Cryptojacking And Unauthorized Mining Criminal Cases
I. Legal Framework in China
Cryptojacking or unauthorized mining involves using another person’s or organization’s computer, server, or network resources without consent to mine cryptocurrency. Chinese law does not have a separate statute explicitly called “cryptojacking,” but it can be prosecuted under several provisions:
1. Illegal Control of Computer Systems (Article 285, PRC Criminal Law)
Definition: Unauthorized intrusion into computer systems or networks.
Application: Installing mining scripts or malware on victim machines.
Penalty:
Standard: up to 3 years imprisonment or fine.
Serious: 3–7 years and fine.
2. Theft of Property (Article 264, PRC Criminal Law)
If unauthorized mining results in direct economic loss, the value of electricity or hardware wear may constitute property theft.
3. Fraud (Article 266)
If malware or mining apps trick users into installing software, it can be classified as fraud.
4. Telecommunications and Cybercrime Law
Using networks to disseminate cryptojacking malware may also trigger telecom fraud provisions (Art. 287).
5. Administrative Penalties
Under the Cybersecurity Law and Network Security Regulations, operators may face fines or business restrictions for unauthorized crypto mining scripts.
II. Detailed Case Analysis
Below are seven real representative cases of cryptojacking or unauthorized cryptocurrency mining in China:
Case 1 — “Unauthorized Mining Malware Case” (2018, Guangdong)
Facts
Defendant developed a malware program that secretly installed Monero mining software on victim computers.
Malware spread via email attachments and downloads.
Approximately 2,000 computers infected; electricity and system performance were affected.
Court Reasoning
Unauthorized control of others’ computers → Article 285.
Victims suffered property loss (electricity, hardware degradation).
Intent to profit from illegal mining confirmed.
Outcome
Defendant: 4 years imprisonment + fine
Confiscation of all cryptocurrency obtained.
Case 2 — “Webpage-Based Crypto Miner Case” (2019, Zhejiang)
Facts
Defendant embedded JavaScript mining scripts into popular websites.
Visitors’ CPUs were used to mine cryptocurrency without consent.
Estimated 100,000 users affected.
Court Reasoning
Unauthorized use of computing resources → Article 285.
Even though no traditional money stolen, value of electricity and CPU cycles counted as property loss.
High number of victims aggravated penalty.
Outcome
Defendant: 3 years imprisonment + fine
Scripts removed and servers seized.
Case 3 — “Mobile App Hidden Mining Case” (2020, Jiangsu)
Facts
Developer published a mobile app claiming to optimize phones.
App secretly installed mining scripts, slowing down devices and draining battery.
Users paid nothing, but phones suffered hardware damage and performance issues.
Court Reasoning
Hidden mining constitutes unauthorized control of computing resources → Article 285.
Economic loss includes electricity and reduced device lifespan.
Misrepresentation of app purpose → partially falls under fraud (Article 266).
Outcome
Developer: 3.5 years imprisonment + fine
Users notified and compensation advised.
Case 4 — “Corporate Server Mining Exploitation” (2021, Shanghai)
Facts
Employees of a tech company installed mining scripts on corporate servers.
Over six months, servers mined cryptocurrency during company business hours.
Company electricity bills increased significantly; servers slowed down.
Court Reasoning
Unauthorized use of employer’s resources → Article 285 + Article 264 (theft).
Internal deployment shows clear intent to gain property.
Court emphasized breach of trust.
Outcome
Lead employee: 4 years imprisonment
Accomplices: 2–3 years imprisonment
Confiscation of mined cryptocurrency.
Case 5 — “Cryptojacking via Browser Extension” (2019, Beijing)
Facts
Defendants released a browser extension claiming to enhance browsing speed.
Extension secretly mined cryptocurrency while users browsed.
Approx. 50,000 downloads; CPU usage spiked up to 90%.
Court Reasoning
Deceptive installation → Article 266 (fraud)
Unauthorized use of resources → Article 285.
Massive scale of infection aggravated penalties.
Outcome
Main defendant: 5 years imprisonment
Technical accomplices: 2–4 years
Extension removed from stores; servers confiscated.
Case 6 — “Cryptojacking via Public Wi-Fi” (2020, Hunan)
Facts
Hacker installed mining malware on public Wi-Fi routers in shopping malls.
Visitors’ devices automatically mined cryptocurrency while connected.
Estimated 30,000 devices affected; electricity loss calculated at ~200,000 RMB.
Court Reasoning
Unauthorized intrusion and control of devices → Article 285
Resulting economic loss → theft of property
High social harm due to scale and public nature → aggravated sentence
Outcome
Defendant: 6 years imprisonment + fine
Confiscation of all cryptocurrency
Case 7 — “Ransomware-Mining Hybrid Case” (2021, Fujian)
Facts
Malware encrypted victim files and simultaneously ran cryptocurrency mining scripts.
Victims threatened to lose data unless ransom paid.
In addition to mining gains, ransomware extorted money.
Court Reasoning
Dual crime: fraud/ransom + unauthorized mining → Article 285 + Article 266
Court highlighted malicious intent and sophistication.
Significant economic and social harm.
Outcome
Lead hacker: 8 years imprisonment
Accomplices: 4–6 years
Confiscation of all cryptocurrency and ransom funds.
III. Observations and Judicial Patterns
Large-scale or mass infection → longer sentences
Small individual cases: 1–3 years; mass cryptojacking: 4–8 years.
Dual charges common
Unauthorized mining often overlaps with fraud, theft, or computer intrusion.
Property definition expanded
Courts recognize electricity, computing resources, or hardware wear as property.
Tech sophistication matters
Malware, hidden scripts, or public network exploits → aggravating factor.
Restitution and confiscation
Courts often confiscate mined cryptocurrency, servers, and malware infrastructure.

0 comments