Is Cryptocurrency Mining Malware the New Adware? - AhelioTech (2024)

Is Cryptocurrency Mining Malware the New Adware? - AhelioTech (1)

No matter what critics say, it’s clear we’re in the midst of a digital gold rush.

Many cryptocurrencies have exploded in value in recent months; Ethereum, for instance, skyrocketed from $8 at the start of 2017 to $289 at the time of writing, while Litecoin’s value grew from $4 to $50 across the same time period. The total market capitalization of cryptocurrencies jumped to almost $180 bn from $19 bn in only 8 months!

Is Cryptocurrency Mining Malware the New Adware? - AhelioTech (2)

Of course, it’s not only tech-savvy investors who are enjoying the frothy conditions. The lively crypto market has naturally drawn the attention of cybercriminals and hackers, but it’s also attracting crafty website operators who are using sneaky code to turn website visitors into cryptocurrency miners without their consent.

The latter activity raises all sorts of interesting questions. Should in-browser mining be considered criminal activity? Is it simply the next step in the evolution of adware? Or could it be a legitimate way for developers to finance free software?

How does cryptocurrency mining work?

Cryptocurrencies are built on blockchain technology, which is essentially a distributed and decentralized ledger. The term ‘mining’ refers to a user verifying the data in this ledger over and over again. When the blockchain determines enough effort has been put into the verification process, it rewards the miner with a fraction of a digital currency.

Today, mining is so resource intensive that it’s simply not a profitable undertaking for regular people (with the exception of some minor coins, which are still relatively easy to obtain). However, that hasn’t stopped criminals from coming up with creative ways to hijack the computational power of unsuspecting victims and using their machines to mine for cryptocurrencies. In fact, cryptomining attacks have increased a staggering 600 percent in 2017, according to figures collated by IBM.

Is Cryptocurrency Mining Malware the New Adware? - AhelioTech (3)

Adylkuzz is one of the largest pieces of cryptocurrency mining malware of 2017. Exploiting the same security vulnerabilities as WannaCry, Adylkuzz affected hundreds of thousands of computer earlier this year. After successfully infecting a device, the malware installs itself and uses the victim’s computer’s resources to mine Monero, a cryptocurrency that offers greater anonymity than many of its peers. It could take a single device years to successfully mine cryptocurrency, but when recruited into a large botnet comprised of thousands or millions of devices, the mining is much more profitable (particularly when someone else is paying the electricity bill… you).

It’s only recently that we’ve seen a sharp upswing in the use of cryptomining malware, but it’s important to note that this type of attack has been around for some years. In 2014, tech giant Yahoo accidentally exposed some two million European users to cryptomining malware hidden in ads on the Yahoo homepage. Experts estimated that about 27,000 users were infected per hour the malware was on the site. Meanwhile, in 2015, uTorrent drew heavy criticism for silently bundling bitcoin miner EpicScale in an update.

While traditional cryptomining malware such as these rely on successfully infecting a machine, there’s a new wave of mining malware that requires no interaction beyond visiting a website.

The rise of in-browser cryptocurrency mining malware

All websites have operating costs. The more traffic the website attracts, the greater the costs. Many websites use online advertising to offset these expenses but – surprise, surprise – people don’t like ads. With adblock usage growing by more than 30 percent between 2016 and 2017 and web users becoming more selective with what they click on, it’s harder than ever for websites to sustain themselves using advertising revenue alone.

So what’s the solution?

According to some website owners, the answer lies in cryptocurrency mining. A number of website operators have taken to exploiting their users in order to pay their web hosting bills. Monero is almost always the currency of choice because it is optimized for CPU. JavaScript can manipulate the CPU more effectively than the GPU (graphics adapter), which most other cryptocurrencies are optimized for. By injecting devious JavaScript code known as Coinhive into their sites, website operators are able to harness the processing power of website visitors and use it to mine for Monero.

This all takes place without the visitor’s knowledge or consent because, unlike conventional mining malware, this new breed of cryptojacking doesn’t rely on your engagement. You simply visit the website, and your device is automatically transformed into a miner.

It should come as little surprise that the websites that have been caught using cryptojacking malware are those at the fringes of the internet.

For example, in September users of The Pirate Bay experienced huge system drag when visiting certain pages and soon learned that a Monero JavaScript miner was to blame. Admins of the BitTorrent site quickly responded, framing the in-browser mining as a ‘test’ to see if it could be used to replace the site’s ads, which are often riddled with malware. TorrentFreak estimated the mining malware could be netting The Pirate Bay about $12,000 per month – a figure not to be sneezed at, but a drop in the ocean compared to the $4.4 million ad revenue generated annually by leading torrent sites, as estimated by the Digital Citizens Alliance (PDF).

Showtime, a legitimate video streaming website, was also recently caught using Coinhive. The mining code was quickly pulled off the site but, in contrast to The Pirate Bay admins who were relatively transparent about the miner, Showtime has yet to acknowledge or comment on the situation.

Risks, ethics and legality: A philosophical discussion

Is Cryptocurrency Mining Malware the New Adware? - AhelioTech (4)

In-browser cryptocurrency miners are definitely on the shady side, but are they actually illegal? The answer to this question largely comes down to consent. Many users who’d been duped into mining for The Pirate Bay were upset not because their CPU power was being used to mine Monero, but because they hadn’t been consulted first. Many said they would have gladly opted in if The Pirate Bay admins had been up front from the start and transparent about their intentions.

These sentiments echo what is written in law. In 2015, the New Jersey Division of Consumer Affairs shut down TidBit, software that would allow websites to leverage visitor’s computer resources to mine for Bitcoin. The court ruled that doing so was the equivalent of illegally gaining access to someone’s computer.

“We do not believe Tidbit was created for the purpose of invading privacy,” commented Division of Consumer Affairs Acting Director Steve Lee.

“However, this potentially invasive software raised significant questions about user privacy and the ability to gain access to and potentially damage privately owned computers without the owners’ knowledge and consent.”

It’s Steve Lee’s final word that’s important: consent. In-browser mining without your consent can safely be classed as criminal activity. It devours your CPU power, uses your electricity and potentially leaves you exposed to some privacy and security concerns without giving you the choice of backing out.

If, on the other hand, you consciously agree to allow a website to take control of your hardware in favour of seeing adverts, can it really be considered illegal or malware?

How to prevent your device being hijacked for mining

Is Cryptocurrency Mining Malware the New Adware? - AhelioTech (5)

Regardless of whether you classify in-browser mining as malware, adware or an innovative way to pay the bills, chances are you’ll want to block website operators from taking control of your system’s hardware. Here are a few ways to avoid inadvertently becoming a miner:

  • Install No Coin: This lightweight, open-source browser extension monitors sites for potential in-browser mining activity and alerts you if anything suspicious occurs. It also allows you to block and whitelist sites. Available on Chrome, Firefox and Opera.
  • Be mindful of CPU spikes: Be conscious of your browsing habits and try to identify any sudden lag or system drag that occurs when you load a website. CPU spikes may also be indicated by computer fans speeding up and making more noise than usual, especially on laptops.
  • Avoid piracy sites: Any site may be hiding malware, but it has to be said that piracy sites typically pose a higher risk. Avoid wherever possible.
  • Use an antivirus: A reputable antivirus solution can identify potential threats and remove any traditional mining malware that may infect your system.

Looking to the future of cryptomining

While we’re still in the early stages of in-browser cryptocurrency mining, it’s easy to imagine that it may have legitimate applications further down the track. If in-browser mining was standardized (with, say, restrictions on maximum CPU usage and opt in/out policies) it could grow to become an effective alternative to traditional online advertising. In this scenario, in-browser mining could be used as a means of financing free software, or allowing users to support content creators they like – all while removing unsightly, potentially harmful ads from the web.

Alternatively, it could just as easily become the next form of unwanted adware and be a new source of headaches for users across the internet.

Have a glorious (non-consensual mining-free) day!

If you had to choose, would you rather see advertisem*nts or allow websites to use your computer resources to mine cryptocurrencies? Let us know in the comments below!

If you liked this post, you may want to readThe 10 Most Ridiculous Ransomware We’ve Ever Seen.

Is Cryptocurrency Mining Malware the New Adware? - AhelioTech (2024)

FAQs

Is crypto mining a malware? ›

Cryptomining malware is specifically designed to exploit a target's computer resources, often through a browser or JavaScript. After getting infected with cryptominer malware through a link or other malicious source, the cryptojacking code embeds itself in your machine.

What is cryptojacking malware? ›

Cryptojacking is a form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.

What are some signs that you have cryptomining malware installed on a computer? ›

Some common signs of a potential cryptojacking breach are slower computer speeds, unusually high CPU usage, and overheating hardware. But some cryptojackers take measures to mask these signs.

Can antivirus detect cryptojacking? ›

A comprehensive cybersecurity program such as Kaspersky Total Security will help to detect threats across the board and can provide cryptojacking malware protection. As with all other malware precautions, it is much better to install security before you become a victim.

How do I know if I have mining malware? ›

Check the CPU Temperature

A device runs at full capacity when mining a cryptocurrency. This leads to possible overheating, and the increased CPU temperature is a good indicator. The infected PC works slower and louder because Bitcoin miner viruses drain computer performance.

What is the name of the crypto mining malware? ›

XMRig was the most commonly detected crypto-mining malware worldwide in 2022, with three in four corporate users being influenced by it. Second-ranked LemonDuck affected five percent of corporate networks worldwide.

How to get rid of bitcoin mining malware? ›

Home remediation
  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.

How do I get rid of mining malware? ›

How to Delete a Miner Virus
  1. Step 1: start the system in Safe Mode. Restart your PC. ...
  2. Step 2: run antivirus software. Make sure that you have legit antivirus software installed. ...
  3. Step 3: restart your device.
  4. Step 4: Don't forget to update the OS and software. Check for system updates.
Jul 4, 2023

How do you know if you have been cryptojacked? ›

Check to See if Your Browser Is Secretly Still Running

Cryptojackers typically run through your browser and can create a tiny “pop-up” browser window that hides behind your Start button or toolbar, so it can continue to consume computer resources even after you think you've closed your browser.

How to check if you have a crypto miner virus? ›

A high and consistent CPU usage percentage could indicate the presence of a crypto malware. Users can check the CPU usage via Task Manager (Windows) or Activity Monitor (macOS).

How do I know if I have crypto virus? ›

Symptoms usually last about 1 to 2 weeks (with a range of a few days to 4 or more weeks) in people with healthy immune systems. The most common symptom of cryptosporidiosis is watery diarrhea. Some people with Crypto will have no symptoms at all.

How to block crypto mining? ›

Block Domains

You can also block specific domains that you suspect of cryptomining. Simply open your browser, find the "Customize" drop-down, and then block a URL. To block Coinhive, you can copy/paste https://coin-hive.com/lib/coinhive.min.js into the text box.

How to tell if your computer is secretly mining cryptocurrency? ›

Unusual CPU Usage. One of the most telltale signs of cryptojacking or malware infection is a sudden and unexplained spike in CPU usage. Since crypto mining requires significant computational power, an infected device will often show high CPU usage even when not performing any intensive tasks.

Which type of malware is often used for crypto mining and DDoS? ›

Crypto malware is primarily designed to mine cryptocurrencies on a target device, but it can be used for other malicious activity, too. Here are a few examples of crypto malware: Prometei. Botnets such as Prometei are networks of infected computers that can be controlled remotely, often in DDoS attacks.

Does Malwarebytes detect crypto mining? ›

CoinMiner is Malwarebytes' generic detection name for crypto-currency miners that may be active on a system without user consent.

How harmful is crypto mining? ›

Environmental impact.

Crypto mining is typically harmful to the environment because of the significant energy and equipment that are required. Nonrenewable energy production and electronic equipment manufacturing are both associated with the emission of greenhouse gases.

What is mining malware? ›

Cryptomining malware is designed to consume significant processing power as it tries potential candidates for a block header. As a result, an infected computer may display one of the following two signs: Increased resource consumption. Slowness of computers and servers.

Does mining crypto damage your computer? ›

Not necessarily. Most GPUs rely on auxiliary fans that prevent degradation during longer periods. Hence, crypto mining doesn't harm the GPU/computer until it's cleaned to prevent damage.

How safe is crypto mining? ›

2. Is Bitcoin mining safe for my computer? Bitcoin mining uses malware. Hackers have written malware with the ability to access your computer and use its resources to mine bitcoin and other cryptocurrencies. For the hacker to earn cryptocurrencies, they have to verify transactions on a blockchain.

Top Articles
Latest Posts
Article information

Author: Mrs. Angelic Larkin

Last Updated:

Views: 6488

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Mrs. Angelic Larkin

Birthday: 1992-06-28

Address: Apt. 413 8275 Mueller Overpass, South Magnolia, IA 99527-6023

Phone: +6824704719725

Job: District Real-Estate Facilitator

Hobby: Letterboxing, Vacation, Poi, Homebrewing, Mountain biking, Slacklining, Cabaret

Introduction: My name is Mrs. Angelic Larkin, I am a cute, charming, funny, determined, inexpensive, joyous, cheerful person who loves writing and wants to share my knowledge and understanding with you.