Cases when users of “bottom”, are becoming increasingly common in the cryptocurrency world: the growth trend characterized by geometric progression. In this article we will look at how to reveal the hidden miner’s work on the device, and also consider ways to eliminate this danger.
According to experts antivirus company Symantec, in the 2017th year, cases of latent mining has increased 340 times.
According to statistics provided by antivirus company Malwarebytes, one March 2018, the year accounts for about 16 million cases of attempts at covert mining cryptocurrency assets. In the period from January to March this year, the indicators of the latent mining increased by 4000 percent compared with data from the previous quarter.
The expert noted a decrease in the number of hacker attacks with the use of ransomware by 35 percent. Earlier a similar type of attack has been extremely popular among hackers. An example of this can be the work of viruses and Petya WannaCry.
According to a study conducted by specialists of the National centre of cyber security in the UK, the main threat to users of Internet resources in the next two years will be a hidden mining.
This article is dedicated to consideration of ways of identifying hidden miners on the device, as well as possible prevention of damage.
What is the hidden mining
Hidden miner is a specialized program that is able to mine crypto-currencies on the user’s device in a stealth mode. Other names of this software: miner bot stealth miner botnet. This software has the ability to use resources and equipment transfer of assets the user to the wallets of their creators, provided that the miner is successfully installed on the device.
The principle of the miner is a little different from the functioning of viruses. Bot also first simulates the system files, and then produces all the necessary for money transfer operations and “loads” the OS.
If viruses harm the computer system, the work of the hidden miner’s organized differently. They used all available resources of equipment for mining cryptocurrency tokens, after which they are transferred to the wallet of the developer of malicious software.
Compared with classic viruses, stealing and forwarding information from the computer miner-viruses use the full potential of the gadgets to achieve this goal.
Likely victims of hidden miners
From work stealth miner may suffer each user. The list of facilities that are at risk are the servers of major corporations and home PCs, especially gaming. The work of the miners is carried out on all available platforms, operating systems, browsers, and devices.
A significant role in the emergence of hidden miners performed the yield on the cryptocurrency market tokens for the extraction which doesn’t require the creation of miningof farms. For this purpose it is enough average power devices. The most popular among hackers use zcash for tokens and Monero.
As specialists declare, ESET, software distribution-miners in several ways:
- search user information and the direction of the compromised resource, which was hosted malware PC. It is also possible to send the user to the site, which the developers have taken care of adding in the source code of the infected fragment that allows you to earn on the visitors. The result is the triggering of a script that uses the resources of technology. This approach is very popular and suitable for use on all devices and OS;
- the resource usage of social networks and sharing services. The user receives messages from users from fake accounts, which referred to the victory of the visitor in the contest and win large sums. To receive the prize, the user must click on the proposed link that provides the download of malicious content to the device. For stationary PCs and laptops these files are with extension .exe and for mobile gadgets .apk. often the malicious software popularized within the game portals and forums in the form of update versions, pirated versions for free use.
How to identify hidden mining
Like the experts advise, ISSP, the first thing to do is to check “task Manager” on the device. The presence of miner’s rule would indicate a higher percentage of processor utilization, CPU and GPU – the figure will be between 70 to 100 percent.
The main signs of the presence of hidden miner on the device are failures in the technology, presented in different variants:
- violations of the information system;
- the rapid capacity loss of the battery;
- excessive heating of the device;
- the presence of suspicious activity and the processor;
- increased volume of the graphics processor;
- an increased level of energy consumption.
The cause of the hidden dangers of mining
If the device is home to a hidden miner, it threatens the owner of higher bills for energy consumption, the release of the gadget from the system, since equipment resources by malicious software. This also affects the duration of the run different programs.
Even more damage in comparison with the work of the hidden miner may cause unauthorized access to user data. For example, the acquisition of the scammers access passwords that will facilitate the embezzlement of funds from the account of the user.
When accessing the botnet data the device likely consequent lock the control panel of the gadget. For example, some miners available lock options removal of miner.
The ways of neutralization of hidden miners
As suggest the users the experts of the company ESET, you need to install and use current antivirus software that allows you to block threats at the stage of uploading them to the device. When infected, the computer must run a full scan and to remove unwanted and possibly dangerous programs.
In case of contact with the user to a website infected with malware, you must close the resource and to clean the Cache of your browser. In the absence of reaction of a botnet on all of these measures the best option is to consult a qualified specialist in order to avoid deterioration of the situation.
As the “treatment” of the hidden mining
Effective scan their device for the presence of malicious software is special a free utility called Malwarebytes and AdwCleaner Supplement.
The utility is responsible for checking RAM and hard drives for viruses, and the addition of the presence of adware programs. Regular scanning with a higher chance to prevent the action of the hidden mining and to improve the security of the device.
As one of the measures used in the browser can be used extensions NoCoin, ScriptBlock, MinerBlock – they provide locking of pirated scripts and hamper the work likely threat algorithms.