Is crypto secretly mined on your computer?

The so-called cryptojacking is spreading despite the stumbling crypto market. To this decision comes a new one investigation by the US cybersecurity company SonicWall.

The peddled mines on devices of the ignorant are said to have risen to $66.7 million in the first half of 2022 – a whopping 30 percent more than in the same period last year. While cryptojacking peaked in Q1 2022, secret mining leveled off somewhat from April of this year. A well-known pattern that SonicWall calls “Cryptojacking Summer Slack”.

However, large-scale cryptojacking was already observed in the early days of the corona pandemic – BTC-ECHO reported.

This is what happens with cryptojacking

Attackers are usually not interested in your coins if you have any. The business model of cryptojackers is simple: instead of investing a lot of money in expensive mining hardware, they try to mine new coins illegally using someone else’s computer or smartphone. According to this, cryptojackers are concerned with the computing power that a device can contribute to mining digital coins.

The problem: Those affected often do not even realize that their device is being used to mine cryptocurrencies. “It’s often difficult to tell if a device is infected and mining cryptocurrencies,” Luis Corrons, security ambassador for software company Avast, told BTC-ECHO.

However, there are some indications that a computer or smartphone has been affected by cryptojacking. Corrons: “Indications are that the performance of the device decreases, the device heats up quickly and the battery power decreases faster than usual.”

How can you protect yourself?

Sometimes it is enough to surf on an infected website to unintentionally make your resources available for crypto mining. As soon as you leave the corresponding website, the unwanted mining is usually stopped.

The security expert explains: “Users can check if their PC or mobile device is mining cryptocurrencies by checking the device’s task manager or activity monitor to see which application is taking up most of the device’s workload.”

However, this is not always so simple: with certain programs that can be injected into the computer, unwanted crypto mining can also run in the background without having to visit an infected website. “However, we have observed PC crypto-mining malware capable of capping power consumption for mining and stopping mining as soon as the user opens Task Manager – both tactics to avoid detection by the users to avoid,” Corrons tells BTC-ECHO.

And how best to protect yourself: “Use an antivirus solution!” recommends Corrons. “We consider websites that mine for cryptocurrencies without asking the user’s permission to be malicious, so we block scripts that try to mine in the background. We also block known malicious mining programs.”

Are you looking for the right hardware wallet?

In the BTC-ECHO guide, we show you the best providers for the secure storage of cryptocurrencies.

To the guide

source site-52