Advertisement
Australia markets closed
  • ALL ORDS

    8,153.70
    +80.10 (+0.99%)
     
  • ASX 200

    7,896.90
    +77.30 (+0.99%)
     
  • AUD/USD

    0.6516
    -0.0020 (-0.30%)
     
  • OIL

    82.43
    +1.08 (+1.33%)
     
  • GOLD

    2,226.30
    +13.60 (+0.61%)
     
  • Bitcoin AUD

    108,645.65
    +2,902.06 (+2.74%)
     
  • CMC Crypto 200

    885.54
    0.00 (0.00%)
     
  • AUD/EUR

    0.6026
    -0.0005 (-0.07%)
     
  • AUD/NZD

    1.0893
    +0.0013 (+0.12%)
     
  • NZX 50

    12,105.29
    +94.63 (+0.79%)
     
  • NASDAQ

    18,261.26
    -19.59 (-0.11%)
     
  • FTSE

    7,960.22
    +28.24 (+0.36%)
     
  • Dow Jones

    39,746.85
    -13.23 (-0.03%)
     
  • DAX

    18,493.68
    +16.59 (+0.09%)
     
  • Hang Seng

    16,541.42
    +148.58 (+0.91%)
     
  • NIKKEI 225

    40,168.07
    -594.66 (-1.46%)
     

Hackers are using victims' computers to mine cryptocurrencies

Bitcoin (BTC-USD) and the entire range of cryptocurrencies are among the most popular buzzwords in finance at the moment. And despite falling from their late-2017 highs, many investors are still buying into everything from ripple (XRP-USD) and ethereum (ETH-USD) to litecoin (LTC-USD) and ZCash (ZEC-USD).

Unfortunately, the increase in crypto’s popularity has, predictably, led to a new form of malware designed to get you to unwittingly mine currencies for criminals: cryptojackers. Cryptojackers are pieces of malware that force your computer or smartphone to use their processors to mine cryptocurrencies for the malware’s makers.

And the wave of cryptojacking malware is likely set to rise. The latest victims include a water utility in Europe, millions of Android phones, the Telegram app and others.

Syphoning power from a water utility

According to Wired, the malware at the unnamed water utility was discovered by security firm Radiflow. The company says the cryptojacking software was designed to mine for monero (XMR-USD), a cryptocurrency that has gained popularity among cybercriminals due to the fact that it’s easier to mine using a standard processor than something like bitcoin, which is best mined using a high-end graphics card.

ADVERTISEMENT

The malware was designed to run as a piece of background software so the utility’s employees wouldn’t notice it was using any power. In fact, Radiflow says it only caught the cryptojacking software as part of its monitoring of the utility’s operational technology network, which is meant to control physical changes to a network system.

In this case, Radiflow found that the cryptojacking software was pushing the water utility’s PCs to perform at extremely high levels, which, impacted the computers’ abilities to perform the basic tasks they were designed to tackle.

Millions of Android devices

Those millions of Android phones, meanwhile, were impacted by a different kind of cryptomining malware called drive-by cryptomining. This type of malware, according to Malwarebytes, redirected users’ smartphone web browsers to a specific website.

The site would then give you some bogus message about how your device “is showing suspicious surfing behavior” and then tells you to prove that you’re a human and not a bot by typing a captcha before letting you navigate away from the site.

Millions of Android smartphones have fallen victim to cryptojacking. (image: Tom’s Guide)
Millions of Android smartphones have fallen victim to cryptojacking. (image: Tom’s Guide)

While you’re stuck on the offending page, though, the malware makers force your phone’s CPU to mine monero for them, pushing the processor to its max and gobbling up your system resources, which slows your handset considerably.

Malwarebytes says this piece of malware likely comes from infected apps that users inadvertently downloaded. The apps force users to the cryptojacking site and steal their phones’ processing power.

These are far from the first cryptojacking schemes to steal your PC’s or smartphone’s resources. Browser-based cryptominers can force your computer to mine monero even after you think you’ve left the offending site that launched the mining operation behind.

Telegram on the desktop

Cryptojacking has also hit the messaging app Telegram. According to the cybersecurity firm Kaspersky Lab, hackers used an exploit to trick users of Telegram’s desktop software to install a piece of malware that would use their machines to mine for monero and ZCash.

“Running it, the computer slows down, overheats and generally busts a gut trying to mine cryptocurrency for the attackers,” Kaspersky’s Anna Markovskaya wrote in a blog post.

The biggest issue when it comes to cryptojacking is the kind of damage it can do to your PC or smartphone. Maxing out a device’s processors can cripple it, making it difficult to use. Push a machine hard enough, though, and you could burn it out entirely.

Cryptomining for good

To be sure, not all of browser-based miners are dangerous. As we reported in December, a number of websites are using browser miners to supplement their incomes. TheNextWeb points out that Salon recently began informing users who have ad blockers installed that their computers will be used to mine cryptocurrencies while they are on the site.

If you don’t want your processing power used to mine for currency, you must disable your ad blocker. Salon also tells you that it will only mine while you’re on the site.

Most cryptojackers are careful to ensure that their malware consumes just a small portion of a victim’s system resources to keep from raising any suspicions. But cryptojackers that want a huge amount of resources at once will go all out, pushing victims’ machines to their limits.

The best way to avoid cryptojackers is, like any form of malware, to remain diligent while surfing the web. Don’t click on links you don’t recognize, or open emails or social media messages from unknown contacts. Most importantly, use some kind of security software. And if you suspect your computer or smartphone has been infected with malware, be sure to scan your system. Unless you want to help crooks mine cryptocurrency.

More from Dan: