Is your computer secretly being used for cryptomining?
It’s staggering to realize that Bitcoin, the very first cryptocurrency, splashed onto the scene almost a decade ago. It’s only been over this past year that digital coinage has really gained its tremendous popularity. As of January 2018, there are well over one thousand varieties of cryptocurrency in circulation — Bitcoin, Monero, Ethereum, Ripple, Litecoin, IOTA and many more.
But whether you participate in the buying and selling of cyptocurrency or you know nothing about it, you could be a victim of cryptojacking. Oftentimes, people don’t even notice that their machine has been hijacked. Here’s what you need to know in order to defend yourself.
Cryptocurrency is digital money you use to make secure and anonymous online payments without involving a bank. All the purchases and transfers are encrypted, stored, and recorded in a ledger known as a blockchain, a kind of living history book of cryptocurrency, all its data securely encrypted with uncrackable code.
Every single transaction for every single bit of cryptocurrency is recorded in the blockchain. This requires an enormous amount of computer processing power, and that’s where the cryptominers come in.
It’s true. Cryptomining is a legitimate new business where companies and individuals dedicate a considerable amount of CPU power to cryptomining, an intensive process of computing and solving complicated mathematical problems in order to earn a Proof of Work, or PoW, which verifies the next block in the chain. Cryptomining serves two purposes — it updates the ledger and it releases more cryptocurrency into the system.
It also pays very well. The current reward for mining a block is 12.5 BTC (Bitcoins), which today is worth just under $140,000. That’s why everyone is getting in on the act. Cryptocurrency has become big money.
With such serious bread behind that digital dough, of course cybercriminals wanted in. They even thought around the problem of the massive computer resources required — why invest in expensive equipment and processing chips when you can get other people’s computers to do the work for you?
One tricky aspect of mining malware is that it occurs in the background, and the common user sees no sign that it’s happening. There are no obvious signs, unless your computer is overheating or slowing down substantially in how it performs very simple processing tasks.
So, while cryptomining is legal, if you want to stop others from cryptojacking your computer or avoid cryptomining altogether, you have a couple of options:
Defend your digital life, and stay tuned to this blog for up-to-date news on the latest trends and threats.
Avast researchers detect covert malware affecting multiple apps
Catch up on this week’s security news covering IoT security code of practice, a more privacy-focused version of Android, and an Uber data breach lawsuit.