RV_ Posted July 2, 2018 Report Share Posted July 2, 2018 Excerpt: "Cryptojacking is the hot new way for criminals to make money using your hardware. A website you have open in your browser can max out your CPU to mine cryptocurrency, and cryptojacking malware is becoming increasingly common. What is Cryptojacking? Cryptojacking is an attack where the attacker runs cryptocurrency-mining software on your hardware without your permission. The attacker keeps the cryptocurrency and sells it for a profit, and you get stuck with high CPU usage and a hefty electricity bill. While Bitcoin is the most widely known cryptocurrency, cryptojacking attacks usually involve mining other cryptocurrencies. Monero is particularly common, as it’s designed so people can mine it on average PCs. Monero also has anonymity features, which means it’s difficult to track where the attacker ultimately sends the Monero they mine on their victims’ hardware. Monero is an “altcoin,” which means a non-Bitcoin cryptocurrency. Mining cryptocurrency involves running complex math equations, which use a lot of CPU power. In a typical cryptojacking attack, the mining software will be maxing out your PC’s CPU. Your PC will perform slower, use more power, and generate more heat. You might hear its fans spin up to cool itself down. If it’s a laptop, its battery will die faster. Even if it’s a desktop, it will suck down more electricity and increase your electric bill. The cost of electricity makes it hard to profitably mine with your own PC. But, with cryptojacking, the attacker doesn’t have to pay the electricity bill. They get the profits and you pay the bill. Which Devices Can Be Cryptojacked? Any device that runs software can be commandeered for cryptocurrency mining. The attacker just has to make it run mining software. “Drive-by” cryptojacking attacks can be performed against any device with a browser—a Windows PC, Mac, Linux system, Chromebook, Android phone, iPhone, or iPad. As long as you have a web page with an embedded mining script open in your browser, the attacker can use your CPU to mine for currency. They’ll lose that access as soon as you close the browser tab or navigate away from the page. There’s also cryptojacking malware, which works just like any other malware. If an attacker can take advantage of a security hole or trick you into installing their malware, they can run a mining script as a background process on your computer—whether it’s a Windows PC, Mac, or Linux system. Attackers have tried to sneak cryptocurrency miners into mobile apps, too—especially Android apps. In theory, it would even be possible for an attacker to attack a smarthome device with security holes and install cryptocurrency mining software, forcing the device to spend its limited computing power on mining cryptocurrency." There is much more in the original "How to Geek" article, including screen shots, why Malwarebytes Premium, hot links etc. here: https://www.howtogeek.com/357571/what-is-cryptojacking-and-how-can-you-protect-yourself/ Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.