Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

This should come as absolutely no surprise. Cryptocurrencies are ideal for cybercriminals, largely due to their high values and equally high levels of anonymity. However, mining even the smallest amount through legitimate means is an expensive and lengthy process that requires specialized computer hardware and significant amounts of electrical power.

As a result, there has been a rise in a new threat to users called crypto jacking. Malware will infect a user’s device and hide in the background, leeching off of the host computer’s resources to mine for cryptocurrency. This causes the exact side effects that you would expect: increased electric bills and hindered performance for the user, with an increased rate of wear on their computer components. Worse, this malware only requires a compromised website to be visited for the malware to go to work - and while this once meant that the malware would only work as long as the unwitting host was on the website, cybercriminals have even found a way to work around that. Now, some infected sites will create a pop-up that hides behind the computer’s taskbar, unnoticed, and continues to eat up resources for the cybercriminal’s profit.

In addition to malware downloads, crypto-miners are often spread through hidden code on the websites themselves, as well as untrustworthy browser extensions. This variety of the malware has been discovered in the websites for the United States Courts, the United Kingdom’s National Health Service, and the Australian state governments of Victoria and Queensland. It was found in a text-to-speech and translation plugin used on those sites. The developer of the plugin removed it from all websites immediately.

Business owners should pay close attention to these events, as they could easily have a direct effect on business operations. After all, you pay a pretty penny for your Internet and its bandwidth - why should it profit some cybercriminal, and not you? Furthermore, mining cryptocurrency is no easy task for any hardware, which means it shortens the life of the machine and the components inside. This ultimately means that you will also be on the hook to replace that hardware sooner, costing your business even more.

Fortunately, not all hope is lost. Many browsers are incorporating anti-cryptocurrency measures, and some antivirus programs can block crypto jacking attempts. There are also some extensions available for some browsers that help to stop cryptomining and crypto jacking scripts.

At FRS Pros, we’re here to help keep your IT running efficiently. This includes preventing threats and malware. Give us a call at 561-795-2000 to find out what we can do for you.

The Blockchain May Soon Protect Your Entire Identi...
Getting to Know Technology: Processor
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Management Google Tech Term Cloud Business Computing Software Hackers User Tips Hardware Malware Cybersecurity Microsoft Computer Mobile Devices Windows Efficiency Data Backup Hosted Solutions Browser Innovation Cybercrime Apps Smartphone Productivity Smartphones Operating System Internet of Things Android Data Recovery Data Security Money Business Phishing Business Continuity Alert Outsourced IT Law Enforcement Office 365 Ransomware Email Mobile Device Management Vulnerability Data Backup Network Managed IT Services Saving Money IT Support Microsoft Office Disaster Recovery VoIP Server Windows 10 Best Practice Chrome IT Support Collaboration IT Services Small Business Windows 10 Information Technology Computers Virtualization Blockchain Managed Service Provider Upgrade Managed IT Two-factor Authentication Unsupported Software Communications App Telephone Systems Employer-Employee Relationship Router Gadgets Applications Cloud Computing Tech Support Spam Google Drive Information WiFi Devices Communication Hacking OneNote Artificial Intelligence Users Mobile Device Gmail Government Data Breach Audit Save Money Application Robot Travel Data Protection Passwords Miscellaneous Safety Excel The Internet of Things Social Media Fraud Budget Cost Management Managed IT Services VPN iPhone Holiday Wireless Technology Risk Management Data Management Augmented Reality Commerce User Error Facebook WannaCry Productivity Quick Tips Networking Wi-Fi Sports Cortana Managed Service Update Hosted Solution Mobile Security SaaS Politics Bring Your Own Device Proactive IT Avoiding Downtime Shortcut Password Automation Google Assistant Data Storage Google Docs Patch Management Wireless Charging BDR Identity Uninterrupted Power Supply Windows Ink Hybrid Cloud iOS WIndows Server 2008 Gifts Computing Going Green Licensing Social Updates Samsung Wireless Internet Windows 10s HBO Touchpad Comparison Employee-Employer Relationship Value Screen Mirroring Microsoft Excel IT budget Computer Care Nanotechnology Outlook Data Privacy Unified Threat Management Google Maps Legal Spyware Amazon Credit Cards App store DDoS Meetings Microsoft Word Antivirus Gamification Solid State Drive Files Humor Specifications Encryption Virus Business Technology Emails Disaster Cast File Sharing Software as a Service Recovery Root Cause Analysis Hard Drive Upgrades Apple Virtual Assistant Computer Fan Testing Tablets Maintenance Memory Hard Disk Drive IT Management Sales Proactive Sync Reputation Evernote Computer Forensics Marketing BYOD Storage Social Engineering Emergency Bandwidth Administrator Chromebook Lithium-ion battery Data storage Edge Alexa for Business Streaming Media History FAQ Point of Sale Camera Remote Computing NFL Health eWaste Financial IT Solutions Retail Websites Identity Theft Management Webinar Identities Access Printing Consultant Data Loss Settings Ciminal Chromecast Charger Wireless Projects Telephony Remote Monitoring Word Search Device Security Conferencing Mobility Data Theft Transportation Adobe Workers Workplace Tips Vendor Management PowerPoint IT solutions Laptop Legislation Language Vendor Internet Exlporer Touchscreen Project Management Private Cloud Printers Video Games Experience Education Hiring/Firing Work/Life Balance Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Regulation End of Support Phone System HaaS Benefits Relocation Save Time es Computer Accessories Twitter Flexibility Music Personal Information Battery Smart Technology Instant Messaging Hacker PDF Scalability Analytics Mobile Computing Thank You Cache Entertainment Keyboard Text Messaging Black Market Cleaning Big Data Training Monitors Automobile Office Congratulations Managing Stress Office tips USB Worker Television CrashOverride Advertising How To Books Compliance Company Culture Scam