If your computer has slowed, you might be mining crypto coins for someone else — here's how to stop it (2024)

  • Latest report shows cryptomining is now the world's second-most popular malware.
  • It can cause mobile phones to overheat and explode.
  • Has your computer's fan been unusually noisy lately?

Advertisem*nt

Good news: Virtually all traditional types of malware declined in the past few months. Not so good: mainly because hackers are more interested in using your computer to help them mine cryptocurrencies.

It's likely you, or your employer, aren't even aware it's happening. Malware miners latch onto your PC and add its processing power to their efforts to stock up on Monero, ByteCoin, AEON, or any one of a number of the new breed of cryptos which don't need a mining rig the size of a city block to get meaningful returns.

Adding to the attraction is a misguided sense that it just doesn't feel as sinister as someone stealing your banking details or holding your adulterous-website membership to ransom.

There have even been recent moves by major media companies offering ad-free services in exchange for your PC's power. Some refer to it as "ethical cryptomining."

Advertisem*nt

But according to the latest quarterly report on cybercrime tactics and techniques by security-software provider Malwarebytes, "malicious cryptomining" has come from nowhere in the past few months to now being the second-most popular form of cybercrime, "nipping at the heels" of adware.

If your computer has slowed, you might be mining crypto coins for someone else — here's how to stop it (1)

Malwarebytes

Currently, adware still stands as the No. 1 threat for consumers, while spyware is the biggest threat to businesses.

Ransomware — in which victims are asked to pay up, usually in bitcoin — is up for businesses by 28%, but consumer detections fell, dragging it down to sixth spot overall. A new development saw GandCrab become the first ransomware to ask victims to pay up in a crypto other than bitcoin.

But why risk jail time by demanding a couple hundred dollars in bitcoin when you can just mine it, with a little bit of unsolicited help?

While virtually all other malware is on the decline, cryptomining is now the No. 2 threat to consumers and businesses.

Android owners, in particular, have been targeted, with Malwarebytes finding a 4000% increase for the quarter. Mac user detections were lower, but they rose 74% in March.

"Cryptocurrency mining is such a lucrative business that malware creators and distributors all over the world are drawn to it like moths to a flame," the report said.

"We've seen malicious cryptomining on a grand scale this quarter — on all platforms, devices, operating systems, and in all browsers.

Advertisem*nt

"Macs and mobile devices are not exempt; criminals have even used the cryptocurrency craze for social engineering purposes."

The most popular places for criminals to infect are servers. Windows servers, Oracle servers, and recently Amazon servers have all been infected with cryptocurrency miners. Infect the server and those using them – notably, Amazon's cloud-based AWS service – could suddenly unwittingly be hosting a miner on their website.

A recent example was found lurking on the LA Times website. And Australian government websites. And websites run by the UK's National Health System, Student Loans Co., and Northern Powergrid.

But why target Android users? The computing power is negligible, but Malwarebytes says it's easy to "up the ante" by adding miners to already malicious apps.

Advertisem*nt

A recent version, a miner added to the Loapi Trojan, pushed devices to the point that they "overheated due to the strain on the processor, their batteries bulged, and ultimately, they suffered an untimely end."

That sounds familiar.

But the biggest player is CoinHive. It's only been truly active since September 2017, when it announced an API that could mine Monero directly from within a web browser.

If your computer has slowed, you might be mining crypto coins for someone else — here's how to stop it (2)

Troy Mursch/@bad_packets/Twitter

It was launched with good intentions, but "due to several oversights, the technology was almost instantly abused," Malwarebytes reported.

Advertisem*nt

The beauty of CoinHive is, it's hard to spot because it doesn't slow down your computer a whole lot. It's used in "drive-by cryptomining."

Drive-by cryptomining is website-specific and doesn't require infecting a machine. Open the modified — such as the LA Times page noted above — and your PC starts mining Monero for someone else. Close the tab or browse away from it, and the mining stops.

You probably just get annoyed at the tardy website.

But here's a neat trick drive-by miners are using: pop-unders.

Advertisem*nt

You won't see a pop-under tab because it's like a pop-up tab, except it opens under your taskbar. Even though you think you've left the affected website, the tab keeps chugging away.

You probably left one open all last night.

CoinHive itself takes a 30% commission from all mining earnings. The fact that knowledge is so openly discussed, and there's been no notable reparation against CoinHive, is probably a large part of why cryptomining is the rising malware star of 2018.

In CoinHive's defence, it did release another API that requires users to opt in — the "ethical" cryptominer. But MalwareBytes' research shows that it was used about 30,000 times a day compared to the silent API at 3 million times a day.

Advertisem*nt

The new wave is already coming. Coin Have and CryptoLoot are No. 2 and 3. Coin Have takes 20%, but CryptoLoot claims to pay out 88%.

Cryptominers are actually advertising better rates for letting other people steal your computing power. They also promote their ability to bypass their biggest threat — ad blockers.

But here's a tip for spotting it on your PC at least: that moment when its fan is going berserk.

In January, one miner even went to the length of letting Android phone users know they were being mined, which was polite. Look at the CPU usage, off the scale:

Advertisem*nt

If your computer has slowed, you might be mining crypto coins for someone else — here's how to stop it (3)

Malwarebytes

You could opt out by "verifying yourself as human."

Malwarebytes says there's no reason to expect the rise in cryptomining to continue in 2018, especially given the value of cryptocurrencies, despite their recent dips.

The new frontier, it says, could be Internet of Things devices. How much attention are you paying to what your smart fridge is doing right now?

"While malicious cryptomining appears to be far less dangerous to the user than other forms of malware, such as ransomware, its effects should not be undermined," Malwarebytes says.

Advertisem*nt

"Indeed, unmanaged miners could seriously disrupt business or infrastructure-critical processes by overloading systems to the point where they become unresponsive and shut down.

"Under the disguise of a financially motivated attack, this could be the perfect alibi for advanced threat actors."

  • Basically, your computer's fan is going berserk. Check your CPU usage (Task Manager, Windows; Activity Monitor, Mac) and look for spikes.
  • If you're a business, Malwarebytes has just released its new Endpoint Protection and Response solution.
  • Antivirus software. The first go-to for anything like this. If you're not convinced by your built-in protection, try Kaspersky or BitDefender.
  • Adblockers help. AdBlock Plus, and AdGuard offer to scan sites for CoinHive. No Coin and Miner Block are also handy Chrome extensions.
  • And if you see an unusual program taking up your CPU usage, simply stop it, then scan for a virus.
If your computer has slowed, you might be mining crypto coins for someone else — here's how to stop it (2024)

FAQs

How do you stop someone from mining on your PC? ›

How to stop sites from mining coins with your CPU
  1. No Coin (Chrome, Firefox, Opera)
  2. minerBlock (Chrome, Firefox, Opera)
  3. Anti Miner (Chrome)
  4. Coin-Hive Blocker (Chrome)
Feb 16, 2018

How do I find out if my computer is being used for mining? ›

Windows: Open the Task Manager (Ctrl+Shift+Esc) and check the “Performance” tab. A consistent high CPU usage, especially when the device is idle, is a red flag. Mac: Use the Activity Monitor (found in Utilities) and check the CPU tab for any unusual activity.

How to tell if someone is mining bitcoin on your computer? ›

Bitcoin Miner Virus is a general name for malware that steals a computer's resources to generate cryptocurrency. This dangerous crypto mining malware mostly infects through downloads and browser-based attacks. Slow performance, lagging, and overheating are warning signs of mining malware infection.

How to get rid of mining malware? ›

How to Delete a Miner Virus
  1. Step 1: start the system in Safe Mode. Restart your PC. ...
  2. Step 2: run antivirus software. Make sure that you have legit antivirus software installed. ...
  3. Step 3: restart your device.
  4. Step 4: Don't forget to update the OS and software. Check for system updates.
Jul 4, 2023

Can antivirus detect cryptojacking? ›

If you think you are victim of Cryptojacking close all of your browser windows to exit your browser, remove any browser extensions, and run an antivirus scan. If an NJIT owned PC, open the McAfee Endpoint Security application and select “Scan System”. Otherwise, scan your computer using your installed virus protection.

How do you detect Cryptocurrency mining? ›

Highlights. Cryptocurrency mining can be detected in the network. Machine learning can be employed to detect mining services automatically. Dedicated web application collects IP addresses and service availability of various mining pool servers.

How do I know if someone is using my GPU for mining? ›

Monitor your computer's performance: If your computer is running slower than usual or if the CPU/GPU usage is unusually high, it could be a sign that someone is using it for crypto-mining. Check running processes: If you're on a Windows machine, you can press Ctrl+Shift+Esc to open the Task Manager.

Will mining damage my computer? ›

Crypto mining can strain your PC's resources, primarily through heat generation and increased wear and tear on hardware like the CPU and GPU. Proper cooling, a reliable power supply, and moderate usage are crucial to minimize risks and extend your PC's lifespan while mining.

How do I find a hidden Bitcoin miner? ›

If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan. If you don't have Malwarebytes installed yet please download it from here and install it. Once installed then open Malwarebytes and select Scan and let it run.

What is a common indicator of unauthorised crypto mining running on a system? ›

Regardless of the delivery mechanism, cryptojacking code typically works quietly in the background as unsuspecting victims use their systems normally. The only signs they might notice is slower performance, lags in execution, overheating, excessive power consumption, or abnormally high cloud computing bills.

What are the symptoms of crypto malware? ›

Devices begin to run suspiciously slower than usual since cryptojacking drains its computational resources. Processors or graphics cards get damaged without any apparent reason, or the device is overheating than usual. A high and consistent CPU usage percentage could indicate the presence of a crypto malware.

What is the common crypto mining malware? ›

Since in-host hijacking infiltrates the host machine itself, and is not limited to a browser, it can be used to cryptojack a wide variety of computer or network resources. The most commonly detected cryptomining malware in recent years is an in-host trojan miner called XMRig.

What helps defend against crypto worms and malware? ›

While no solution may fit all needs, antiviruses and VPN services can help protect you in a majority of situations. For example, NordVPN secures your connection on any type of a network you're using, and its Threat Protection feature helps protect your device from accidentally downloading malware.

What is unauthorized crypto mining? ›

Cryptojacking is a scheme to use people's devices (computers, smartphones, tablets, or even servers), without their consent or knowledge, to secretly mine cryptocurrency on the victim's dime.

How do I turn off miner? ›

Since the miner is directly connected to the power supply, there is no hard switch on the miner. You only need to pull the power plug (pulling the plug, not the power cable) to disconnect the power.

How to detect miners? ›

Cryptocurrency mining can be detected in the network. Machine learning can be employed to detect mining services automatically. Dedicated web application collects IP addresses and service availability of various mining pool servers.

Does mining harm my PC? ›

Crypto mining can strain your PC's resources, primarily through heat generation and increased wear and tear on hardware like the CPU and GPU. Proper cooling, a reliable power supply, and moderate usage are crucial to minimize risks and extend your PC's lifespan while mining.

How to stop Bitcoin miners? ›

Protect against cryptomining
  1. Keep your devices and software updated. ...
  2. Install software from reputable sources. ...
  3. Avoid suspicious websites. ...
  4. Use ad blockers in your browser. ...
  5. Disable JavaScript in your browser. ...
  6. Endpoint protection.
Jan 26, 2024

Top Articles
Latest Posts
Article information

Author: Duane Harber

Last Updated:

Views: 5789

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.