You may have heard about cryptojacking. Or maybe you haven’t, but you have noticed that your computer or another device has become slower or noisier lately. Either way this article will tell you about cryptojacking and help you protect your device from it.
Cryptojacking is an illegal activity connected to using a device for mining cryptocurrency without the device owner’s consent. In the past several years such activity was said to raise up to 25% of all malware attacks. The reason for this is the cryptocurrency mining boom and general growth of cryptocurrencies’ popularity. As you probably know, building a mining farm and even cloud mining are quite expensive. Hackers and malicious miners have discovered several ways to save their money and resourced by using the power of other people’s computers, smartphones, tablets and other devices for their own good.
Unlike regular computer viruses, spy programs and ransomware, cryptojacking does not intent to steal your passwords, credit card details or block your device to demand a payment for unblocking. Instead they steal your computing power, processor memory and electricity to mine their own cryptocoins with it. Most often the mined coins are those with high levels and anonymity such as Monero or Zcash because they are harder to track.
Though cryptojacking does not harm you directly, it is slowing your computer, shortens its lifetime and increases your electricity bills.
Cryptojacking malware is designed to be as stealthy as possible. It doesn’t show you pop-ups or delete your files. In most cases you can only notice that something is wring when your device starts repeatedly slowing down while its cooling system starts working harder than usual.
The algorithms of infecting your device with the cryptojacking malware is similar to most other infection algorithms. There are two common ways to do it:
There are several things you can do to protect yourself from cryptojacking: