Crypto Jacking Crossword

12345678910
Across
  1. 2. To inject malicious ___________ into victims’ devices, hackers must send phishing emails with malicious attachments.
  2. 4. A technique of crypto jacking is to inject a code into a website and this _________runs when loaded by the victim's browser.
  3. 5. Infects a website/device which when ______________ downloads crypto mining software.
  4. 6. Unexplained high __________________bill in an organisation may be a sign of crypto jacking.
  5. 9. The software works in the _____________, mining or stealing from cryptocurrency wallets.
  6. 10. A ________________ prepare a crypto mining script to infect a website or device.
Down
  1. 1. Host crypto jacking happens when crypto jackers lure victims into clicking on harmless-looking links that install crypto mining software onto a ______________ ‘s device.
  2. 3. By not paying for expensive mining _______________ crypto jacking allows hackers to mine for cryptocurrency and use up a company’s resources without being noticed.
  3. 7. Poor device performance and slower-than-usual response indicates _______________.
  4. 8. A browser crypto jacking-based approach works by creating content that automatically runs crypto mining software in a user’s web _________when they visit the webpage hosting it.