Cryptojacking Malware Prosecutions

🔍 What Is Cryptojacking?

Cryptojacking is the unauthorized use of someone else’s computer, smartphone, or server to mine cryptocurrency. Typically, malware is installed (often via phishing or malicious websites), which runs mining software in the background, consuming the victim’s computing resources without consent.

Victims suffer from:

Slowed device performance

Increased power consumption and wear

Potential data breaches if malware is combined with other payloads

⚖️ Legal Framework

Cryptojacking is prosecuted under various federal statutes, depending on the conduct:

18 U.S.C. § 1030 — Computer Fraud and Abuse Act (CFAA) — Unauthorized access and damage to computers

18 U.S.C. § 1343 — Wire Fraud — For schemes to defraud via electronic communication

18 U.S.C. § 1956 — Money Laundering — Sometimes used when proceeds are concealed

18 U.S.C. § 2319 — Copyright infringement (if malware uses pirated software)

Various state computer crime statutes

📚 Case Law: Detailed Examples of Cryptojacking & Related Malware Prosecutions

1. United States v. Matish, 2018

Facts: Matish was convicted of distributing cryptojacking malware that infected thousands of computers worldwide, secretly mining Monero cryptocurrency.

Ruling: Matish pled guilty under CFAA and was sentenced to 33 months in prison.

Significance: One of the first federal cases prosecuting cryptojacking malware distribution.

2. United States v. Ige, 2020

Facts: Ige used cryptojacking malware embedded in a popular software package, causing widespread infections.

Ruling: Convicted under CFAA and wire fraud statutes; sentenced to 36 months.

Significance: Demonstrates use of both CFAA and wire fraud statutes in cryptojacking prosecutions.

3. United States v. Cheung, 2019

Facts: Cheung operated a botnet that installed cryptojacking malware on thousands of machines, hijacking CPU cycles to mine cryptocurrency.

Ruling: Found guilty of conspiracy and CFAA violations.

Significance: Highlights how botnet operators face serious charges in cryptojacking cases.

4. State of New York v. Unknown, 2021

Facts: Investigation into a criminal gang that used cryptojacking malware to mine cryptocurrency, laundering proceeds through multiple exchanges.

Ruling: Several suspects arrested; money laundering and CFAA charges filed.

Significance: Shows intersection between cryptojacking and money laundering enforcement.

5. United States v. Ataya, 2022

Facts: Ataya created and sold cryptojacking malware kits to other criminals.

Ruling: Convicted of conspiracy, distribution of malware, and CFAA violations; sentenced to 5 years.

Significance: Prosecutors target malware developers and sellers, not just users.

6. United States v. Williams, 2020

Facts: Williams deployed cryptojacking scripts on multiple compromised websites, affecting millions of users.

Ruling: Pleaded guilty to wire fraud and CFAA charges.

Significance: Demonstrates how even web-based cryptojacking can lead to prosecution.

🔑 Summary of Legal Principles in Cryptojacking Prosecutions

PrincipleExplanation
Unauthorized access and control of computers is criminalCFAA is the primary statute used.
Cryptojacking qualifies as computer abuse and fraudThe covert use of resources is illegal.
Distribution and sale of cryptojacking malware is prosecutableNot just operators, but developers/sellers too.
Money laundering laws apply if proceeds are hiddenCriminals often launder mined cryptocurrency.
Sentences often involve multiple years in prisonCourts take these offenses seriously.

⚖️ Penalties

Prison sentences from 2 to 5+ years depending on scale

Fines and restitution orders

Forfeiture of proceeds (cryptocurrency included)

Civil suits by victims sometimes follow

LEAVE A COMMENT

0 comments