Crypto Jacking Crossword
Across
- 2. To inject malicious ___________ into victims’ devices, hackers must send phishing emails with malicious attachments.
- 4. A technique of crypto jacking is to inject a code into a website and this _________runs when loaded by the victim's browser.
- 5. Infects a website/device which when ______________ downloads crypto mining software.
- 6. Unexplained high __________________bill in an organisation may be a sign of crypto jacking.
- 9. The software works in the _____________, mining or stealing from cryptocurrency wallets.
- 10. A ________________ prepare a crypto mining script to infect a website or device.
Down
- 1. Host crypto jacking happens when crypto jackers lure victims into clicking on harmless-looking links that install crypto mining software onto a ______________ ‘s device.
- 3. By not paying for expensive mining _______________ crypto jacking allows hackers to mine for cryptocurrency and use up a company’s resources without being noticed.
- 7. Poor device performance and slower-than-usual response indicates _______________.
- 8. A browser crypto jacking-based approach works by creating content that automatically runs crypto mining software in a user’s web _________when they visit the webpage hosting it.