Velocity Technology Partners Blogs

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

This should come as absolutely no surprise. Cryptocurrencies are ideal for cybercriminals, largely due to their high values and equally high levels of anonymity. However, mining even the smallest amount through legitimate means is an expensive and lengthy process that requires specialized computer hardware and significant amounts of electrical power.

As a result, there has been a rise in a new threat to users called crypto jacking. Malware will infect a user’s device and hide in the background, leeching off of the host computer’s resources to mine for cryptocurrency. This causes the exact side effects that you would expect: increased electric bills and hindered performance for the user, with an increased rate of wear on their computer components. Worse, this malware only requires a compromised website to be visited for the malware to go to work - and while this once meant that the malware would only work as long as the unwitting host was on the website, cybercriminals have even found a way to work around that. Now, some infected sites will create a pop-up that hides behind the computer’s taskbar, unnoticed, and continues to eat up resources for the cybercriminal’s profit.

In addition to malware downloads, crypto-miners are often spread through hidden code on the websites themselves, as well as untrustworthy browser extensions. This variety of the malware has been discovered in the websites for the United States Courts, the United Kingdom’s National Health Service, and the Australian state governments of Victoria and Queensland. It was found in a text-to-speech and translation plugin used on those sites. The developer of the plugin removed it from all websites immediately.

Business owners should pay close attention to these events, as they could easily have a direct effect on business operations. After all, you pay a pretty penny for your Internet and its bandwidth - why should it profit some cybercriminal, and not you? Furthermore, mining cryptocurrency is no easy task for any hardware, which means it shortens the life of the machine and the components inside. This ultimately means that you will also be on the hook to replace that hardware sooner, costing your business even more.

Fortunately, not all hope is lost. Many browsers are incorporating anti-cryptocurrency measures, and some antivirus programs can block crypto jacking attempts. There are also some extensions available for some browsers that help to stop cryptomining and crypto jacking scripts.

At Velocity Technology Partners, we’re here to help keep your IT running efficiently. This includes preventing threats and malware. Give us a call at (800) - 983 - 5765 to find out what we can do for you.

The Blockchain May Soon Protect Your Entire Identi...
Getting to Know Technology: Processor
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Redundancy Virtualization Spam Cloud Computing Workers Congratulations Small Business Lifestyle Proactive IT IT Management Identity Theft Cybersecurity Remote Computing Emergency BYOD WannaCry Tech Term Management Android PowerPoint Passwords Flexibility Charger Windows Data Breach Wireless Charging Data Privacy Data Storage NFL Managed IT Hosted Solution Students Mobile Devices Data Protection Email Vendor Management Two-factor Authentication HBO Proactive Privacy Remote Monitoring App Data Backup BDR Social Engineering Google Drive Company Culture SaaS Cleaning Travel Conferencing Tech Support Computer Forensics App store Excel Router Application Artificial Intelligence Identity Risk Management Server Hosted Solutions Cortana Wi-Fi Encryption Saving Money Innovation Evernote Collaboration WIndows Server 2008 Social Media Law Enforcement Politics Applications IT budget Content Filter Browser Softphones Education Data Management OneNote Analysis Windows Ink Technology Office 365 The Internet of Things Microsoft Word Antivirus Word Vulnerability Microsoft Data Theft Value FAQ Identities Holiday Network Security Marketing IT support WiFi Big Data User Error Hybrid Cloud Spyware Ciminal Storage Software Outlook Managed IT services Compliance Gifts Edge Disaster Recovery Communications Fraud MSP User Tips Streaming Media Cost Management Data Recovery Telephone Computer Efficiency IT Support Managed IT Services Device Security Gamification Google Unified Communications Websites Financial Technology Legal Thank You Mobile Security Microsoft Office Update Hard Drive Managing Stress Cybercrime Licensing Project Management Sports Maintenance Outsourced IT Communication Blockchain Memory Data Security Monitoring VoIp Money Security Hardware IT Services Sync Gmail Telephone Systems Google Maps Financial Smartphones Microsoft Excel Mobile Device Management Safety Software as a Service Gadgets Backup Credit Cards Bring Your Own Device Data Loss Data Smartphone Operating System Computers Employer-Employee Relationship Patch Management Unsupported Software Smart Tech Devices Personal Information Computing Business Management Networking Mobility Malware Business Cast Connectivity intranet Network Internet of Things Managed Service Provider Printing Chrome Language Ransomware Best Practices eWaste Apps Automation Tip of the Week Google Assistant Adobe Apple iPhone Alert Hackers Virus Updates Specifications Business Computing Cloud History Productivity Work/Life Balance Sales Government IoT Tablets IT Solutions Content Filtering Twitter Wireless Internet Business Continuity Shortcut Phishing Best Practice Legislation Audit File Sharing Retail Internet Google Docs Windows 10 Wireless Technology Chromebook Commerce Comparison Regulation Screen Mirroring VPN