Boost your skills for the Ethical Hacking Test. Explore diverse questions, insightful tips, and detailed explanations. Prepare effectively for your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What is the first step in the sequence for executing a cryptojacking attack?

  1. The victim starts mining cryptocurrency

  2. The attacker embeds a malicious script

  3. The attacker receives cryptocurrency rewards

  4. The victim connects to the compromised service

The correct answer is: The victim starts mining cryptocurrency

The first step in a cryptojacking attack begins with the attacker embedding a malicious script into a website or application. This script is designed to utilize the victim's computing resources to mine cryptocurrency without their consent. When a user visits the compromised site or interacts with the affected app, the malicious script executes in the background, leveraging the victim's CPU power for mining activities. This initial step is crucial because it establishes the mechanism through which the attack unfolds. Successful execution of this embedded script leads to the ultimate goal of the attacker, which is to mine cryptocurrency using resources from unsuspecting victims. Once the script is running on a victim's device, it can then lead to them unknowingly contributing to the mining process, effectively making option "A" not applicable as the initial phase. The subsequent phases, such as the attacker receiving the rewards from mining or the victim experiencing lag and performance issues, result from the execution of that embedded script. Therefore, embedding the malicious code is the foundational action that dictates the flow of the entire cryptojacking attack.