With crypto currency mining being such a lucrative area for everyone, it was inevitable that some shady people would try to exploit other people to gain unfair advantages in the industry. Hidden mining is a form of malicious hacking that has been on the rise over the course of the last two years.
To put it simply, hidden mining refers to a situation when someone tries to install on your device an application that utilizes the computational power of your device to mine bitcoins. The sad part about it is that you don’t get your sweet share of coins earned using your device. Another obvious problem is that a user doesn’t even know that they are being exploited.
A legitimate application for a browser that can be installed on all prominent browsers such as Mozilla Firefox or Chrome can also carry a malicious code that will turn your device into a BTC mining machine. What is truly dangerous is that such hidden miners can negatively affect smart phones draining their batteries and significantly reducing performance. A user who is not technically savvy will soon discover that their device is slower and runs out of battery in a couple of hours after being fully charged.
On the other hand, devices that are infected with hidden mining software become even more vulnerable to other threats like viruses.
First of all, you should check your device. Download and install a performance monitoring app on your smart device to check the CPU load. Do the same for your PC. If your device is constantly operating at over 80% load, your machine may be infected with malicious software. Use developer tools for Chrome and Firefox and view the source code of pages for keywords like Coinhive and Crypto-loot.
What else can you do?