Using a compromised device to generate cryptocurrency without the owner’s knowledge. Mining can be performed either by installing a malicious program on the target computer or by means of fileless malware.
Sometimes attackers take over part of the computer’s processing power when a page is opened that contains a special mining script. Cryptojacking has been known to occur when viewing online ads or solving a captcha.