Hacker
16/04/2026
In the cryptocurrency context, a hacker refers to someone who exploits security vulnerabilities to steal funds, compromise infrastructure, or disrupt services. Miners are attractive targets because they accumulate crypto over time and may hold significant balances in wallets.
Common attack types
Wallet hacks
Attackers steal private keys through malware, phishing sites, or by targeting poorly secured software wallets. Once the private key is known, the attacker has full control of the wallet.
Exchange hacks
Centralized exchanges hold large amounts of user funds, making them high-value targets. Notable examples include Mt. Gox (2014, 850,000 BTC stolen) and numerous others. Exchange hacks highlight the risk of leaving mined coins on an exchange.
Cryptojacking
Malicious software secretly installs a miner on a victim's computer or server, using their CPU or GPU to mine crypto for the attacker — without the owner's knowledge. This wastes electricity and hardware resources.
Phishing
Fake websites or emails impersonate exchanges, wallets, or mining pools to trick users into entering credentials or private keys.
Clipboard hijacking
Malware replaces a copied wallet address with the attacker's address. Always verify the full address before confirming a transaction.
How miners can stay safe
- Store accumulated coins in a hardware wallet
- Download mining software only from official GitHub repositories
- Use strong, unique passwords and two-factor authentication on exchanges
- Never enter a seed phrase or private key on any website
