Glossary

Hacker

16/04/2026

In the cryptocurrency context, a hacker refers to someone who exploits security vulnerabilities to steal funds, compromise infrastructure, or disrupt services. Miners are attractive targets because they accumulate crypto over time and may hold significant balances in wallets.

Common attack types

Wallet hacks

Attackers steal private keys through malware, phishing sites, or by targeting poorly secured software wallets. Once the private key is known, the attacker has full control of the wallet.

Exchange hacks

Centralized exchanges hold large amounts of user funds, making them high-value targets. Notable examples include Mt. Gox (2014, 850,000 BTC stolen) and numerous others. Exchange hacks highlight the risk of leaving mined coins on an exchange.

Cryptojacking

Malicious software secretly installs a miner on a victim's computer or server, using their CPU or GPU to mine crypto for the attacker — without the owner's knowledge. This wastes electricity and hardware resources.

Phishing

Fake websites or emails impersonate exchanges, wallets, or mining pools to trick users into entering credentials or private keys.

Clipboard hijacking

Malware replaces a copied wallet address with the attacker's address. Always verify the full address before confirming a transaction.

How miners can stay safe

  • Store accumulated coins in a hardware wallet
  • Download mining software only from official GitHub repositories
  • Use strong, unique passwords and two-factor authentication on exchanges
  • Never enter a seed phrase or private key on any website

See also