DATA DOCTORS

How cybercriminals profit by exploiting computers for cryptojacking

Jun 30, 2018, 4:30 AM | Updated: 7:05 pm

FILE- In this Friday, Dec. 8, 2017, file photo, a man uses a Bitcoin ATM in Hong Kong. (AP Photo/Ki...

FILE- In this Friday, Dec. 8, 2017, file photo, a man uses a Bitcoin ATM in Hong Kong. (AP Photo/Kin Cheung, File)

(AP Photo/Kin Cheung, File)

Q: What is “Cryptojacking”?

A: Cybercriminals are constantly exploring methods to exploit users for profit and with the popularity of cryptocurrencies on the rise, so is the malware that allows for cryptojacking.

Cryptojacking is the hijacking of Internet connected devices to secretly make use of the processor for the mining of cryptocurrency. The “mining” process is essentially computing devices solving complicated math problems that result in financial rewards to the “miner.”

By exploiting computers around the world, the bad guys avoid having to spend money on lots of computers in order to do the mining, which is why it’s becoming so popular.


Easy and Profitable

Cryptocurrencies such as Bitcoin require much more sophisticated computing configurations for profitable cryptojacking, but newer currencies like Monero are making this form of malware exploitation much more profitable.

The malicious code required to exploit victims is relatively simple to create and can be delivered in a variety of ways, which is why we’ve seen an exponential increase in detected malware. Several security firms have detected an increase of over 600 percent in exploits since the last quarter of 2017.

Another contributor to the popularity of this exploit is that unlike ransomware, there is no need to interact with your victims and it’s a relatively easy to stay anonymous while reaping the rewards.

Potential Harm

In general, the primary impact on the victim is reduced available processing power, although it’s possible for them to overwork your processor to point of failure.

They know that if you detect something is wrong or they cause damage to your computer, they can no longer make use of it without your knowledge, which is why they tend to keep your CPU usage on the lower side.

Of course, any malware in your system can potentially allow other exploits to be installed, so making sure you’re not an unwitting victim is always a good idea.

Signs of Infection

Since this particular exploit is primarily interested in using your CPU (Central Processing Unit) without your knowledge, checking your CPU usage is a good start in detection.

Windows users can use the Task Manager (Ctrl + Shift + Esc) and click on the Performance tab to see a graph of CPU usage and Mac users can do the same via the Activity Monitor.

Under normal circumstances, the CPU graph should be relatively low and flat when nothing is running, so if you see high or erratic up and down movement of the CPU when you aren’t doing anything, there’s cause for concern.

This CPU activity can be the indication of a wide variety of issues – both nefarious and common -so having someone with technical experience dig into your system is the best way to diagnose the actual cause.

Coin Hive

Another mining script you may encounter, which isn’t necessarily malware is called Coin Hive and it’s being used by websites to generate revenue in lieu of advertising. While you are visiting these websites, they can be ‘borrowing’ some of your CPU power in exchange for their information.  Once you leave, it’s no longer mining, but if you want help detecting these types of websites, you can use AdGuard to alert you.

Data Doctors

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can ma...

Data Doctors

Here are all the tips we know regarding how to spot deep fake videos

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can make detection a bit more difficult.

4 days ago

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

11 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

18 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

25 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are the truly free smartphone video editing apps

The processing power on our smartphones has grown exponentially, allowing anyone to perform sophisticated video editing easily.

1 month ago

Google Maps app....

Data Doctors

How to rediscover places visited years ago on Google maps

Whether you're an Android or iOS user, or prefer accessing Google Maps on your computer, you'll find step-by-step instructions to unlock your travel memories effortlessly.

1 month ago

Sponsored Articles

...

DESERT INSTITUTE FOR SPINE CARE

Desert Institute for Spine Care is the place for weekend warriors to fix their back pain

Spring has sprung and nothing is better than March in Arizona. The temperatures are perfect and with the beautiful weather, Arizona has become a hotbed for hikers, runners, golfers, pickleball players and all types of weekend warriors.

...

DISC Desert Institute for Spine Care

Sciatica pain is treatable but surgery may be required

Sciatica pain is one of the most common ailments a person can face, and if not taken seriously, it could become one of the most harmful.

...

Collins Comfort Masters

Here’s 1 way to ensure your family is drinking safe water

Water is maybe one of the most important resources in our lives, and especially if you have kids, you want them to have access to safe water.

How cybercriminals profit by exploiting computers for cryptojacking