Why You Should Care about Cryptocurrency Mining
Security Awareness Campaigns – 3 min read October 15, 2019

Why You Should Care about Cryptocurrency Mining

It is a sure bet that you have heard the word Bitcoin at some point over the past couple of years. Many people followed the headlines of its rollercoaster ride in late 2017 as the world's best-known, and most valuable, cryptocurrency

Cryptocurrency is digital currency that can be exchanged for goods and services. The world of cryptocurrency is complex and sometimes shady. But for our purposes here, what you really need to know is that the activity known as cryptocurrency mining—the process by which cryptocurrency transactions are verified and recorded—could pose a threat to your business's computer systems.

 

 

Cryptomining is resource-intensive. Among other things, it requires specialized hardware, bandwidth, and a lot of electricity. So what do you do if you cannot access enough cryptomining resources on your own? Hijack someone else's system and use their resources.

 

Cryptojackers: Stealthy Thieves

 

Cryptojacking is one of the newer threats on the IT scene, having emerged with the rise of cryptocurrency. Cryptojacking involves gaining access to a computer, or an entire computer system, to mine cryptocurrency without the owner's knowledge or permission. 

Cryptojacking, like many other cybersecurity threats, generally takes hold via infections or malicious links. If the crypominer uses a phishing approach, you may receive an email with a seemingly harmless link in it. Clicking on the link will run a code that releases a cryptomining script into your computer. Another means of cryptojacking is through a website or an advertisement that will execute the script when you visit the site or encounter the ad.

The major difference between cryptojacking and many other cybersecurity threats is that people may be working on cryptojacked computers without knowing it. Cryptomining does not cause the obvious harm that something like ransomware or a social engineering attack can do. Often, its only effect on individual computers will be slightly slower processing. For this reason, many hackers see cryptojacking as more attractive than something like a ransomware attack—they stand to make a good return with little of discovery, much less prosecution.

But before you start thinking this is, essentially, a victimless crime, imagine the slowdown effect extended from a single unit to an entire computer system. The hijacking of resources, including electricity and processing resources, as well as the time that may be spent trying to figure out why the system is slow, can add up to substantial costs. It is thus worth your while to do everything you can to avoid being cryptomined.

 

So what do you do if you cannot access enough cryptomining resources on your own? Hijack someone else's system and use their resources.

 

Guarding Against Cryptominers

 

Cryptomining is an example of a threat that can perhaps best be averted through training and awareness. As phishing is among the most common means by which mining scripts are introduced, ensure that your staff are alert to phishing attempts. 

Obviously, cryptojacking that originates with legitimate websites is harder to avoid, and malicious ads may also be difficult to detect. Make sure to take the following steps to safeguard against mining from such sources.

 

  • Use available anti-cryptomining extensions on all browsers
  • Ensure that all browser extensions are kept up-to-date
  • Use antivirus software that has the ability to detect cryptomining 
  • Install an ad blocker
  • Update web filters regularly

 

Cryptominers, like most hackers, are always changing their tactics, so vigilance is the watchword here, as with all cybersecurity issues.

 

If you or your team have noticed that your computers have slowed down and your computer fans are on, reach out to CITI. Your computers may have been cryptojacked by cryptocurrency miners. 

 

 

Learn about your IT security. Register for a free cybersecurity consultation.  Book Now Considering moving to the cloud? Find out if the cloud is right for your  company.Book Now
Guide to Email Security from our Practice Safe Cyber Series Download Your Poster
Global Toronto and CreateTO City of Toronto Agencies Case Study
Learn about your IT security. Register for a free cybersecurity consultation.  Book Now
Guide to Ransomware Attacks in Canada
Considering moving to the cloud? Find out if the cloud is right for your  company.Book Now
New IT Infrastructure Transforms Organization. KCI Ketchum Canada
Engage our services and get 10 hours free. It's easy to work with CITI. Become  a client.Book Appointment

IT Insights from our Blog

Read more

We're here to help!

Moving to the Cloud
Cybersecurity

Is your management team asking about your IT security policies and practices? Are you worried about a cybersecurity breach? CITI’s comprehensive IT security services provide all the information your company needs to deal with current and future security situations and concerns. Learn about your IT security. Register for a free cybersecurity session.

Managed Services

There is another way to manage your IT that doesn’t require you call your IT firm. Managed IT services offer proactive care, support, monitoring and maintenance of your computer systems for a fixed monthly fee. Process-driven, less involvement, more predictable cost. Yes, Virginia, there is a way to keep your IT running smoothly that does not require you to make a call.

Pay-As-You-Go

Are you concerned about minimizing IT maintenance costs? Perhaps you’re techno savvy. Or maybe you only need an IT firm for complex IT situations. CITI can provide exactly the volume of IT services that you want and need from network troubleshooting to helping a user with a jammed printer. Our full range of services are available on a per incident basis.

Disaster Recovery

Is the stuff of your nightmares power outages? The only way to deal with a severe interruption to business operations is to plan for it. Beginning with a disaster recovery plan through implementing and maintaining failsafe, foolproof, rock-solid offsite backups, CITI has helped 100s of companies protect their most valuable asset—their data and systems.

IT Consulting

Uncertain if your company should move to the cloud? Do you have doubts about the best way to back up your data? Looking for ways to minimize your vulnerability to IT security breaches? Perhaps you’re looking for help with your annual IT budget. CITI’s IT advisory services help businesses make informed strategic and tactical decisions on information technology.

Call Us