Books
Fouad Sabry

Cryptojacking

In a world increasingly shaped by digital currency, understanding the hidden risks is crucial. Cryptojacking shines a spotlight on the shadowy side of Monero Cryptocurrency, exposing how cybercriminals exploit computing power for profit. This book bridges the gap between Political Science and cybersecurity by showing how digital threats disrupt governance, privacy, and economic stability.

Chapters Brief Overview:

1: Cryptojacking: Explores covert cryptomining attacks using Monero and their global implications.

2: Web threat: Analyzes Monerobased web threats that silently hijack browsers for mining.

3: Linux malware: Details Linuxtargeted malware using Monero for unauthorized mining.

4: Monero: Introduces Monero's privacy features and appeal to cybercriminals.

5: BrowseAloud: Unpacks a realworld cryptojacking case using a public service tool.

6: Zeus (malware): Explores this malware’s evolution and relevance to Monerodriven exploits.

7: Zealot Campaign: Covers a coordinated attack using exploits to mine Monero at scale.

8: Timeline of computer viruses and worms: Chronicles major malware events that paved the way for Monero cryptojacking.

9: Dridex: Highlights Dridex's financial malware and potential synergy with Monero.

10: Sality: Examines a resilient virus family and its mining implications.

11: CryptoLocker: Links ransomware tactics to cryptojacking motivations and operations.

12: Malware: Overviews malware taxonomy with focus on Monero mining relevance.

13: Rustock botnet: Shows how botnets were precursors to cryptojacking infrastructure.

14: Storm Worm: Discusses Storm Worm’s impact and its relation to decentralized mining.

15: Srizbi botnet: Analyzes a botnet’s role in spreading cryptomining malware.

16: Cryptocurrency and crime: Explores how Monero is entangled in modern digital crime ecosystems.

17: Ransomware: Links ransomware and cryptojacking as parallel threats using Monero.

18: Botnet: Dissects botnets as the core delivery system of cryptojacking payloads.

19: Maninthebrowser: Shows how browser manipulation enables stealth Monero mining.

20: Alureon: Unveils stealth malware with Monero mining capacity.

21: ZeroAccess botnet: Details a vast botnet’s shift into cryptomining operations.

This essential guide is ideal for professionals, students, hobbyists, and enthusiasts seeking a critical edge in cybersecurity and political insight. The cost of ignorance far outweighs that of knowledge—empower yourself with the tools to understand and counter digital threats hidden behind Monero.
244 printed pages
Original publication
2025
Publication year
2025
Have you already read it? How did you like it?
👍👎
fb2epub
Drag & drop your files (not more than 5 at once)