<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US">
	<id>https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3ACryptojacking</id>
	<title>Definition:Cryptojacking - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3ACryptojacking"/>
	<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Cryptojacking&amp;action=history"/>
	<updated>2026-05-02T16:55:24Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://www.insurerbrain.com/w/index.php?title=Definition:Cryptojacking&amp;diff=19848&amp;oldid=prev</id>
		<title>PlumBot: Bot: Creating new article from JSON</title>
		<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Cryptojacking&amp;diff=19848&amp;oldid=prev"/>
		<updated>2026-03-17T08:43:09Z</updated>

		<summary type="html">&lt;p&gt;Bot: Creating new article from JSON&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;💻 &amp;#039;&amp;#039;&amp;#039;Cryptojacking&amp;#039;&amp;#039;&amp;#039; is a form of [[Definition:Cyber attack | cyber attack]] in which an unauthorized party hijacks computing resources — servers, endpoints, cloud instances, or even IoT devices — to mine cryptocurrency without the knowledge or consent of the device owner. In the insurance context, cryptojacking sits within the broader category of [[Definition:Cyber risk | cyber risks]] that [[Definition:Underwriting | underwriters]] must evaluate when pricing [[Definition:Cyber insurance | cyber insurance]] policies, and it presents a distinctive challenge because it often operates covertly, causing financial harm through elevated electricity costs, degraded system performance, and accelerated hardware wear rather than through the dramatic data exfiltration or ransomware encryption events that typically trigger [[Definition:Insurance claim | claims]] notification.&lt;br /&gt;
&lt;br /&gt;
🔧 Attackers deploy cryptojacking malware through multiple vectors: phishing emails containing malicious scripts, compromised websites that execute browser-based mining code, and exploitation of vulnerabilities in cloud infrastructure or container environments. Once active, the mining code runs in the background, consuming CPU and GPU cycles to solve cryptographic puzzles that generate cryptocurrency — typically privacy-focused coins like Monero — deposited into the attacker&amp;#039;s wallet. For businesses, the most immediate impact is a spike in computing costs, particularly for organizations running workloads on metered [[Definition:Cloud computing | cloud]] platforms where resource consumption translates directly to billing. Detection can be delayed for weeks or months because the malware does not typically encrypt files or steal data, meaning it may not trip the same alarms that a [[Definition:Ransomware | ransomware]] incident would.&lt;br /&gt;
&lt;br /&gt;
🔎 From an insurer&amp;#039;s perspective, cryptojacking complicates [[Definition:Cyber risk quantification | cyber risk quantification]] because the losses are often diffuse — higher utility bills, reduced system availability, possible breach of cloud service agreements — rather than concentrated in a single dramatic event. Whether a cryptojacking incident triggers coverage under a [[Definition:Cyber insurance | cyber policy]] depends on the specific wording: some forms require unauthorized access or a security failure, which cryptojacking may satisfy, while others focus narrowly on data breach or [[Definition:Business interruption insurance (BI) | business interruption]] triggers that cryptojacking may not clearly meet. As a result, [[Definition:Underwriting | underwriters]] and [[Definition:Claims adjuster | claims adjusters]] must pay careful attention to policy language, and brokers should proactively discuss this exposure with clients — especially those with significant cloud infrastructure or large fleets of networked devices.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Related concepts:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
{{Div col|colwidth=20em}}&lt;br /&gt;
* [[Definition:Cryptojacking coverage]]&lt;br /&gt;
* [[Definition:Cyber insurance]]&lt;br /&gt;
* [[Definition:Ransomware]]&lt;br /&gt;
* [[Definition:Cyber risk quantification]]&lt;br /&gt;
* [[Definition:Cyber attack]]&lt;br /&gt;
* [[Definition:Cloud computing]]&lt;br /&gt;
{{Div col end}}&lt;/div&gt;</summary>
		<author><name>PlumBot</name></author>
	</entry>
</feed>