How cybercriminals profit by exploiting computers for cryptojacking

Jun 30, 2018, 4:30 AM | Updated: 7:05 pm
FILE- In this Friday, Dec. 8, 2017, file photo, a man uses a Bitcoin ATM in Hong Kong. (AP Photo/Ki...

FILE- In this Friday, Dec. 8, 2017, file photo, a man uses a Bitcoin ATM in Hong Kong. (AP Photo/Kin Cheung, File)

(AP Photo/Kin Cheung, File)

Q: What is “Cryptojacking”?

A: Cybercriminals are constantly exploring methods to exploit users for profit and with the popularity of cryptocurrencies on the rise, so is the malware that allows for cryptojacking.

Cryptojacking is the hijacking of Internet connected devices to secretly make use of the processor for the mining of cryptocurrency. The “mining” process is essentially computing devices solving complicated math problems that result in financial rewards to the “miner.”

By exploiting computers around the world, the bad guys avoid having to spend money on lots of computers in order to do the mining, which is why it’s becoming so popular.

Easy and Profitable

Cryptocurrencies such as Bitcoin require much more sophisticated computing configurations for profitable cryptojacking, but newer currencies like Monero are making this form of malware exploitation much more profitable.

The malicious code required to exploit victims is relatively simple to create and can be delivered in a variety of ways, which is why we’ve seen an exponential increase in detected malware. Several security firms have detected an increase of over 600 percent in exploits since the last quarter of 2017.

Another contributor to the popularity of this exploit is that unlike ransomware, there is no need to interact with your victims and it’s a relatively easy to stay anonymous while reaping the rewards.

Potential Harm

In general, the primary impact on the victim is reduced available processing power, although it’s possible for them to overwork your processor to point of failure.

They know that if you detect something is wrong or they cause damage to your computer, they can no longer make use of it without your knowledge, which is why they tend to keep your CPU usage on the lower side.

Of course, any malware in your system can potentially allow other exploits to be installed, so making sure you’re not an unwitting victim is always a good idea.

Signs of Infection

Since this particular exploit is primarily interested in using your CPU (Central Processing Unit) without your knowledge, checking your CPU usage is a good start in detection.

Windows users can use the Task Manager (Ctrl + Shift + Esc) and click on the Performance tab to see a graph of CPU usage and Mac users can do the same via the Activity Monitor.

Under normal circumstances, the CPU graph should be relatively low and flat when nothing is running, so if you see high or erratic up and down movement of the CPU when you aren’t doing anything, there’s cause for concern.

This CPU activity can be the indication of a wide variety of issues – both nefarious and common -so having someone with technical experience dig into your system is the best way to diagnose the actual cause.

Coin Hive

Another mining script you may encounter, which isn’t necessarily malware is called Coin Hive and it’s being used by websites to generate revenue in lieu of advertising. While you are visiting these websites, they can be ‘borrowing’ some of your CPU power in exchange for their information.  Once you leave, it’s no longer mining, but if you want help detecting these types of websites, you can use AdGuard to alert you.

Data Doctors

(Pexels Photo)...
Ken Colburn, Data Doctors

Here are the benefits of having a virtual private network at home

A VPN is a tool that can provide a variety of security and usability services that are most useful on networks that are shared by others or when you are traveling.
6 days ago
(File Photo by Drew Angerer/Getty Images)...
Data Doctors

Here’s what you need to know about syncing multiple Windows computers

Making your computers look and work the same way has it’s obvious benefits. Both Windows 10 and 11 have the ability to sync lots of settings.
20 days ago
(Pexels Photo)...
Data Doctors

Here are conversion websites and programs that are safe to use

Q: Are file conversion websites safe to use? A: It’s not uncommon to have a file sent to you in a format your computer can’t make use of and it needs to be converted. In some cases, a program that you already have installed may be able to convert the file for you. A common […]
27 days ago
(Pexels Photo)...
Data Doctors

Here’s what you need to know about end of Facebook Trusted Contacts feature

Facebook hasn’t given a reason why they are shutting down the important Trusted Contacts security feature.
1 month ago
(Pexels Photo)...
Data Doctors

Tips to understanding full virus scan information

Depending upon your setup, there are a few things you can check for to help you understand what and where files are stored on your computer.
1 month ago
(Pexels Photo)...
Data Doctors

A handful of free and easy video editors for beginners

For those looking to get into video editing, here are a few options that work directly on smartphones, computers and tablets.
2 months ago

Sponsored Articles

Dr. Richard Carmona

Great news: Children under 5 can now get COVID-19 vaccine

After more than two years of battle with an invisible killer, we can now vaccinate the youngest among us against COVID-19. This is great news.

Best retirement savings rates hit 4.30%

Maximize your retirement savings with guaranteed fixed rates up to 4.30%. Did you know there is a financial product that can give you great interest rates as you build your retirement savings and provide you with a paycheck for life once you retire? It might sound too good to be true but it is not; this product is called an annuity.
Day & Night Air

Tips to lower your energy bill in the Arizona heat

Does your summer electric bill make you groan? Are you looking for effective ways to reduce your bill?
How cybercriminals profit by exploiting computers for cryptojacking