Loading

A Recapitalization on Crypto Jacking and end to end Analysis of Ransomware Attacks
G. Prema Arokia Mary1, N. Suganthi2, M. S. Hema3
1G.Prema Arokia Mary, Department of Information Technology, Kumaraguru College of Technology, Coimbatore (Tamil Nadu), India.
2N.Suganthi, Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore (Tamil Nadu), India.
3M.S.Hema, Department of Computer Science and Engineering, Aurora’s Scientific Technological and Research Academy, Hyderabad (Telangana), India.
Manuscript received on 30 September 2019 | Revised Manuscript received on 12 November 2019 | Manuscript Published on 22 November 2019 | PP: 1582-1586 | Volume-8 Issue-6S3 September 2019 | Retrieval Number: F12910986S319/19©BEIESP | DOI: 10.35940/ijeat.F1291.0986S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The recent trend of today’s digital media is the usage of poisoned website to mine crypto currencies, these currencies are alternatives to traditional currencies which work based on decentralization, bit coin was the first currency to be establish in this way, crypto currencies are protected with block chain which can be simplified as growing chain. This block chain is managed by peer to peer network, based upon this blockchain network crypto jacking takes place, and hence cryptojacking is mining of one’s digital currencies without their knowledge, hackers find cryptojacking more profitable because they are a lotcheaper and safe than compared to other digital thefts. Tracking and finding the cause of theft becomes very hard in this method because mining kits can be purchased at a very cheap cost. There are primarily two methods to be followed to get to the computer and to perform cryptojacking, one is to run a infected code on the host computer and the other is to make the user click the content with threat but widely both will be used for increased profit outcome. In this paper an overview of crypto currencies, method of decentralization, various mining techniques followed and different types of cybercrimes prevalent are discussed.
Keywords: Crypto Jacking, Crypto Currencies, Mining, Online Scams.
Scope of the Article: Pattern Recognition and Analysis