This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select "Click Here" to open the Privacy Preference Center and select "Functional Cookies" in the menu. You can switch the tab back to "Active" or disable by moving the tab to "Inactive." Click "Save Settings."

Cryptojacking & Coinhive: The Risks Are Real

Less than a year ago, Coinhive changed the history of cryptomining. In September 2017, Coinhive launched a service that enabled the mining of the Monero digital currency—directly within a web browser.

The Coinhive API offers access for website owners to deploy a miner on their site, have it communicate with the Coinhive remote server, and allow the miners to run on user systems, without user permission. This capability creates a vast attack surface for threat actors to exploit to their advantage.


  • The techniques, tactics, and procedures utilized within the Coinhive exploit
  • How can Coinhive impact your IOT devices. And the consequences if your organization is compromised.
  • The key indicators of compromise (IOC) that may impact your business
  • What you can do to proactively protect your business from Coinhive and other threats

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language