Mining cryptocurrency is a legal activity that takes place all over the globe by millions of individuals, each generating profits using their own computer equipment to mine Bitcoin/Ethereum/other cryptocurrencies.
However, if it is done without your permission, it causes problems for you. It is often the case that they are "acting" in a manner that is either maliciously or unwittingly taking control of your systems while they generate money for someone else.
To visualize this, think of someone renting your power supply to operate a factory located in your garage. You pay for the electricity they use, and they profit from all of the work that they did with that electricity.
How They Get Onto Your Computer:
1. Phishing/E-mail: You receive an e-mail with a maliciously attached file or link. When you click the file or link, it downloads a miner script to your computer.
2. Installed Software Packages: Attackers bundle mining scripts into what appears to be legitimate applications that you download and install.
3. Exposed RDP or weak credentials: The attacker logs into your machine and installs the miner directly onto your machine.
4. Malicious Ads/Drive-by Downloads: All it takes is you visiting a compromised website, which can automatically download a miner onto your system.
What Makes Them Dangerous:
1. Resource Drain. CPU and GPU processing make much easier; therefore, they consume your computer resources and slow it down, cause your servers to overheat, and create potential overages on your electrical bills in order to operate.
2. Security Risk- If a miner can be installed by an attacker, it can be inferred that an attacker has the ability to install other payloads onto your system, so you need to understand that a miner is probably just one of many payloads.
3. Mining software hides well. Most miners are programmed to hide on your system, throttle their activity, and not appear on task manager during peak usage times. Usually, they will stop everything and avoid being seen by anti-virus applications on your computer.
4. Mine owners also access the internet through remote servers; this creates an increase in outbound traffic and gives attackers more ways to attack your network.
Detecting Miners:
1. An unexplained spike in CPU/GPU usage.Your computer seems to be sluggish or runs slower than normal, although there aren't any heavy apps running
2. Wierd outbound traffic
3. Processes that have never been seen on your computer
How To Protect Your Computer
1. Always Use The Latest Versions Of Software Products
A newer version of Microsoft Windows or Internet Explorer includes patches that fix potential vulnerabilities.
2. Secure Your Remote Access Connection
A good way of protecting against remote access attacks is to use complex passwords and to use multiple factors of authentication, along with disabling unused ports for remote desktop access.
3. Regularly Review Your Computer Activities
You may wish to periodically check the overall level of activity occurring on your computer. For example, watch for sudden increases in CPU activity, high amounts of outbound data being sent from your computer, and processes that are unfamiliar to you.
4. Educate End Users
Instruct end users not to click on suspicious links or download programs they can't verify the legitimacy of before downloading/installing them.
5. Use Quality Security Products on Endpoints
Many modern malware detection tools (antivirus and end-point detection and response tools). Many modern tools are able to detect coin miner scripts and block them.
While crypto miners are often seen as an annoyance, it’s possible that these operations are also indicative of someone already having access to your systems. When crypto miners are detected and removed quickly, you will not only reduce your electricity bills and protect your equipment, but you will also be able to safeguard your sensitive information.
In cybersecurity, small indicators of mining activity can sometimes lead you to discover larger underlying issues. In this way, crypto miners can be thought of as the loud roommate that you cannot avoid, and by following the noise of a miner, you will frequently be able to discover a larger issue that you may not have known existed.
© 2016 - 2025 Red Secure Tech Ltd. Registered in England and Wales under Company Number: 15581067