Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

This should come as absolutely no surprise. Cryptocurrencies are ideal for cybercriminals, largely due to their high values and equally high levels of anonymity. However, mining even the smallest amount through legitimate means is an expensive and lengthy process that requires specialized computer hardware and significant amounts of electrical power.

As a result, there has been a rise in a new threat to users called crypto jacking. Malware will infect a user’s device and hide in the background, leeching off of the host computer’s resources to mine for cryptocurrency. This causes the exact side effects that you would expect: increased electric bills and hindered performance for the user, with an increased rate of wear on their computer components. Worse, this malware only requires a compromised website to be visited for the malware to go to work - and while this once meant that the malware would only work as long as the unwitting host was on the website, cybercriminals have even found a way to work around that. Now, some infected sites will create a pop-up that hides behind the computer’s taskbar, unnoticed, and continues to eat up resources for the cybercriminal’s profit.

In addition to malware downloads, crypto-miners are often spread through hidden code on the websites themselves, as well as untrustworthy browser extensions. This variety of the malware has been discovered in the websites for the United States Courts, the United Kingdom’s National Health Service, and the Australian state governments of Victoria and Queensland. It was found in a text-to-speech and translation plugin used on those sites. The developer of the plugin removed it from all websites immediately.

Business owners should pay close attention to these events, as they could easily have a direct effect on business operations. After all, you pay a pretty penny for your Internet and its bandwidth - why should it profit some cybercriminal, and not you? Furthermore, mining cryptocurrency is no easy task for any hardware, which means it shortens the life of the machine and the components inside. This ultimately means that you will also be on the hook to replace that hardware sooner, costing your business even more.

Fortunately, not all hope is lost. Many browsers are incorporating anti-cryptocurrency measures, and some antivirus programs can block crypto jacking attempts. There are also some extensions available for some browsers that help to stop cryptomining and crypto jacking scripts.

At Velocity Technology Partners, we’re here to help keep your IT running efficiently. This includes preventing threats and malware. Give us a call at (800) - 983 - 5765 to find out what we can do for you.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Alert Spam Computer Forensics Computer Remote Computing Thank You Managed Service Provider Business Computing Risk Management Gmail Proactive Network Security Wireless Internet Wi-Fi Printing Data Backup Data Breach Tip of the Week Device Security Managing Stress Project Management Content Filtering IT Management Legislation Tablets Credit Cards Employer-Employee Relationship Cybercrime Edge Hosted Solution Spyware Memory Management Office 365 Language Identities Microsoft Devices Ciminal Comparison Travel Small Business FAQ The Internet of Things Hardware Work/Life Balance Flexibility App store IT Support Software as a Service Chromebook Productivity Hybrid Cloud Licensing Google Drive WIndows Server 2008 Security NFL Microsoft Word Evernote Wireless Technology Commerce File Sharing Education Social Media Cloud Computing Sync Ransomware Conferencing Google Assistant History VPN Proactive IT Blockchain Virus WannaCry Adobe Lifestyle Company Culture Maintenance Microsoft Office Specifications Business Management Google Legal Connectivity Applications OneNote Gifts Big Data Communications Data Protection Excel Workers Cleaning Data Storage Content Filter Money intranet Computing Financial Outlook Charger Computers MSP Two-factor Authentication Patch Management Router Emergency Phishing Software Smartphones IT budget PowerPoint Gadgets Congratulations Browser Shortcut Network IT Services Sports Data Security BYOD Microsoft Excel Data Recovery Managed IT Services Vulnerability Financial Technology Managed IT Identity Theft Mobile Device Management Mobile Security Passwords Chrome Word BDR Unsupported Software Apps Collaboration Communication Cloud Managed IT services iPhone App Telephone IT support Innovation Outsourced IT Safety IoT Google Maps Analysis Application Updates Technology Wireless Charging Students Google Docs Hackers Value Best Practices Efficiency Social Engineering IT Solutions Smartphone Identity Data Privacy Data Loss Android Data Twitter Best Practice Remote Monitoring Mobility Disaster Recovery Softphones Update Streaming Media eWaste Data Theft Bring Your Own Device Cast Screen Mirroring Politics Audit Tech Support User Error Privacy Cortana Websites Marketing Internet VoIp Windows 10 Business Personal Information Malware Antivirus Windows Storage HBO Cybersecurity Gamification SaaS Hard Drive Automation Tech Term Monitoring Virtualization Unified Communications Networking Mobile Devices Hosted Solutions Operating System WiFi Windows Ink Encryption Retail Email Cost Management Artificial Intelligence Compliance Data Management Holiday Business Continuity Backup Apple Redundancy Government Fraud Telephone Systems Internet of Things Smart Tech Vendor Management Law Enforcement Sales User Tips Server Saving Money