• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Pharmaceutical Industry
      • Aged Care Facilities
      • Public Venues & Events
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Maritime Security Consultant
      • Utilities
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Mining, Oil & Gas
      • Rail
      • Places of Faith and Worship
      • Corrections and Detention
    • advice-colleagues-communication-newIndustries
  • Services
      • Security Risk Assessment Consultants
      • Security Consultants
      • Protective Security
      • Building Security Consultants
      • Security Audits
      • Business Resilience
      • Security Camera and CCTV Consultant
      • Duress Alarms
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Hostile Vehicle Mitigation
      • Security Awareness Training
      • Managed Security Service Provider
      • Identity Theft Protection & Consulting
      • Cyber Audits
      • Data Security
      • Cyber Security Awareness Training
      • Cyber Security Consulting
      • Penetration Testing
      • Azure
    • training-1Services
  • Locations
      • Security Consultant Sydney
      • Security Consultant Melbourne
      • Security Consultant Brisbane
      • Security Consultant Adelaide
      • Security Consultant Canberra
      • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Is Cryptojacking The New Malware?

You are here: Home / Security News / Is Cryptojacking The New Malware?

It wasn’t that long ago when the terms ‘Bitcoin’ and ‘Cryptocurrencies’ first started to trend on search engines and social media platforms. But it was the technology behind Bitcoin, and the potential in cryptojacking, which caught the eyes of innovators in the tech industry. Creating a blockchain and solving complex mathematical equations to mine a cryptocurrency caught the attention of hackers worldwide.

In recent months, we have seen a surge of ransomware attacks on businesses and critical infrastructure industries, in which the threat groups demanded payment for the business’s data in the form of cryptocurrencies. However, some businesses have been able to recover their data without needing to meet the demand of threat groups. Now in a new approach to gain cryptocurrencies, especially now since the market value for cryptos is very high, threat actors have started to use a method called cryptojacking.

Cryptojacking is when the hacker gains background access to a victim’s devices and uses that device to secretly mine for cryptocurrencies. The threat actors can gain access to a person’s device through malicious applications, emails or websites.

The Australian Cyber Security Centre (ACSC) has advised that in order to lower their risk from cryptojacking, people are urged to be careful with emails they receive that may contain unfamiliar links, while also checking application authenticity through the app store. The ACSC also advises not to download applications by unfamiliar developers. The ACSC strongly suggests installing anti-virus software, and to regularly scan your device’s system whether, it’s mobile or desktop. At this time there hasn’t been any serious impacts reported due to crypto-mining, but only time will tell whether the impact is greater than we feared.

For more information on how to stay up to date with the latest cyber protection and cybersecurity standards, contact us at Agilient, and mitigate future risks that might hinder your business operations.

Author: Saeed Baayoun, Agilient Consultant

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane

 

ASIAL member association logo
ASIS international member logo

Copyright © 2026 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692