11800430005
academy
Security
Privacy
Performance
English
Avast Academy Security Hacking Protect Yourself from Cryptojacking

Protect Yourself from Cryptojacking

Is your computer secretly being used for cryptomining? It’s staggering to realize that Bitcoin, the very first cryptocurrency, entered into circulation over a decade ago. But only over the past few years has the cryptocurrency world taken off. Keep reading to learn more about cryptojacking and how to protect yourself from hackers taking over your machine to mine cryptocurrency.

PC-editors-choice-icon
2023
Editors' choice
AV-Test-Top-product-icon
2022
Top Rated
Product
Protect_yourself_from_cryptojacking-Hero
Written by Martin Hron
Published on February 3, 2018

There are well over one thousand varieties of cryptocurrency in circulation — Bitcoin, Monero, Ethereum, Ripple, Litecoin, IOTA, and many more.

But whether you participate in the buying and selling of cryptocurrency or you know nothing about it, you could be a victim of cryptojacking. Oftentimes, people don’t even notice that their machine has been hijacked. Here’s what you need to know in order to defend yourself.

Hamburguer menu icon

This Article Contains:

    It’s the age of cryptocurrency

    Cryptocurrency is digital money you use to make secure and anonymous online payments without involving a bank. All the purchases and transfers are encrypted, stored, and recorded in a ledger known as a blockchain, a kind of living history book of cryptocurrency, all its data securely encrypted with uncrackable code.

    Every single transaction for every single bit of cryptocurrency is recorded in the blockchain. This requires an enormous amount of computer processing power, and that’s where the cryptominers come in.

    Cryptomining is legal

    It’s true. Cryptomining is a legitimate new business where companies and individuals dedicate a considerable amount of CPU power to cryptomining, an intensive process of computing and solving complicated mathematical problems in order to earn a Proof of Work, or PoW, which verifies the next block in the chain. Cryptomining serves two purposes — it updates the ledger and it releases more cryptocurrency into the system.

    It also pays very well. The current reward for mining a block is 12.5 BTC (Bitcoins), which today is worth just under $140,000. That’s why everyone is getting in on the act. Cryptocurrency has become big money.

    Cryptojacking is on the rise

    With such serious bread behind that digital dough, of course cybercriminals wanted in. They even thought around the problem of the massive computer resources required — why invest in expensive equipment and processing chips when you can get other people’s computers to do the work for you?

    In-browser cryptojacking is a very popular trick because it uses JavaScript to implant miners onto any machine that visits an infected website. The mining usually stops after you leave that website, but there were several attempts to spin up a new hidden browser window which continues mining even if you leave that web page. The miner hijacks your CPU (usually without your knowledge or consent) and redirects its power towards earning the next PoW. This takes advantage of not only your computer but also your electric bill. Worse, if forced to crank its full power for too long, your computer could overheat and you could see some programs malfunction. In the case of mobile devices, this can even lead to destruction of the device by overheating its battery or greatly reducing the device’s lifespan.

    Protect against cryptomining

    One tricky aspect of mining malware is that it occurs in the background, and the common user sees no sign that it’s happening. There are no obvious signs, unless your computer is overheating or slowing down substantially in how it performs very simple processing tasks.

    So, while cryptomining is legal, if you want to stop others from cryptojacking your computer or avoid cryptomining altogether, you have a couple of options:

    1. One option to protect yourself from cryptomining / cryptojacking traps as you surf the world wild web — that’s not a typo — is to use an extension which automatically blocks the most common JavaScript miners.

    2. Use a strong antivirus software that protects against cryptojacking by detecting all unsecure websites and blocking anything malicious, including cryptomining.

    3. Always make sure your Windows software is updated to prevent against vulnerabilities like EternalBlue which can be used to spread cryptomining attacks.

    Defend your digital life, and stay tuned to this blog for up-to-date news on the latest trends and threats.

    Get Avast One for iPhone to block hackers and malware

    FREE INSTALL

    Get Avast One for Android to block hackers and malware

    FREE INSTALL
    Hacking
    Security
    Martin Hron
    3-02-2018