Cryptojacking Targets Education

Education is among one of the top verticals affected by a newer form of nefarious cybercrime. Malicious cryptomining or cryptojacking, as it's called, describes the theft of computer processing resources — electricity, cloud services and other digital assets — that are then exploited to do cryptocurrency mining without the owner's permission or knowledge, according to a recent report by Cisco.

According to the company, unauthorized cryptomining activity grew 19 times, increasing from 600,000 queries in March to 11.3 million by December. The impact is felt by its victim companies through degraded performance, systems attacks and higher electricity usage, as well as possible compliance problems, particularly in the area of security exchange regulations.

While the largest target was made up of energy and utility companies, in the Cisco study, colleges experienced 22 percent of all cryptomining attempts, while K-12 made up 4 percent of the total. Cisco, which sells Umbrella, an enterprise cloud security service intended to stop users from connecting to malicious sites, said those organizations with fewer than 10,000 employees were the primary focus, making up eight in 10 of the targets hit by cryptomining traffic.

Next week, two people from Cisco, Ayse Kaya Firat, the head of analytics and customer insights, and Austin McBride, a threat analytics researcher, will be presenting a session on the topic during the RSA security conference.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • abstract graph showing growth

    Where Are You on the Ed Tech Maturity Curve?

    Ed tech maturity models can help institutions map progress and make smarter tech decisions.

  • row of digital padlocks

    2026 Cybersecurity Trends to Watch in Higher Education

    In an open call last month, we asked education and industry leaders for their predictions on the cybersecurity landscape for schools, districts, colleges, and universities in 2026. Here's what they told us.

  • Interface buttons of Generative AI tool

    Report: No Foolproof Method Exists for Detecting AI-Generated Media

    Microsoft has released a new research report warning that no single technology can reliably distinguish AI-generated content from authentic media, and that deepening reliance on any one method risks misleading the public.

  • Abstract digital cloudscape of glowing interconnected clouds and radiant lines

    Cloud Complexity Outpacing Human Defenses, Report Warns

    According to the 2026 Cloud Security Report from Fortinet, while cloud security budgets are rising, 66% of organizations lack confidence in real-time threat detection across increasingly complex multi-cloud environments, with identity risks, tool sprawl, and fragmented visibility creating persistent operational gaps despite significant investment increases.