• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Is Cryptojacking The New Malware?

You are here: Home / Security News / Is Cryptojacking The New Malware?

It wasn’t that long ago when the terms ‘Bitcoin’ and ‘Cryptocurrencies’ first started to trend on search engines and social media platforms. But it was the technology behind Bitcoin, and the potential in cryptojacking, which caught the eyes of innovators in the tech industry. Creating a blockchain and solving complex mathematical equations to mine a cryptocurrency caught the attention of hackers worldwide.

In recent months, we have seen a surge of ransomware attacks on businesses and critical infrastructure industries, in which the threat groups demanded payment for the business’s data in the form of cryptocurrencies. However, some businesses have been able to recover their data without needing to meet the demand of threat groups. Now in a new approach to gain cryptocurrencies, especially now since the market value for cryptos is very high, threat actors have started to use a method called cryptojacking.

Cryptojacking is when the hacker gains background access to a victim’s devices and uses that device to secretly mine for cryptocurrencies. The threat actors can gain access to a person’s device through malicious applications, emails or websites.

The Australian Cyber Security Centre (ACSC) has advised that in order to lower their risk from cryptojacking, people are urged to be careful with emails they receive that may contain unfamiliar links, while also checking application authenticity through the app store. The ACSC also advises not to download applications by unfamiliar developers. The ACSC strongly suggests installing anti-virus software, and to regularly scan your device’s system whether, it’s mobile or desktop. At this time there hasn’t been any serious impacts reported due to crypto-mining, but only time will tell whether the impact is greater than we feared.

For more information on how to stay up to date with the latest cyber protection and cybersecurity standards, contact us at Agilient, and mitigate future risks that might hinder your business operations.

Author: Saeed Baayoun, Agilient Consultant

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane