{"id":11604,"date":"2018-02-27T10:10:34","date_gmt":"2018-02-27T18:10:34","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/27\/news-5375\/"},"modified":"2018-02-27T10:10:34","modified_gmt":"2018-02-27T18:10:34","slug":"news-5375","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/27\/news-5375\/","title":{"rendered":"How to protect your computer from malicious cryptomining"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Tue, 27 Feb 2018 17:30:00 +0000<\/strong><\/p>\n<p>Noticing that your computer is running slow? While sometimes a telltale sign of infection, these days that seems doubly true. And the reason is: malicious cryptomining. So, what, exactly, is it? We&#8217;ll tell you how bad this latest malware phenomenon is for you and your computer, plus what you can do about it.<\/p>\n<h3>Definition<\/h3>\n<p>Malicious cryptomining, also sometimes called drive-by mining, is when someone else is using your computer to mine cryptocurrency like Bitcoin or Monero. But instead of cashing in on your own computer&#8217;s horsepower, the collected coins go into the other person&#8217;s account and not yours. So, essentially, they are stealing your resources to make money.<\/p>\n<p>Cryptomining can sometimes happen with consent, but unfortunately these occasions are rare.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21772 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fairwarning-600x568.png\" alt=\"visitor choice\" width=\"600\" height=\"568\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fairwarning-600x568.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fairwarning-300x284.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fairwarning.png 703w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Salon.com gave its site visitors the choice to view ads or let them mine your computer<\/em><\/p>\n<h3><em>\u00a0<\/em>How bad is it?<\/h3>\n<p>If the duration of the cryptomining is not too prolonged and you are aware of what is going on, then it&#8217;s not that big a deal for regular computer users. When you are not aware of the mining activity\u2014which is the majority of the time\u2014it is a theft of resources. This is because cryptomining takes advantage of your computer&#8217;s Central Processing Unit (CPU) and Graphics Processing Unit (GPU), running it at higher capacities. Imagine revving your car engine or running your air conditioning while driving up a steep hill.<\/p>\n<p>If cryptomining is too prolonged and running at, or near, the maximum of what your computer can handle, it can potentially slow down every other process, shorten the lifespan of your system, or ultimately brick your machine. And obviously, any malevolent threat actors want to keep using as many of your resources for as long as possible.<\/p>\n<p>Finding the origin of the high CPU usage can be difficult. Processes might be hiding themselves or masking as something legitimate in order to hinder the user from stopping the abuse. And as a bonus to the cryptominers, when your computer is running at maximum capacity, it will run ultra slow, and therefore be harder to troubleshoot. Besides the theft and the slow, possibly damaged computer, being cryptomined could also make you more vulnerable to other <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/malware\/\" target=\"_blank\" rel=\"noopener\">malware<\/a>\u00a0by introducing additional vulnerabilities to your system, like in the case of the <a href=\"http:\/\/www.tomshardware.com\/news\/claymore-miner-software-vulnerable-botnet,36356.html\" target=\"_blank\" rel=\"noopener\">Claymore Miner<\/a>.<\/p>\n<h3>Local or website?<\/h3>\n<p>When you notice high CPU usage and suspect it might be malicious cryptomining, it is important to know whether it\u2019s being done in your browser or whether your computer itself is infected. So the first thing to do is to identify the process that is gobbling up your resources. Often using the Windows Taskmanager or MacOs\u2019s\u00a0 Activity Monitor is enough to identify the culprit. But, like in the example below, the process may have the same name as a legitimate Windows file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21773\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/taskmanager.png\" alt=\"taskmanager taskhostw\" width=\"376\" height=\"185\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/taskmanager.png 376w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/taskmanager-300x148.png 300w\" sizes=\"auto, (max-width: 376px) 100vw, 376px\" \/><\/p>\n<p>In case of doubt about the legitimacy of the process, it is better to use <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/05\/process-explorer-part-2\/\" target=\"_blank\" rel=\"noopener\">Process Explorer<\/a>, which allows you to see the parent process (what started the suspicious process) and the location of the file. In the same example as we used above, Process Explorer shows you the path is different from the legitimate Windows file and the parent process is strange.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21774\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ProcessExplorer.png\" alt=\"Process Explorer taskhostw\" width=\"674\" height=\"109\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ProcessExplorer.png 674w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ProcessExplorer-300x49.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ProcessExplorer-600x97.png 600w\" sizes=\"auto, (max-width: 674px) 100vw, 674px\" \/><\/p>\n<p>And if you have the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/01\/process-explorer-now-including-virustotal-support\/\" target=\"_blank\" rel=\"noopener\">VirusTotal<\/a> check enabled, you will see that the file itself and the parent are widely detected. <em>(The Chrome detection 1\/66 is a false positive by Cylance). <\/em>Knowing this, you can stop the process to speed up your system and then start working on removing it.<\/p>\n<p>Finding the offender, however, is harder when the process is a browser like in the example below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21775\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/taskmanager2.png\" alt=\"task manager chrome\" width=\"412\" height=\"268\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/taskmanager2.png 412w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/taskmanager2-300x195.png 300w\" sizes=\"auto, (max-width: 412px) 100vw, 412px\" \/><\/p>\n<p>Of course, you can simply kill the process and hope it stays away, but knowing which tab\/site was responsible does provide you with information that can help you avoid it from happening again. Chrome has a nifty built-in tool to help you with that. It&#8217;s called the Chrome Task Manager. You can start it by clicking &#8220;More Tools&#8221; in the main menu and choosing &#8220;Task manager&#8221; there.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21776\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ChromeTaskmanager.png\" alt=\"Chrome Taskmanager\" width=\"542\" height=\"431\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ChromeTaskmanager.png 542w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ChromeTaskmanager-300x239.png 300w\" sizes=\"auto, (max-width: 542px) 100vw, 542px\" \/><\/p>\n<p>This Task Manager shows the CPU usage of the individual browser tabs and of the extensions, so if one of your extensions included a miner, this will show up in the list as well.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21780\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/GuiltyTorrent-1.png\" alt=\"Chrome Task Manager list\" width=\"784\" height=\"344\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/GuiltyTorrent-1.png 784w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/GuiltyTorrent-1-300x132.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/GuiltyTorrent-1-600x263.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/GuiltyTorrent-1-195x85.png 195w\" sizes=\"auto, (max-width: 784px) 100vw, 784px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Note that the Chrome Task Manager sometimes shows over 100 CPU usage, so I\u2019m not sure whether it\u2019s a percentage.<\/em><\/p>\n<p>An alternative method that can also be used in other browsers is to disable extensions and close tabs in reverse historical order. If disabling an extension does not help, it\u2019s easy to re-enable it. And if closing a tab does not help, you can use the \u201cReopen last closed tab\u201d option in browsers that have this option, such as Opera, Chrome, and Firefox.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21778\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/undocloseFF.png\" alt=\"undo close\" width=\"169\" height=\"151\" \/><\/p>\n<p style=\"text-align: center;\"><em>Firefox&#8217;s reopen last closed tab is called &#8220;Undo Close Tab&#8221;<\/em><\/p>\n<h3>How to protect against cryptomining<\/h3>\n<p><a href=\"http:\/\/www.malwarebytes.com\/pricing\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> stops the installation of many bundlers and Trojans that drop cryptominers on your system. We also block the domains of the most abused scripts and mining pools.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21779\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/protection.png\" alt=\"coinhive block\" width=\"472\" height=\"304\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/protection.png 472w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/protection-300x193.png 300w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/p>\n<p>Another option, if you don&#8217;t have Malwarebytes, is to block Javascript in the browser that you use to surf the web, but this could also block functionality that you like and need.<\/p>\n<p>If you want more specialized blocking capabilities there are programs like \u201cNo Coin\u201d and \u201cMinerBlock\u201d that block mining activities in popular browsers. Both have extensions for Chrome, Firefox, and Opera. <a href=\"http:\/\/www.zdnet.com\/article\/opera-just-added-a-bitcoin-mining-blocker-to-its-browser\/\" target=\"_blank\" rel=\"noopener\">Opera&#8217;s latest versions even have NoCoin built in<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21781 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/OperaNoCoin.png\" alt=\"Opera NoCoin protection\" width=\"392\" height=\"177\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/OperaNoCoin.png 392w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/OperaNoCoin-300x135.png 300w\" sizes=\"auto, (max-width: 392px) 100vw, 392px\" \/><\/p>\n<h3>Summary<\/h3>\n<p>Cryptomining can be done locally on the system or in the browser. Knowing the difference can help you remediate the problem, as both methods require different forms of protection. The solutions are almost as popular as the problem, so choose wisely, as there may be frauds out there trying to grab a portion of the market.<\/p>\n<h3>Related articles<\/h3>\n<p><a href=\"https:\/\/www.cnet.com\/how-to\/how-to-stop-sites-from-using-your-cpu-to-mine-coins\/\" target=\"_blank\" rel=\"noopener\">How to stop websites from using your computer to mine Bitcoin (and more)<\/a><\/p>\n<p><a href=\"https:\/\/www.coindesk.com\/salon-offers-users-choice-between-ads-and-mining-monero\/\" target=\"_blank\" rel=\"noopener\">Salon offers readers choice between ads and mining Monero<\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/why-is-malwarebytes-blocking-coinhive\/\" target=\"_blank\" rel=\"noopener\">Why is Malwarebytes blocking CoinHive?<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/using-the-chrome-task-manager-to-find-in-browser-miners\/\" target=\"_blank\" rel=\"noopener\">Using the Chrome Task Manager to Find In-Browser Miners<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/02\/how-to-protect-your-computer-from-malicious-cryptomining\/\">How to protect your computer from malicious cryptomining<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/02\/how-to-protect-your-computer-from-malicious-cryptomining\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Tue, 27 Feb 2018 17:30:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2018\/02\/how-to-protect-your-computer-from-malicious-cryptomining\/' title='How to protect your computer from malicious cryptomining'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/shutterstock_174025712-e1519224111451.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>When you experience a slow computer due to malicious cryptomining, how can you troubleshoot it and prevent it from happening again?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/how-tos\/\" rel=\"category tag\">How-tos<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/chrome-task-manager\/\" rel=\"tag\">Chrome Task manager<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/crypto-jacking\/\" rel=\"tag\">crypto-jacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/high-cpu\/\" rel=\"tag\">high cpu<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/prevent\/\" rel=\"tag\">prevent<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/slow-computer\/\" rel=\"tag\">slow computer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/troubleshoot\/\" rel=\"tag\">troubleshoot<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2018\/02\/how-to-protect-your-computer-from-malicious-cryptomining\/' title='How to protect your computer from malicious cryptomining'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/02\/how-to-protect-your-computer-from-malicious-cryptomining\/\">How to protect your computer from malicious cryptomining<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,17635,17636,17637,11171,17638,17639,17640],"class_list":["post-11604","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-chrome-task-manager","tag-crypto-jacking","tag-high-cpu","tag-how-tos","tag-prevent","tag-slow-computer","tag-troubleshoot"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11604"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11604\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11604"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}