If the main threat in 2017 was blocking viruses, then the trend of 2018 is “black mining”. This is the work of generating cryptocurrency, but instead of using their own resources, criminals seek to exploit other people's systems. They infect any computers they can reach and force them to perform the necessary calculations. Since we are talking about blockchain technology, it does not matter which machines, when and how much calculations are made, all the information will still be saved and eventually turn into another cryptocurrency. Only the hacker will get it, not you.
What are the dangers of cryptohacking?
Your computer, tablet, smartphone and any other computing device are forced to work at maximum load, but you will not get the result of the work. You will not be able to use the gadget, as it will monstrously slow down and freeze. Plus high power consumption, plus wear of components.
How do I know if my device is infected?
The first sign of alarm: no resource-intensive program is running, and the processor cooler is humming without stopping. You know you haven't started anything, but the system is working at full capacity. You need to open the process manager or its analogue in other operating systems and see which process loads the system the most. If you don't know it, it is most likely a miner. Forced deactivation!
How to be treated? How to provide prevention?
First, the age-old advice: do not download or run unknown programs and files. And to update antiviruses more often, they have already learned how to deal with miners. However, the problem is that the miner code is very simple and easy to embed anywhere - in an application, in a plugin, in an update to the game. Avoid unofficial content sources!
Secondly, miners hide well in the executable code of sites, so if, when you open a certain page, you feel how suddenly the system starts working with effort, this is an alarm. Some publishers even offer an honest choice: here's a version of the site with viewing ads, here's a clean one, but with a paid subscription, and here's another option without ads, but with a miner, so that we can make money on you while you read the article.
Third, don't be afraid to experiment with script blockers and browser extensions. The miner could be hidden in the code and, without the knowledge of the official site owner, in the same ad banner or other element. Disabling them forcibly is your weapon against crypto hacking. For Chrome browsers, minerBlock, No Coin, and Coin-Hive Blocker have worked well. Firefox offers users the NoMiner extension in addition to its own version of minerBlock.