What is Cryptojacking and how to protect yourself from cryptomining malware? (2024)

What is cryptojacking?

Cryptojacking is when hackers run malware on other people’s hardware to secretly mine cryptocurrency. This normally requires considerable processing power, but cryptojacking attacks allow hackers to mine cryptocurrency quickly and efficiently, without having to use their own computing resources.

This Article Contains:

This Article Contains:

    See all Security articles

    What is Cryptojacking and how to protect yourself from cryptomining malware? (1)

    This Article Contains:

      Owing to Bitcoin’s popularity, cryptojacking malware is sometimes referred to as a “bitcoin virus” or “bitminer virus.” But to make serious money from cryptomining, substantial, expensive computer power is needed. A University of Cambridge study found that Bitcoin mining consumes more power than entire countries.

      Cybercrooks’ solution is to use phishing emails, malicious links and downloads, search engine viruses, or social engineering tricks to hijack cryptomining resources from other people’s laptops, desktop PCs, phones, and tablets.

      How does cryptojacking work?

      All cryptojacking works the same way in principle. Cryptomining malware runs stealthily in the background, hijacking the victim’s central processing unit (CPU) and graphics processing unit (GPU) to “mine” fresh bits of cryptocurrency by solving complex math problems that verify crypto transactions. Every time a piece of cryptocurrency is “minted,” it’s sent to the attacker’s crypto-wallet.

      Cryptomining malware is specifically designed to exploit a target’s computer resources, often through a browser or JavaScript. After getting infected with cryptominer malware through a link or other malicious source, the cryptojacking code embeds itself in your machine. The mining malware then runs a script to take control of your computer and start mining cryptocurrency.

      What is Cryptojacking and how to protect yourself from cryptomining malware? (2)Cryptojacking makes unauthorized use of third-party devices to mine cryptocurrency

      Cryptojacking attacks are sophisticated and are often run by professional cybercrime groups, but even these can still be detected by running a cryptojacking test to monitor CPU usage. And you can also prevent your own crypto from being jacked by using one of the best cryptowallets that offer advanced cryptocurrency protection.

      Examples of cryptojacking

      Cryptojackers often target large networks because it’s easier to conceal an illicit cryptomining operation on a network that already uses huge amounts of computing resources. But Bitcoin viruses also target regular people, in which case the cryptojacking malware is tweaked to mine smaller amounts and stay hidden.

      Here are some high-profile examples of recent cryptojacking malware attacks:

      Types of cryptojacking attacks

      There are three main types of cryptomining attacks. While they all usually come in the form of a bitcoin miner infection — Bitcoin is the most widely used cryptocurrency — Monero (XMR), Ethereum (ETH), ZCash (ZEC), and other cryptocurrencies can be targeted too.

      In-browser hijacking

      In-browser hijacking is when extensions or browser tabs from infected sites run cryptojacking code hidden inside them, like when the creators of the SafeBrowse extension embedded Javascript in the extension’s code to mine for Monero using its clients’ CPUs. In-browser hijacking can be extremely stealthy — the only sign of a cryptojacking infection may be a certain tab or extension draining excessive resources for no apparent reason.

      In-host hijacking

      In-host hijacking is when cryptomining malware, often in the form of a trojan, infiltrates a host computer through phishing emails, search engine viruses, malicious links, or other attacks. Since in-host hijacking infiltrates the host machine itself, and is not limited to a browser, it can be used to cryptojack a wide variety of computer or network resources. The most commonly detected cryptomining malware in recent years is an in-host trojan miner called XMRig.

      In-memory hijacking

      In-memory hijacking is when the random access memory (RAM) of a system is targeted directly, often with “fileless” methods that turn legitimate commands or pre-installed executables on the operating system into cryptojacking malware. This makes fileless in-memory cryptojackers such as WindDefscan.exe particularly difficult to detect — especially since it forces Task Manager to shut down immediately upon opening.

      What is Cryptojacking and how to protect yourself from cryptomining malware? (3)In-browser, in-host, and in-system hijackers are the three main types of cryptojacking attacks

      Signs you’ve been infected with a cryptojacker

      Bitcoin miner viruses are designed to avoid arousing suspicion, but once you learn what to look out for, it’s possible to detect cryptojacking. Here are some key signs you may have been infected with cryptojacking malware:

      • High CPU usage. If your CPU is running unusually high — maybe even using 100% of its capacity — that’s a major red flag you might be suffering from cryptojacking or another form of malware.

      • Slow devices. By funneling your device’s resources to cryptomining, cryptojackers can cause noticeable slowdowns. If you notice a slow computer sudden onset of performance issues, bitcoin miner malware should be one of your top suspects.

      • Slow network. Cryptomining malware can commandeer your internet connection to communicate with devices directly controlled by the cryptojackers. If you think your bandwidth is being gobbled up, check out the reasons your phone’s data or internet might be slow before jumping to conclusions.

      • Battery dies faster. If the battery in your laptop or phone is draining much faster than usual, it could be because cryptomining malware is constantly siphoning off power to perform high-intensity processes.

      • Regular Overheating. As a byproduct of the tremendous amount of power required for cryptomining, miner viruses can cause temperature increases that overwhelm your device’s cooling system. Learn how to check CPU temperature to see how often your system’s overheating — and to what extent.

      How to remove a browser hijacker

      To get rid of an in-browser cryptojacker, or remove other types of browser hijackers, you may be able to uninstall or simply delete it after you detect it. But this could require editing your Windows registry or removing your Chrome extensions manually.

      By far the easiest and most reliable way to remove a browser hijacker — and defend against future malware or hacking attacks — is to download one of the best free antivirus tools, run a full system scan, and ensure all protection shields are enabled.

      Is cryptojacking a security risk?

      Cryptojacking is a major security risk, and an increasingly prevalent one due to the difficulty of detection and the profit incentive. Although technically not illegal if the affected device owner is first notified and allowed to opt out (rarely the case), most cryptojacking attempts are a dangerous form of unlawful hacking.

      Once cryptocurrency mining malware gets into your system, it doesn’t just have the ability to divert resources towards mining Bitcoin — it can also spy on your user activity, harvest bank account details and other private data, or even activate ransomware to hold your system hostage.

      Protect against cryptomining

      Cryptomining is generally safe if you choose to do it on your own device. But make sure you’re not downloading potentially harmful software posing as a cryptomining tool. And you should certainly take steps to prevent other people from surreptitiously cryptojacking your machine.

      Here are some tips to help prevent cryptojacking:

      • Keep your devices and software updated. Security patches in the form of updates fix vulnerabilities exposed by hackers, such as the EternalBlue exploit that wreaked havoc on Windows systems.

      • Install software from reputable sources. Illegitimate software can house bitcoin malware that executes after you install the program. Only download software from official sources, and always check reviews first.

      • Avoid suspicious websites. Torrenting sites, illegal streaming sites, or websites that host pirated software lack the safety protocols and security infrastructure of legitimate websites. They may be teeming with bitminer malware and dangerous hackers.

      • Use ad blockers in your browser. Malicious ads, pop-ups, or fake search engines may have cryptojacking scripts embedded within. The best ad blockers can help detect and block malicious cyptomining code automatically.

      • Disable JavaScript in your browser. JavaScript is a notoriously insecure programming language that’s commonly exploited in cryptomining attacks. To disable JavaScript, go to your browser’s privacy, security, or content settings.

      • Endpoint protection. Endpoints refer to desktops, laptops, and mobile devices — any device that’s the “endpoint” of a communication network. Secure your endpoints with robust antivirus to stop cryptojackers in their tracks, and protect your crypto from being stolen.

      Secure your device with Avast One

      Avast One offers all-in-one protection against the wide array of cyberthreats — including cryptominers. Combining award-winning antivirus technology, automatic phishing and fake website blockers, and even an integrated VPN that encrypts your connection, Avast helps turn your computer into a digital fortress. Secure your device for free today.

      Get it for Mac, PC, Android

      Get it for PC, Mac, iOS

      DOWNLOAD FREE AVAST ONE

      Get it for Android, iOS, Mac

      DOWNLOAD FREE AVAST ONE

      Get it for iOS, Android, PC

      What is Cryptojacking and how to protect yourself from cryptomining malware? (2024)

      FAQs

      What is cryptojacking and how do you prevent it? ›

      Cryptojackers use your computer or smartphone to mine a cryptocurrency using malware. Cryptojackers mine cryptocurrency on your computer without you knowing. This can happen via your browser and without the need for any additional malware. There are easy ways to spot and prevent cryptojacking.

      What is cryptojacking in cyber crime? ›

      Cryptojacking is a cybercrime in which another party's computing resources are hijacked to mine cryptocurrency. Cryptojacking, which is also referred to as malicious cryptomining, lets hackers mine cryptocurrency without paying for electricity, hardware and other mining resources.

      What is crypto mining malware? ›

      Cryptomining malware runs stealthily in the background, hijacking the victim's central processing unit (CPU) and graphics processing unit (GPU) to “mine” fresh bits of cryptocurrency by solving complex math problems that verify crypto transactions.

      What is the difference between cryptojacking and cryptomining? ›

      Cryptomining is a system by which "miners" contribute computer processing power and get paid in cryptocurrency to validate blockchain transactions. In its malicious form, cryptojacking is where hackers take control of a victim's computing resources to secretly mine cryptocurrency for their own benefit.

      How do I block Cryptomining? ›

      Block Domains

      You can also block specific domains that you suspect of cryptomining. Simply open your browser, find the "Customize" drop-down, and then block a URL. To block Coinhive, you can copy/paste https://coin-hive.com/lib/coinhive.min.js into the text box.

      What is an example of cryptojacking? ›

      Cryptojacking News: Real-world Examples

      When visitors went to the Homicide Report page, their devices were used to mine Monero. It took awhile for the threat to be detected because the amount of computing power the script used was decreased, so users would not be able to tell their device had been enslaved.

      What are signs of cryptojacking? ›

      Signs you could be a victim of cryptojacking
      • A noticeable slowdown in device performance.
      • Overheating of batteries on devices.
      • Devices shutting down due to lack of available processing power.
      • Reduction in productivity of your device or router.
      • Unexpected increases in electricity costs.

      How illegal is cryptojacking? ›

      Cryptojacking might seem like a relatively harmless crime since the only thing 'stolen' is the power of the victim's computer. But the use of computing power for this criminal purpose is done without the knowledge or consent of the victim, for the benefit of criminals who are illicitly creating currency.

      What are some signs that you have cryptomining malware installed on a computer? ›

      Here are three signs to look out for that can help you determine if you've been cryptojacked:
      • Reduced performance. Since unauthorized cryptomining is an intensive process, it causes additional strain on the system, resulting in random instances of slowdown and reduced performance. ...
      • Overheating. ...
      • CPU and GPU usage spikes.
      May 30, 2024

      How do you check for crypto malware? ›

      Users can check the CPU usage via Task Manager (Windows) or Activity Monitor (macOS). The CPU usage should generally stay below 20-30%, but it exhibiting unexpected spikes can be the result of a crypto malware running in the background.

      Can antivirus detect cryptojacking? ›

      A comprehensive cybersecurity program such as Kaspersky Total Security will help to detect threats across the board and can provide cryptojacking malware protection. As with all other malware precautions, it is much better to install security before you become a victim.

      Can Malwarebytes detect Bitcoin miners? ›

      BitCoinMiner is Malwarebytes' generic detection name for crypto-currency miners that may be active on a system without user consent.

      How do I stop bitcoin mining on my computer? ›

      There are also specialized programs, such as “No Coin” and “MinerBlock,” which block mining activities in popular browsers. Both have extensions for Chrome, Firefox, and Opera. Opera's latest versions even have NoCoin built in.

      What is cryptomining protection? ›

      What is Cryptomining Protection? Bitdefender's Cryptomining Protection feature defends Windows computers against the growing threat of unauthorized crypto-mining activities, a malicious practice that exploits a user's resources and electricity to generate revenue for attackers.

      How do you know if you have been cryptojacked? ›

      Check to See if Your Browser Is Secretly Still Running

      Cryptojackers typically run through your browser and can create a tiny “pop-up” browser window that hides behind your Start button or toolbar, so it can continue to consume computer resources even after you think you've closed your browser.

      How do I tell if my PC is being used for bitcoin mining? ›

      Is your PC Infected with a Crypto Miner? Here's How to Find Out
      1. High CPU or GPU Usage. ...
      2. Increased fan noise and overheating. ...
      3. Decrease in performance. ...
      4. Unexplained Network Activity. ...
      5. Crashes and more crashes. ...
      6. Short battery life. ...
      7. Unknown Processes in Task Manager. ...
      8. Blocked access to system monitoring tools.
      Jun 12, 2024

      How can cryptocurrency crime be prevented? ›

      Ultimately, successfully combating crypto crime requires a unified effort from government institutions, law enforcement, and legislators. They play an essential role in developing, implementing, and enforcing crypto policies and regulations related to cryptocurrencies and blockchain technology.

      How would anyone prevent themselves being a victim of cryptojacking? ›

      Use anti-cryptomining extensions—cryptojacking scripts are generally deployed in web browsers. Use browser extensions, including No Coin, minerBlock, and Anti Minder, to block cryptominers across the web. Use ad-blockers—cryptojacking scripts are often embedded in web ads.

      Top Articles
      Latest Posts
      Article information

      Author: Dong Thiel

      Last Updated:

      Views: 5933

      Rating: 4.9 / 5 (79 voted)

      Reviews: 86% of readers found this page helpful

      Author information

      Name: Dong Thiel

      Birthday: 2001-07-14

      Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

      Phone: +3512198379449

      Job: Design Planner

      Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

      Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.