Your computer could be mining cryptocurrency now – here’s how to stop it

0
466

 

Welcome to Hard Fork Basics, a collection of tips, tricks, guides, and advice to keep you up to date in the cryptocurrency and blockchain world.

Every week there seems to be an alert for a new cryptocurrency hack or scam. Honest, hardworking cryptocurrency hodlers need to be aware of the risks that come with digital assets, lest they be stolen or extorted from them in embarrassing ways.

Cryptojacking is fast becoming one of the internet’s biggest threats, but most people don’t even know what it is or what to do about it. If you do want to understand cryptojacking better and know how to protect yourself from it, just read on.

What is cryptojacking?

To the uninitiated cryptojacking might sound complex, but in principle, it’s actually quite simple.

Cryptojacking is the name given to a type of malicious hack that steals your computer’s hardware resources to mine cryptocurrency for someone else. As a result, you’ll be paying the electricity bill and reaping none of the rewards.

Have I been cryptojacked?

Cryptojacking uses your computer resources to mine cryptocurrency, which is very CPU intensive. If your computer seems to be running hotter and noisier than normal, then you might have been cryptojacked. Just listen to how loud commercial cryptocurrency mining operations are.

One of the quickest, easiest, and in fact, best ways of confirming if you’ve been cryptojacked is to fire up your computer’s resource monitor and check your CPU use. For Windows, you can use Task Manager and for Mac users, the Activity Monitor.

For reference, here’s what normal CPU usage should look like.

Task Manager normal performance
Source: Howtogeek.com
Activity Monitor

If your CPU is working at full capacity all the time, even when you think it should be idling, then you may have been cryptojacked.

You can also get a confirmation by using this cryptojacking test, made by the good folks over at Opera. Just visit the link in your web-browser, click start, and await your results.

Luckily, there are a number of things we can do to protect ourselves against cryptojackers and keep our hardware out of their hands.

How to protect yourself against cryptojackers

Cryptojacking comes in many shapes and sizes — making it difficult to counteract — but attackers generally share a few common tactics. Some hackers run malicious script on websites that you might visit, and others infect your computer when you click on dodgy links. Some even hide the code alongside legitimate software updates.

One of the most common forms of cryptojacking infects web browsers and websites with malicious code. Every time you run your web browser or visit an infected site you inadvertently mine cryptocurrency for people who don’t really deserve it.

Usually, if you stop the code, you stop the cryptojacking. The first port of call should be to run a good anti-virus. The likes of Avast and Norton are adding cryptojacking definitions to their virus libraries to pick up on these cybernasties.

If cryptojackers have managed to sink their claws into your browser, then the best response is to update your browser and install a cryptocurrency mining blocker extension.

Chrome has a few to choose from. Top rated extensions include minerBlock, No Coin, and Coin-Hive Blocker. Firefox also features NoMiner in addition to its own version of minerBlock.

If you’re a webmaster and concerned about the sites you look after check here for information on how to keep your internet real-estate protected.

Another increasingly popular form of cryptojacking is to infect routers with mining scripts. After all, they’re always switched on, and people rarely perform any kind of maintenance on them.

Establishing whether your router has been hit by cryptojackers is a much more technical process, which involves monitoring web-traffic. So for most of us, the best plan of action is to update your router’s firmware to the latest version to ensure it’s as secure as it can be.

Source: The Next Web

To Read Our Daily News Updates, Please Visit Inventiva Or Subscribe Our Newsletter & Push.

Comments

comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.