Crypto-Jacking
To use people’s devices (computers, smartphones, tablets, or even servers), without their consent or knowledge, to secretly mine cryptocurrency on the victim’s resource. Instead of building a dedicated mining computer, hackers use crypto-jacking to steal computing resources from other users’ devices.