How to tell if your computer is secretly mining cryptocurrency, and what to do about it (2024)

Your computer could be secretly mining cryptocurrency—piggybacking on your computer’s processing power to confirm transactions and generate new and potentially lucrative coins—and you wouldn’t even be profiting from it. Incidents of malware containing crypto-mining tools have surged six-fold this year, according to IBM Managed Security Services. Here’s how to find out if you’ve been unwittingly committing your computing power to enrich someone else.

Check your CPU usage

Open a resource monitor on your computer to check if CPU usage is abnormally high. On a Mac that’s Activity Monitor, and on Windows it’s Task Manager.

If you see a spike in CPU usage when visiting a particular website that shouldn’t really be that taxing on your processor; or if you have everything closed but CPU usage is still super high, then you may have a crypto mining malware problem. It’s hard to say what “normal” CPU usage looks like, since computer processing power and the applications people run vary so much, but a suddenly elevated level of CPU usage would indicate an abnormal increase in demand for processing power.

How to tell if your computer is secretly mining cryptocurrency, and what to do about it (1)

Ad-blockers can help…

Your computer can be hijacked for mining by visiting a particular website or having an infected advertisem*nt displayed in it, as researchers at security software vendor ESET have detailed.

If that’s the case, once you leave that website or close the tab, the mining stops. For more peace of mind, you can also block Javascript from running on a site known to be infected by simply using the default privacy and content controls in your browser.

Ad-blocking software can also filter out known types of in-browser miners. One such mining script is called Coin Hive, which isn’t necessarily malware. It can be embedded in websites without the knowledge of a visitor, although its developers encourage website owners to disclose the script’s presence to users.

One ad-blocking software, AdGuard, will scan a site to see if Coin Hive is running on it and alert you to it. AdBlock Plus, a browser extension, suggests adding a filter to its built-in blocking options that targets Coin Hive.

…But not if it’s this type of malware

Researchers at IBM have found a more sophisticated class of surreptitious mining software that penetrates your system. These are delivered through infected image files or by clicking on links leading to a malicious site. Such attacks tend to target enterprise networks, IBM found, so get in touch with your IT person for help.

If your system is infected, you should detect a degradation in performance, in which case fire up Activity Monitor or Task Manager to check your CPU usage. You can then identify the process that’s eating up all those compute cycles and terminate it from your resource monitor, saysDave McMillen of IBM Managed Security Services, who authored the research on secret crypto miners.

Are these things mining bitcoin?

No, because bitcoin requires far too much computational power to be mined profitably this way, even if millions of ordinary computers were hijacked. Bitcoin miners today operate vast data centers containing thousands of machines specifically built—down to the chips—for mining bitcoin.

Instead, these miners most commonly try to generate Monero, a privacy-centric coin with a current market value of $1.3 billion. Like other cryptocurrencies, it has surged in value this year, from around $15 in January to a high of $140 in early September.

Some crypto mining in the browser is legit

Some websites are experimenting with in-browser mining as a revenue stream to replace advertising. The Pirate Bay, for example, experimented with that earlier this week with Coin Hive. “We really want to get rid of all the ads,” the site’s administrators wrote. “But we also need enough money to keep the site running.”

In fact, we at Quartz were among the first publishers to explore this model, all the way back in December 2013. Alas, even then the bitcoin mining game had become too competitive for us to profit.

How to tell if your computer is secretly mining cryptocurrency, and what to do about it (2024)

FAQs

How to tell if your computer is secretly mining cryptocurrency, and what to do about it? ›

Unusual CPU Usage. One of the most telltale signs of cryptojacking or malware infection is a sudden and unexplained spike in CPU usage. Since crypto mining requires significant computational power, an infected device will often show high CPU usage even when not performing any intensive tasks.

How to tell if your computer is being used for crypto mining? ›

Is your PC Infected with a Crypto Miner? Here's How to Find Out
  1. High CPU or GPU Usage. ...
  2. Increased fan noise and overheating. ...
  3. Decrease in performance. ...
  4. Unexplained Network Activity. ...
  5. Crashes and more crashes. ...
  6. Short battery life. ...
  7. Unknown Processes in Task Manager. ...
  8. Blocked access to system monitoring tools.
Jun 12, 2024

How do I stop bitcoin mining on my computer? ›

Protect against cryptomining
  1. Keep your devices and software updated. ...
  2. Install software from reputable sources. ...
  3. Avoid suspicious websites. ...
  4. Use ad blockers in your browser. ...
  5. Disable JavaScript in your browser. ...
  6. Endpoint protection.
Jan 26, 2024

How do I know if my website is crypto mining? ›

To determine if a website is using JavaScript to mine cryptocurrency in the background, you can monitor your computer's performance for any unusual spikes in CPU or GPU usage while visiting the website.

What is a common indicator of unauthorised crypto mining running on a system? ›

High electricity costs are also a sign of an attack. The energy and processing power required for mining draws significant electricity. Central processing unit (CPU) use spikes in response to cryptojacking.

What does a crypto mining computer look like? ›

A GPU mining rig can look like a regular personal computer, but it typically has several GPUs (Graphics Processing Units) connected to its motherboard. These rigs require a compatible motherboard, sufficient power supply, cooling systems, and often specialized software to manage and optimize the mining process.

Is my PC secretly mining? ›

Unusual CPU Usage. One of the most telltale signs of cryptojacking or malware infection is a sudden and unexplained spike in CPU usage. Since crypto mining requires significant computational power, an infected device will often show high CPU usage even when not performing any intensive tasks.

What are the signs of crypto mining malware? ›

Devices begin to run suspiciously slower than usual since cryptojacking drains its computational resources. Processors or graphics cards get damaged without any apparent reason, or the device is overheating than usual. A high and consistent CPU usage percentage could indicate the presence of a crypto malware.

Can crypto mining be detected? ›

The activation of the Premium tier or Enterprise tier of Security Command Center is a foundational element of detecting cryptomining attacks on Google Cloud. Two threat detection services of the Premium and Enterprise tiers are critical for detecting cryptomining attacks: Event Threat Detection and VM Threat Detection.

Can crypto mining be tracked? ›

Cryptocurrency mining can be detected in the network. Machine learning can be employed to detect mining services automatically.

What software is used to detect cryptojacking? ›

A comprehensive cybersecurity program such as Kaspersky Total Security will help to detect threats across the board and can provide cryptojacking malware protection.

How to detect cryptocurrency miners by traffic forensics? ›

Currently, it is possible to detect them using lists of IP addresses from known mining pools, using information from DNS records, or directly performing Deep Packet Inspection (DPI) over all the traffic.

What is an example of cryptojacking? ›

Cryptojackers often bait users into clicking on links in phishing emails and downloading malicious code to their devices. Another approach is to infect websites using cryptojacking command lines embedded in HTML code—this code then runs the mining program automatically when the user opens the infected webpage.

How do you tell if your GPU is being used for mining? ›

Physical condition: Inspect the card for any visible signs of wear and tear, including dust buildup and abnormal noises from the fans. Memory: The act of mining can be very memory intensive, which can lead to increased heat and stress on the card's memory. Check for any issues with the memory performance.

Can antivirus detect cryptojacking? ›

If you think you are victim of Cryptojacking close all of your browser windows to exit your browser, remove any browser extensions, and run an antivirus scan. If an NJIT owned PC, open the McAfee Endpoint Security application and select “Scan System”. Otherwise, scan your computer using your installed virus protection.

What is your computer doing when mining bitcoins? ›

When computers on the network verify and process transactions, new bitcoins are created, or mined. These networked computers, or miners, process the transaction in exchange for a payment in Bitcoin. Bitcoin is powered by blockchain, which is the technology that powers many cryptocurrencies.

Top Articles
MoodleCloud | Moodle.org
Tanith Questline - Elden Ring Guide - IGN
Chs.mywork
NYT Mini Crossword today: puzzle answers for Tuesday, September 17 | Digital Trends
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
4-Hour Private ATV Riding Experience in Adirondacks 2024 on Cool Destinations
Http://N14.Ultipro.com
Phone Number For Walmart Automotive Department
Chalupp's Pizza Taos Menu
Zitobox 5000 Free Coins 2023
Www Thechristhospital Billpay
Mivf Mdcalc
Ktbs Payroll Login
4Chan Louisville
Obituary | Shawn Alexander | Russell Funeral Home, Inc.
Yesteryear Autos Slang
Rosemary Beach, Panama City Beach, FL Real Estate & Homes for Sale | realtor.com®
Premier Reward Token Rs3
Salem Oregon Costco Gas Prices
Shopmonsterus Reviews
Shiftselect Carolinas
Maxpreps Field Hockey
A Person That Creates Movie Basis Figgerits
Papa Johns Mear Me
New Stores Coming To Canton Ohio 2022
Goodwill Of Central Iowa Outlet Des Moines Photos
Wku Lpn To Rn
Craigslist Fort Smith Ar Personals
The Collective - Upscale Downtown Milwaukee Hair Salon
Cfv Mychart
Bend Missed Connections
LG UN90 65" 4K Smart UHD TV - 65UN9000AUJ | LG CA
Housing Assistance Rental Assistance Program RAP
Forager How-to Get Archaeology Items - Dino Egg, Anchor, Fossil, Frozen Relic, Frozen Squid, Kapala, Lava Eel, and More!
Save on Games, Flamingo, Toys Games & Novelties
Nacho Libre Baptized Gif
Whitehall Preparatory And Fitness Academy Calendar
20+ Best Things To Do In Oceanside California
Frcp 47
Daly City Building Division
Citibank Branch Locations In Orlando Florida
888-822-3743
Pathfinder Wrath Of The Righteous Tiefling Traitor
Petra Gorski Obituary (2024)
Elven Steel Ore Sun Haven
CrossFit 101
The Sports Academy - 101 Glenwest Drive, Glen Carbon, Illinois 62034 - Guide
House For Sale On Trulia
La Fitness Oxford Valley Class Schedule
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 5778

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.