Abstract
This paper conducts a comprehensive examination of the infrastructure supporting cryptojacking operations. The analysis elucidates the methodologies, frameworks, and technologies malicious entities employ to misuse computational resources for unauthorized cryptocurrency mining. The investigation focuses on identifying websites serving as platforms for cryptojacking activities. A dataset of 887 websites, previously identified as cryptojacking sites, was compiled and analyzed to categorize the attacks and malicious activities observed. The study further delves into the DNS IP addresses, registrars, and name servers associated with hosting these websites to understand their structure and components. Various malware and illicit activities linked to these sites were identified, indicating the presence of unauthorized cryptocurrency mining via compromised sites. The findings highlight the vulnerability of website infrastructures to cryptojacking.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aloqaily, M., Pandit, V.: IEEE conference on blockchain and cryptocurrency(ICBC’23). IEEE Commun. Mag. 61(11), 6–9 (2023)
Alrawi, O., et al.: Forecasting malware capabilities from cyber attack memory images, pp. 3523–3540. USENIX Security (2021)
Alrawi, O., Zuo, C., Duan, R., Kasturi, R.P., Lin, Z., Saltaformaggio, B.: The betrayal at cloud city: an empirical analysis of cloud-based mobile backends, pp. 551–566. USENIX Security (2019)
Bhatia, N., Bansal, S., Desai. S.: A detailed review of blockchain and cryptocurrency. CoRR, abs/2303.06008 (2023)
Burgess, J., O’Kane, P., Carlin, D., Sezer, S.: MANiC: multi-step assessment for crypto-miners. In: International Conference on Cyber Security and Protection of Digital Services. IEEE
Carlin, D., Burgess, J., O’Kane, P., Sezer, S.: You could be mine(d): the rise of Cryptojacking. IEEE Secur. Priv. 18(2), 16–22 (2020)
Carlin, D., O’Kane, P., Sezer, S., Burgess, J.: Detecting Cryptomining using dynamic analysis. IEEE PST (2018)
Du, Y., Alrawi, O., Snow, K.Z., Antonakakis, M., Monrose, F.: Improving security tasks using compiler provenance information recovered at the binary-level. In: CCS, pp. 2695–2709. ACM (2023)
Duan, R., et al.: Automating patching of vulnerable open-source software versions in application binaries. NDSS (2019)
Garriga, M., Arias, M., Renzis, A.D.: Blockchain and Cryptocurrency: a comparative framework of the main architectural drivers. CoRR, abs/1812.08806 (2018)
Hajiaghapour-Moghimi, M., et al.: Hedging investments of grid-connected PV-BESS in buildings using cryptocurrency mining: A case study in Finland. IEEE Access 11, 66327–66345 (2023)
Jayasinghe, K., Poravi, G.: A survey of attack instances of Cryptojacking targeting cloud infrastructure, pp. 100–107. ACM APIT (2020)
Kshetri, N., Rahman, M.M., Sayeed, S.A., Sultana, I.: cryptoRAN: a review on cryptojacking and ransomware attacks wrt banking industry - threats, challenges, & problems. CoRR, abs/2311.14783 (2023)
Kshetri, N., Voas, J.M.: Cryptojacking. Computer 55(1), 18–19 (2022)
Lachtar, N., Elkhail, A.A., Bacha, A., Malik, H.: A cross-stack approach towards defending against cryptojacking. IEEE Comput. Archit. Lett. 19(2), 126–129 (2020)
Menati, A., Cai, Y., Helou, R.E., Tian, C., Xie, L.: Optimization of cryptocurrency mining demand for ancillary services in electricity markets, pp. 3052–3061. HICSS (2024)
Mohaisen, A.: Towards automatic and lightweight detection and classification of malicious web contents, pp. 67–72. IEEE HotWeb (2015)
Mohaisen, A., Alrawi, O.: Unveiling Zeus: automated classification of malware samples, pp. 829–832. WWW (2013)
Mohaisen, A., Alrawi, O.: AV-meter: an evaluation of antivirus scans and labels. In: DIMVA, vol. 8550, pp. 112–131. Springer (2014)
Mohaisen, A., Alrawi, O., Mohaisen, M.: AMAL: high-fidelity, behavior-based automated malware analysis and classification. Comput. Secur. 52, 251–266 (2015)
Naseem, F.N., Aris, A., Babun, L., Tekiner, E., Uluagac, A.S.: MINOS: a lightweight real-time cryptojacking detection system. NDSS (2021)
Perdisci, R., Papastergiou, T., Alrawi, O., Antonakakis, M.: IoTfinder: efficient large-scale identification of IoT devices via passive DNS traffic analysis. In: IEEE EuroS &P, pp. 474–489. IEEE (2020)
Rajba, P., Mazurczyk, W.: Limitations of web cryptojacking detection: a practical evaluation. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna, Austria, 23–26 August 2022, pp. 1– 6. ACM (2022)
Saad, M., Khormali, A., Mohaisen, A.: End-to-end analysis of in-browser cryptojacking. CoRR, abs/1809.02152 (2018)
Saad, M., Mohaisen, D.: Analyzing in-browser cryptojacking. IEEE Trans. Dependable Secure Comput. 1, (2024)
Saad, M., et al.: Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun. Surv. Tutorials 22(3), 1977–2008 (2020)
Tekiner, E., Acar, A., Uluagac, A.S.: A lightweight IoT cryptojacking detection mechanism in heterogeneous smart home networks. NDSS (2022)
Wang, A., Chang, W., Chen, S., Mohaisen, A.: Delving into internet DDoS attacks by botnets: characterization and analysis. IEEE/ACM Trans. Netw. 26(6), 2843–2855 (2018)
Xiao, R., Li, T., Ramesh, S., Han, J., Han, J.: MagTracer: detecting GPU cryptojacking attacks via magnetic leakage signals, pp. 1–15. ACM MobiCom (2023)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Adeniran, A., Human, K., Mohaisen, D. (2025). Dissecting the Infrastructure Used in Web-Based Cryptojacking: A Measurement Perspective. In: Lee, JH., Emura, K., Lee, S. (eds) Information Security Applications. WISA 2024. Lecture Notes in Computer Science, vol 15499. Springer, Singapore. https://doi.org/10.1007/978-981-96-1624-4_21
Download citation
DOI: https://doi.org/10.1007/978-981-96-1624-4_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-1623-7
Online ISBN: 978-981-96-1624-4
eBook Packages: Computer ScienceComputer Science (R0)