Cryptojacking and Malicious Cryptominers

3 min read

3 min read

Malicious cryptominers belong to the category of malicious code designed to hijack idle processing power of a victim’s device and use it to mine cryptocurrency. Victims are not asked to consent to such activity and even may be unaware that it is happening in the background.

What are malicious cryptominers?

Formerly, most malicious crypto-mining code tried to download and run an executable on the targeted devices.


However, a different form of crypto-mining malware has recently become very popular – in-browser mining that uses simple JavaScript. This method - also dubbed cryptojacking - enables the same malicious activity to be executed directly in a victim’s browser, without installing any software.

Read more

Nowadays, most cryptomining scripts and executables mine Monero. This cryptocurrency has many advantages over the better-known bitcoin: it offers anonymous transactions and can be mined with regular CPUs and GPUs instead of expensive, specialized hardware.

Cryptomining and cryptojacking cyberattacks have been detected on all popular desktop platforms, as well as on Android devices. Most of them are classified as potentially unwanted applications (PUA); however, some of the detected attacks fall into the more dangerous Trojan category.

Faites passer le message et partagez en ligne

How to recognize a cryptomining attack?

Cryptomining and cryptojacking are associated with extremely high processor activity that has noticeable side-effects. Victims often report visibly reduced performance of their device, its overheating as well as increased fan activity (and thus noticeable noise).

On Android devices, the computational load can even lead to “bloating” of the battery and thus to physical damage to, or destruction of, the device.

Similar problems may be caused by a variety of issues in hardware or software; however in the case of cryptojacking, they become apparent after the victim accesses a specific website - probably one that incorporates the cryptomining JavaScript code.

How can you protect yourself from malicious cryptominers?

Use a reliable and multilayered security solution to block unwanted cryptomining and cryptojacking activity. If you notice that accessing a specific website dramatically increases the use of your CPU, close the browser.

In some cases, a reboot may be necessary in order to close the hidden browser windows, which continue with the mining in the background. After the restart, don’t allow your browser to autoload the previous session, as this might re-open the cryptojacking tab.

ESET protects you against malicious cryptominers

ESET HOME Security Premium

Protection puissante et multicouche pour crypter les données sensibles, gérer facilement les mots de passe, sécuriser les transactions en ligne, etc. Une solution conviviale pour une meilleure confidentialité en ligne. Sécurise les appareils Windows, macOS, Android et iOS.

ESET HOME Security Premium

Protection puissante et multicouche pour crypter les données sensibles, gérer facilement les mots de passe, sécuriser les transactions en ligne, etc. Une solution conviviale pour une meilleure confidentialité en ligne. Sécurise les appareils Windows, macOS, Android et iOS.

 

Ultimate digital security for business

Protect your company endpoints, business data and users with ESET's
multilayered technology.

Ultimate digital security for business

Protect your company endpoints, business data and users with ESET's multilayered technology.

Related topics

Firewall

Identity Theft

Spam

Phishing

Malware

Want to know more?

Follow us for all the latest tips and news

Follow us for all the latest tips and news