¥¤

लिंक à¤¤à¤¬ à¤•à¥‹à¤¡ à¤šà¤²à¤¾à¤¤à¤¾ à¤¹à¥ˆ à¤œà¥‹ à¤ªà¥€à¤¡à¤¼à¤¿à¤¤ à¤•à¥‡ à¤¡à¤¿à¤µà¤¾à¤‡à¤¸ à¤ªà¤° à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿà¥‹à¤®à¤¿à¤¨à¤¿à¤‚ग à¤¸à¥à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿ à¤°à¤–ता à¤¹à¥ˆà¥¤

इसके à¤¬à¤¾à¤¦ à¤¸à¥à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿ à¤ªà¥€à¤¡à¤¼à¤¿à¤¤ à¤•à¥‡ à¤¡à¤¿à¤µà¤¾à¤‡à¤¸ à¤•à¥€ à¤ªà¥ƒà¤·à¥à¤ à¤­à¥‚मि à¤®à¥‡à¤‚ à¤šà¤²à¤¤à¥€ à¤¹à¥ˆà¥¤

विधि 2

दूसरी à¤µà¤¿à¤§à¤¿ à¤®à¥‡à¤‚ à¤µà¥‡à¤¬à¤¸à¤¾à¤‡à¤Ÿ à¤ªà¤° à¤¯à¤¾ à¤•à¤¿à¤¸à¥€ à¤µà¤¿à¤œà¥à¤žà¤¾à¤ªà¤¨ à¤•à¥‡ à¤®à¤¾à¤§à¥à¤¯à¤® à¤¸à¥‡ à¤à¤• à¤¸à¥à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿ à¤‡à¤‚जेक्ट à¤•à¤°à¤¨à¤¾ à¤¶à¤¾à¤®à¤¿à¤² à¤¹à¥ˆ à¤œà¥‹ à¤•à¤ˆ à¤µà¥‡à¤¬à¤¸à¤¾à¤‡à¤Ÿà¥‹à¤‚ à¤¤à¤• à¤ªà¤¹à¥à¤‚चाई à¤œà¤¾à¤¤à¥€ à¤¹à¥ˆà¥¤

 à¤à¤• à¤¬à¤¾à¤° à¤œà¤¬ à¤ªà¥€à¤¡à¤¼à¤¿à¤¤ à¤‰à¤¨ à¤µà¤¿à¤¶à¥‡à¤· à¤µà¥‡à¤¬à¤¸à¤¾à¤‡à¤Ÿà¥‹à¤‚ à¤•à¤¾ à¤¦à¥Œà¤°à¤¾ à¤•à¤°à¤¤à¤¾ à¤¹à¥ˆ, à¤¤à¥‹ à¤¸à¤‚क्रमित à¤µà¤¿à¤œà¥à¤žà¤¾à¤ªà¤¨ à¤‰à¤¨à¤•à¥‡ à¤¬à¥à¤°à¤¾à¤‰à¤œà¤¼à¤° à¤®à¥‡à¤‚ à¤ªà¥‰à¤ª à¤…प à¤¹à¥‹ à¤œà¤¾à¤¤à¥‡ à¤¹à¥ˆà¤‚ à¤”र à¤¸à¥à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿ à¤•à¥‹ à¤¸à¥à¤µà¤šà¤¾à¤²à¤¿à¤¤ à¤°à¥‚प à¤¸à¥‡ à¤¨à¤¿à¤·à¥à¤ªà¤¾à¤¦à¤¿à¤¤ à¤•à¤°à¤¨à¥‡ à¤•à¥‡ à¤²à¤¿à¤ à¤…ग्रणी à¤¹à¥‹à¤¤à¥‡ à¤¹à¥ˆà¤‚।

हालांकि, à¤ªà¥€à¤¡à¤¼à¤¿à¤¤à¥‹à¤‚ à¤•à¥‡ à¤•à¤‚प्यूटर à¤ªà¤° à¤•à¥‹à¤ˆ à¤•à¥‹à¤¡ à¤¸à¤‚ग्रहीत à¤¨à¤¹à¥€à¤‚ à¤¹à¥ˆà¥¤

उपयोग à¤•à¥€ à¤—ई à¤µà¤¿à¤§à¤¿ à¤•à¥‡ à¤¬à¤¾à¤µà¤œà¥‚द, à¤¦à¥à¤°à¥à¤­à¤¾à¤µà¤¨à¤¾à¤ªà¥‚र्ण à¤•à¥‹à¤¡ à¤ªà¥€à¤¡à¤¼à¤¿à¤¤à¥‹à¤‚ à¤•à¥‡ à¤¡à¤¿à¤µà¤¾à¤‡à¤¸ à¤ªà¤° à¤œà¤Ÿà¤¿à¤² à¤—णितीय à¤¸à¤®à¤¸à¥à¤¯à¤¾à¤à¤‚ à¤šà¤²à¤¾à¤¤à¤¾ à¤¹à¥ˆ à¤”र à¤ªà¤°à¤¿à¤£à¤¾à¤®à¥‹à¤‚ à¤•à¥‹ à¤¹à¥ˆà¤•à¤° à¤¦à¥à¤µà¤¾à¤°à¤¾ à¤¨à¤¿à¤¯à¤‚त्रित à¤¸à¤°à¥à¤µà¤° à¤ªà¤° à¤­à¥‡à¤œà¤¤à¤¾ à¤¹à¥ˆà¥¤

कुछ à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿà¥‹à¤®à¤¿à¤‚ग à¤¸à¥à¤•à¥à¤°à¤¿à¤ªà¥à¤Ÿ à¤­à¥€ â€˜à¤µà¥‰à¤°à¥à¤®à¤¿à¤‚ग‘ à¤®à¥‡à¤‚ à¤¸à¤•à¥à¤·à¤® à¤¹à¥ˆà¤‚ à¤œà¥‹ à¤†à¤—े à¤‰à¤¨à¥à¤¹à¥‡à¤‚ à¤à¤• à¤¹à¥€ à¤¨à¥‡à¤Ÿà¤µà¤°à¥à¤• à¤ªà¤° à¤®à¥Œà¤œà¥‚द à¤…न्य à¤¡à¤¿à¤µà¤¾à¤‡à¤¸ à¤”र à¤¸à¤°à¥à¤µà¤° à¤•à¥‹ à¤¸à¤‚क्रमित à¤•à¤°à¤¨à¥‡ à¤•à¥€ à¤…नुमति à¤¦à¥‡à¤¤à¤¾ à¤¹à¥ˆà¥¤

यह à¤†à¤—े à¤­à¥€ à¤‡à¤¸à¥‡ à¤¦à¥‚र à¤•à¤°à¤¨à¤¾ à¤®à¥à¤¶à¥à¤•à¤¿à¤² à¤¬à¤¨à¤¾à¤¤à¤¾ à¤¹à¥ˆà¥¤