It is known that with the growing popularity of blockchain and cryptocurrency technology, many people want to make money on it. As a result, hackers who use other people's resources for easy profit are becoming more active. There are many different tools available today to protect user’s personal computers from cryptojacking, but effective protection for server operating systems are still actual.This paper investigates the possibility of searching for unauthorized cryptocurrency mining processes by three parameters: search for suspicious processes by name, by binary signature and by connection to the mining pool.Based on the study, a method of automated search for unauthorized cryptocurrency mining in server OS containers was proposed, which consists of 5 main stages:1. Search for unauthorized cryptocurrency generation processes by process name.2. Search by binary signature.3. Search for a connection to a mining pool4. Detection of the process of unauthorized mining and stopping the container in which the mining process was detected.5. Notification of the system administrator about the detection of unauthorized cryptocurrency generation processes.It is worth noting that, unlike existing tools, the developed method searches for containers from the host virtual machine, so that there is no need to run a search in each of the containers, as it can be a large number of them and as a result reduce the load on the system.The block diagram of the application for the implementation of the proposed method was also described, as well as examples of stopping the container in which an unauthorized mining process was found and the corresponding message to the system administrator.In addition, a study of the speed of the proposed method was conducted. The results of the test showed a time of 2,585 seconds, which reflects the fast operation and the absence of additional overload on the system.