Save 50% on a 3-month Digiday+ membership. Ends Dec 5.
This article is a WTF explainer, in which we break down media and marketing’s most confusing terms. More from the series →
Fraudsters are constantly coming up with new tactics to siphon money from legitimate sites. The latest tactic in this never-ending arms race is called cryptojacking.
Since techies have become obsessed with cryptocurrencies like bitcoin, it was only a matter of time before fraudsters would exploit the complexity of distributed ledgers. Here’s an explainer on how cryptojacking works.
WTF is cryptojacking?
Hackers engage in cryptojacking when they use a user’s browser to harvest cryptocurrency like Bitcoin. Cryptocurrencies operate through a distributed ledger where computers are used to verify and add to the ledger. Each addition to the ledger creates more of the currency, so having access to computing power is essential for anyone trying to make a lot of money from cryptocurrencies. Instead of filling warehouses with powerful and expensive servers, some cryptocurrency enthusiasts are turning to users’ browsers to do their cyber mining.
What’s so bad about that?
Theoretically, publishers could allow users to opt into letting their devices be used for cryptocurrency mining. If that were the case, then cryptojacking could be viewed as another experiential revenue source for publishers.
But in reality, cryptojacking is happening without the user’s consent, and it’s not being carried out by traditional publishers. Instead, fraudsters are hijacking users’ devices and all the user notices is a slowdown in their processing speed. The user is likely to blame the website they’re visiting for the problem, but the website that the cryptojacking is occurring on is usually a victim, too, said Jerome Dangu, CTO at Confiant, a tech firm that specializes in blocking bad ads from publishers’ webpages.
The most infamous examples of cryptojacking occurred this fall when hackers injected their mining code into the websites of publishers like Showtime and PolitiFact without the publishers’ knowledge. When this happened, the publishers got docked for having a poor user experience even though they didn’t make any money out of the deal.
How is cryptojacking used?
Hackers can get their mining code onto people’s computers by tampering with Wi-Fi sources. Last week, customers of a Starbucks store in Buenos Aires found this out the hard way. Starbucks patrons had to wait 10 seconds to connect to the store’s Wi-Fi and the processing speed of their devices slowed down because hackers tampered with the store’s connection so that they could use customers’ laptops to mine cryptocurrency.
Ad position: web_incontent_pos1
Hackers can also hide their code in an ad and resell the ad through multiple programmatic platforms until someone fails to catch the malware and serves it to a user, Dangu said. Another tactic hackers rely on to find users who can mine cryptocurrency for them is called “domain squatting.” For example, a hacker will buy the domain Twitter.com.com. Twitter is a popular domain, so there’s bound to be traffic from people who mistype the name of its website.
When users visit Twitter.com.com, they’re sent to a site that offers little in the way of content but makes money by harnessing the user’s CPU in the background for cryptocurrency mining.
Who is doing this hacking?
Dom Fortin, chief information officer at programmatic platform District M, said the practitioners of cryptojacking are already engaged in other types of fraud. Cryptojacking just helps them add a little more cheddar to their pillage. For instance, someone making money by arbitraging the difference between display and video CPMs can add cryptojacking to the mix and get a few more cents out of each user. If a scam is being applied on thousands or millions of users, the money quickly adds up.
Why has this tactic become popular recently?
Tools like Coinhive, which let users mine cryptocurrency directly in the browsers, came out in the fall. Several cryptocurrencies’ prices have also significantly risen over the past year, increasing the incentive for mining these coins for nefarious purposes.
More in Media
Digiday+ Research Subscription Index 2025: Subscription strategies from Bloomberg, The New York Times, Vox and others
Digiday’s third annual Subscription Index examines and measures publishers’ subscription strategies to identify common approaches and key tactics among Bloomberg, The New York Times, Vox and others.
From lawsuits to lobbying: How publishers are fighting AI
We may be closing out 2025, but publishers aren’t retreating from the battle of AI search — some are escalating it, and they expect the fight to stretch deep into 2026.
Media Briefing: Publishers turn to vertical video to compete with creators and grow ad revenue in 2026
Publishers add vertical video feeds to their sites to boost engagement, attract video ad spend and compete with news creators.
Ad position: web_bfu