Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

This should come as absolutely no surprise. Cryptocurrencies are ideal for cybercriminals, largely due to their high values and equally high levels of anonymity. However, mining even the smallest amount through legitimate means is an expensive and lengthy process that requires specialized computer hardware and significant amounts of electrical power.

As a result, there has been a rise in a new threat to users called crypto jacking. Malware will infect a user’s device and hide in the background, leeching off of the host computer’s resources to mine for cryptocurrency. This causes the exact side effects that you would expect: increased electric bills and hindered performance for the user, with an increased rate of wear on their computer components. Worse, this malware only requires a compromised website to be visited for the malware to go to work - and while this once meant that the malware would only work as long as the unwitting host was on the website, cybercriminals have even found a way to work around that. Now, some infected sites will create a pop-up that hides behind the computer’s taskbar, unnoticed, and continues to eat up resources for the cybercriminal’s profit.

In addition to malware downloads, crypto-miners are often spread through hidden code on the websites themselves, as well as untrustworthy browser extensions. This variety of the malware has been discovered in the websites for the United States Courts, the United Kingdom’s National Health Service, and the Australian state governments of Victoria and Queensland. It was found in a text-to-speech and translation plugin used on those sites. The developer of the plugin removed it from all websites immediately.

Business owners should pay close attention to these events, as they could easily have a direct effect on business operations. After all, you pay a pretty penny for your Internet and its bandwidth - why should it profit some cybercriminal, and not you? Furthermore, mining cryptocurrency is no easy task for any hardware, which means it shortens the life of the machine and the components inside. This ultimately means that you will also be on the hook to replace that hardware sooner, costing your business even more.

Fortunately, not all hope is lost. Many browsers are incorporating anti-cryptocurrency measures, and some antivirus programs can block crypto jacking attempts. There are also some extensions available for some browsers that help to stop cryptomining and crypto jacking scripts.

At FRS Pros, we’re here to help keep your IT running efficiently. This includes preventing threats and malware. Give us a call at 561-795-2000 to find out what we can do for you.

The Blockchain May Soon Protect Your Entire Identi...
Getting to Know Technology: Processor
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Cloud Business Management Google Tech Term Business Computing Software User Tips Microsoft Computer Malware Hackers Hardware Browser Productivity Efficiency Mobile Devices Windows Cybersecurity Data Backup Hosted Solutions Apps Internet of Things Smartphone Innovation Cybercrime Outsourced IT IT Services Operating System Windows 10 Smartphones Data Recovery Android Office 365 Data Security Email Backup Upgrade VoIP Data Business Money Mobile Device Management Alert Vulnerability Law Enforcement Disaster Recovery Ransomware Phishing IT Support Business Continuity Applications Saving Money IT Support Chrome Communications Server Managed IT Services Best Practice Microsoft Office Collaboration Network Employer-Employee Relationship Managed Service Provider Computers Google Drive Virtualization Managed IT Blockchain Two-factor Authentication Unsupported Software Information App Cloud Computing Spam Telephone Systems Tech Support Gadgets Information Technology Passwords Miscellaneous Small Business Router Windows 10 Data Breach Update Quick Tips Data Protection Save Money Politics Hosted Solution Shortcut Workplace Tips Avoiding Downtime Travel Excel Cost Management Managed IT Services BDR Budget Augmented Reality Fraud Wireless Technology Managed Service WannaCry Communication Commerce Data Management Users Artificial Intelligence Mobile Security Evernote Bring Your Own Device Government User Error Application Productivity Google Assistant Encryption Sports Networking SaaS Safety Robot Cortana Proactive IT Holiday Automation Word Touchscreen Data Storage Password The Internet of Things Social Media WiFi VPN iPhone Risk Management Patch Management Wireless Charging Mobile Device OneNote Google Docs Project Management Hacking Devices Facebook Gmail Audit Wi-Fi Testing Outlook Meetings Memory Microsoft Excel IT budget Solid State Drive Credit Cards App store Root Cause Analysis DDoS Wireless Computer Forensics Peripheral Google Maps Spyware Emails Cast Files Settings Bandwidth Vendor Management Mobility Chromebook Co-Managed Services Microsoft Word Upgrades Disaster Search Alexa for Business Specifications Virus Computer Fan Recovery Laptop Camera Transportation Financial File Sharing Hard Disk Drive IT Management Scam Private Cloud Management Access Control Apple Marketing BYOD Administrator Samsung Printing Telephone Tablets Maintenance Sales Proactive Touchpad Projects Sync Lithium-ion battery Going Green Social Storage Social Engineering IT Solutions Streaming Media FAQ Legal PowerPoint Admin Edge Webinar Vendor Websites Antivirus Access Hyperlink NFL eWaste Consultant Retail Humor Identity Remote Monitoring Hybrid Cloud Identities Chromecast Employee-Employer Relationship Charger Telephony Wireless Internet Data Loss Ciminal IT solutions Conferencing Data Theft Internet Exlporer Value Wasting Time Device Security Data Privacy Windows 7 Adobe Workers Emergency Amazon Legislation Language iOS WIndows Server 2008 Business Technology Uninterrupted Power Supply Reputation Gamification Windows 10s HBO Point of Sale Gifts Computer Care Computing Nanotechnology History Accessory Windows Ink Screen Mirroring Data storage Software as a Service Hard Drive Display Licensing Updates Unified Threat Management Remote Computing Health Virtual Assistant Comparison Identity Theft Text Messaging Big Data Automobile Office Managing Stress USB Worker Office tips es How To Books Video Games Experience Education Hiring/Firing Advertising Work/Life Balance Virtual Reality Cache Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Thank You Phone System Benefits Training Monitors HaaS Save Time End of Support Compliance Printers Relocation Computer Accessories Television Congratulations CrashOverride Flexibility Music Battery Smart Technology Company Culture Personal Information Instant Messaging Hacker Regulation PDF Scalability Analytics Entertainment Mobile Computing Twitter Keyboard Black Market Cleaning