Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity 101
What is cryptojacking?

What is cryptojacking? Easy explanation for cybersecurity newbies

Published: 7/18/2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

Cryptojacking is when someone secretly uses your computer or device to mine cryptocurrency without your knowledge or consent. This is done by installing malicious software or running sneaky scripts, slowing down your device, and using your processing power for their own profit.

Want a simple breakdown of how cryptojacking works, how it impacts cybersecurity, and what you can do to protect yourself? You’re in the right spot! This glossary entry is built for beginners, so grab your digital magnifying glass and let's demystify cryptojacking together.

Breaking down cryptojacking

Cryptojacking is a sneaky way for cybercriminals to make money at your expense. Here’s the gist:

Imagine leaving your laptop to charge overnight, only to wake up and find it hot, slow, and popping up with weird error messages. You didn’t ask it to solve complex math problems all night, but a hacker might have. That’s cryptojacking at work.

Why does cryptojacking matter in cybersecurity?

We’re not just talking about a slightly slower computer. Cryptojacking is a red flag for several reasons:

  • It’s a sign of a breach. If someone can secretly run cryptojacking software, your system likely has other weaknesses.

  • It can cost you. Expect higher electricity bills and a much shorter device lifespan.

  • It’s everywhere. Cryptojacking can infect PCs, phones, tablets, and even smart refrigerators. All it takes is one unpatched browser or an outdated plugin.

How does cryptojacking actually happen?

Cybercriminals usually pull off cryptojacking in one of two ways:

1. Malicious downloads

You get tricked into downloading a fake app or clicking a sketchy email link. Bam! Hidden mining software installs itself in the background. You may never notice until your device starts running much slower.

2. Poisoned webpages (browser-based mining)

Certain websites are loaded with sneaky scripts that hijack your browser’s resources to mine cryptocurrency. Close the tab, and the mining often stops—but some clever scripts keep working until you restart your computer.

Real-world example

Remember that time you opened 20 browser tabs and your laptop sounded like a jet engine? If one of those sites was running cryptojacking code, it could explain the sudden lag and the spike in your electricity bill. Cryptojacking uses up your processing power and energy just to help bad actors make a quick buck.

What are the common signs of cryptojacking?

Keep an eye out for these warning signs:

  • The device feels hot or the fan runs constantly, even when idle

  • The battery drains unusually fast

  • Your computer or phone is suddenly super slow

  • Random browser tabs or windows keep popping up

  • Noticeably higher electric bills without an obvious explanation

  • Security software keeps flagging suspicious processes

No single sign guarantees you’re a target, but a combo of these is worth investigating!

Why should you care about cryptojacking?

Here’s why cybersecurity pros (and you) should take cryptojacking seriously:

  • Resource drain: It eats up your CPU (processor) power and energy, causing hardware to wear out faster.

  • Security warning: The presence of cryptojacking often means you’ve got other vulnerabilities for cybercriminals to exploit.

  • Hidden costs: Even if it doesn’t steal your credit card, cryptojacking costs you in device health, performance, and energy bills.

  • Widespread reach: Any internet-connected device is a potential target, including smart home gadgets and work laptops.

How do you defend yourself against cryptojacking?

Stay one step ahead of cybercriminals with these beginner-friendly tips:

  • Install security updates. Keep your operating system, browsers, and plugins up to date.

  • Use quality antivirus software. Look for features like real-time scanning and malware removal.

  • Be browser savvy. Use reputable ad-blockers and anti-cryptomining browser extensions.

  • Avoid suspicious links and downloads. Don’t click on weird email attachments or shady pop-ups.

  • Monitor device performance. If things feel off, investigate! Unexpected slowdowns could be a signal.

Bonus tip: If your system is consistently slow, open your Task Manager or Activity Monitor and check for unknown processes hogging the CPU. That’s where cryptojacking likes to hide.

Top questions people ask about cryptojacking

Look for unusual slowdowns, increased fan noise, quickly draining batteries, or unexplained spikes in power usage. Security alerts and persistent browser tabs may also signal a problem.

It hijacks your computing power, slows your device, and can increase your electricity bills. More importantly, it means your online defenses are weak—which could make you a target for even more dangerous attacks.

Yes! Any internet-connected device can be targeted, including phones, tablets, and even smart home gadgets like TVs and voice assistants.

Install security updates regularly, use trustworthy antivirus tools, practice safe browsing (avoid shady websites), and consider anti-cryptomining browser add-ons.

Glitch effectBlurry glitch effect
Glitch effect

Related Resources


  • What is Crypto Malware
    What is Crypto Malware
    Discover what crypto malware is, how it works, and how to prevent cryptojacking. Protect your systems with key insights and proactive defenses.
  • What Is a Trojan Bitcoin Miner (and Why Should You Care)?
    What Is a Trojan Bitcoin Miner (and Why Should You Care)?
    Learn what Trojan Bitcoin miners are, how they infect systems, and how to detect & remove them before they hijack resources. Protect your devices from crypto malware!
  • What is adware, and how can you protect your devices from it?
    What is adware, and how can you protect your devices from it?
    Learn what adware is, the signs of infection, removal tips, and steps to protect your devices from malicious adware. Read Huntress advice now.
  • What is Bluesnarfing and How to Prevent It
    What is Bluesnarfing and How to Prevent It
    Learn what bluesnarfing is, how it works, and easy ways to protect your Bluetooth-connected devices. Stay safe from unauthorized data theft!
  • What Is a Browser Extension? How They Work, Risks & Security Guide
    What Is a Browser Extension? How They Work, Risks & Security Guide
    A browser extension is a small software add-on that customizes your web experience—blocking ads, managing passwords, and more. Learn how they work, how they interact with websites, and how to stay safe while using them.
  • The Banking Malware That Changed Cybercrime
    The Banking Malware That Changed Cybercrime
    Learn what the Zeus Trojan is, how it works, key features, removal steps, and tips for cyber defense. Find answers to top FAQs and essential links.
  • What is a crypto key and how does it keep your stuff safe online
    What is a crypto key and how does it keep your stuff safe online
    Learn what a crypto key is, how it protects your data, and why keeping it safe is a must for cybersecurity.
  • What is a Browser Helper Objective?
    What is a Browser Helper Objective?
    Learn what a Browser Helper Object (BHO) is, how it works, its risks, and its ties to cybersecurity. Simplified insights to help you stay protected.
  • What is anti-spyware?
    What is anti-spyware?
    Learn what anti-spyware is, how it works, and its role in cybersecurity. Uncover steps to protect your devices and data effectively.

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy