As headlines focus on high-profile crypto thefts, a quieter but rapidly growing threat is infiltrating organizations worldwide: cryptojacking. This invisible cyberattack hijacks computing power to mine cryptocurrency, leaving victims with soaring energy bills, sluggish devices, and heightened security risks, all while remaining undetected.

Key points:

  • Cybercriminals covertly exploit computers, smartphones, and servers to mine cryptocurrency, often without the user’s knowledge or consent.
  • In 2024, the US Agency for International Development suffered a cryptojacking attack, which resulted in USD 500,000 in damages.
  • Malicious code is typically delivered through phishing emails, compromised websites, or infected browser extensions, enabling attackers to operate in the background and spread across networks.
  • Beyond financial and operational costs, cryptojacking signals deeper security vulnerabilities. Robust defense strategies – system monitoring, network analysis, and employee awareness – are critical to prevention.

Your phone’s battery overheats, your laptop fan whirls nonstop, and your electricity bill spikes. You shrug off these annoyances. But what if they are signs of an active cybercrime?

What is cryptojacking?

In the first half of 2025, cybercriminals stole over USD 2.1 billion through cryptocurrency-related attacks.1 Most losses resulted from wallet compromises and phishing campaigns. While these incidents dominate headlines, a more insidious threat operates in the background: cryptojacking. This cyberattack involves criminals hijacking the computing resources of a victim’s device – such as computers, smartphones or servers – to mine cryptocurrency without the user’s knowledge.

Cryptojacking in action

In fall 2024, the US Agency for International Development (USAID) was notified by Microsoft of a security breach. An administrator account was compromised through a password spray attack,2 leading to the creation of a second account. Both accounts were used to launch crypto mining operations via USAID’s Azure resources, resulting in an estimated USD 500,000 in damages. In response, USAID implemented stronger password policies, mandated multi-factor authentication (MFA), and enhanced security monitoring to prevent future attacks.3

How it works

Cryptojacking is driven by profit. Mining cryptocurrencies can be very lucrative but requires expensive hardware and high energy consumption. For attackers, hijacking victims’ devices and networks offers a way to mine coins for free.4

Attackers typically deliver cryptojacking malware through:5

  • Phishing emails with infected links or attachments
  • Compromised websites or online ads (also known as drive-by mining)
  • Malicious browser extensions or third-party plugins

Unlike ransomware, which locks users out, cryptojacking operates silently in the background – victims continue using their devices, unaware that their resources are being hijacked (see Picture 1). Some cryptojacking malware spreads like a worm, moving through networks, infecting multiple devices, and consuming their computing power along the way.

Picture 1: Inside the hidden mining process

A flow chart illustrating how cryptojacking malware infiltrates a device, hijacks its computing resources, and silently mines cryptocurrency without the user’s knowledge.

This flow chart illustrates the process by which cryptojacking malware infiltrates a device, covertly hijacks its computing resources, and silently mines cryptocurrency without the user's awareness.

At first glance, cryptojacking might seem less harmful than ransomware or data breaches. However, its impact can be significant: higher electricity bills, potential hardware damage from overuse, and productivity losses due to slower system performance. More importantly, the presence of cryptojacking software signals deeper security vulnerabilities: if attackers can install cryptojacking malware, they may also introduce other malicious code.6

Signs of a silent attack

Cryptojacking is stealthy and designed to avoid detection, often running unnoticed for extended periods. Effective detection requires a multi-layered approach, including monitoring system performance, analyzing network traffic, and observing browser behavior. Warning signs include:7

  • Performance issues such as system slowdown, freezing, crashing, or overheating
  • High CPU/GPU8 usage with minimal activity
  • Unexplained spikes in energy consumption
  • Unusual outbound network traffic or large data transfers to unknown locations
  • Suspicious or unfamiliar processes running in the background

Defense strategy

Cryptojacking is a stealthy and increasingly common cyber threat that exploits the computing power of individuals and organizations to mine cryptocurrency illegally. While it may not cause immediate, visible damage like ransomware, it can significantly slow IT systems, raise operational costs, and increase security risks. Effective defense strategy requires monitoring, network analysis, and employee awareness.

The UBS security equity strategy invests in leading IT security companies that provide products and services to detect cyber threats and effectively protect individuals, companies and governments.

S-10/25 M-002321

Related insights

We’re here to help

Contact us

For general inquiries with UBS Asset Management, fill in a form with your details and we’ll be back in touch.

Our leadership team

Our global leadership team is deep, diverse, and dedicated to our ethos of delivering investment excellence.

Find your local UBS office

As your expert global partner, we're closer than you think. Discover UBS's locations in your region.