Velocity Technology Partners Blogs

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

This should come as absolutely no surprise. Cryptocurrencies are ideal for cybercriminals, largely due to their high values and equally high levels of anonymity. However, mining even the smallest amount through legitimate means is an expensive and lengthy process that requires specialized computer hardware and significant amounts of electrical power.

As a result, there has been a rise in a new threat to users called crypto jacking. Malware will infect a user’s device and hide in the background, leeching off of the host computer’s resources to mine for cryptocurrency. This causes the exact side effects that you would expect: increased electric bills and hindered performance for the user, with an increased rate of wear on their computer components. Worse, this malware only requires a compromised website to be visited for the malware to go to work - and while this once meant that the malware would only work as long as the unwitting host was on the website, cybercriminals have even found a way to work around that. Now, some infected sites will create a pop-up that hides behind the computer’s taskbar, unnoticed, and continues to eat up resources for the cybercriminal’s profit.

In addition to malware downloads, crypto-miners are often spread through hidden code on the websites themselves, as well as untrustworthy browser extensions. This variety of the malware has been discovered in the websites for the United States Courts, the United Kingdom’s National Health Service, and the Australian state governments of Victoria and Queensland. It was found in a text-to-speech and translation plugin used on those sites. The developer of the plugin removed it from all websites immediately.

Business owners should pay close attention to these events, as they could easily have a direct effect on business operations. After all, you pay a pretty penny for your Internet and its bandwidth - why should it profit some cybercriminal, and not you? Furthermore, mining cryptocurrency is no easy task for any hardware, which means it shortens the life of the machine and the components inside. This ultimately means that you will also be on the hook to replace that hardware sooner, costing your business even more.

Fortunately, not all hope is lost. Many browsers are incorporating anti-cryptocurrency measures, and some antivirus programs can block crypto jacking attempts. There are also some extensions available for some browsers that help to stop cryptomining and crypto jacking scripts.

At Velocity Technology Partners, we’re here to help keep your IT running efficiently. This includes preventing threats and malware. Give us a call at (800) - 983 - 5765 to find out what we can do for you.

The Blockchain May Soon Protect Your Entire Identi...
Getting to Know Technology: Processor


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, September 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Audit Smart Tech The Internet of Things Travel Twitter Tablets Malware Students WiFi PowerPoint Gifts BYOD Virus Data Storage FAQ Government Safety Network Email MSP Managed IT Services Cloud Computing User Tips Update Microsoft Excel Data Management Wireless Technology Risk Management App Retail Gmail Network Security Artificial Intelligence Windows Monitoring Telephone Smartphones User Error Wireless Charging Holiday Data Internet History Software as a Service Company Culture Cortana Money Virtualization Work/Life Balance Licensing Small Business Security Fraud Flexibility Data Privacy Proactive IT Google Maps File Sharing Remote Monitoring Google IT Management Sports IT support Chromebook Collaboration iPhone Cast Microsoft Data Security Business Management Outsourced IT Managing Stress Hosted Solutions Language Marketing Managed IT Data Recovery Data Breach Outlook Ransomware Internet of Things Emergency Apple Best Practice Technology Business Storage Screen Mirroring Managed IT services App store Unified Communications Android Conferencing Phishing Mobile Security Google Docs Vendor Management Excel Word Business Continuity Evernote Social Media BDR Cybersecurity Data Backup Lifestyle Maintenance Mobile Device Management Backup Applications Tech Support Charger Tech Term Value Data Loss Law Enforcement Wireless Internet Two-factor Authentication Passwords Updates Privacy Sales Cost Management Computing Telephone Systems Encryption Mobility Commerce VPN IoT NFL Data Protection Productivity Hybrid Cloud Remote Computing Chrome Sync Connectivity Server IT Solutions Windows 10 Apps Unsupported Software Bring Your Own Device WannaCry Personal Information Edge Redundancy Legal Hardware VoIp WIndows Server 2008 Blockchain Politics Gadgets Computers Adobe Mobile Devices eWaste Communications Business Computing Vulnerability Hosted Solution Disaster Recovery Automation Spam Tip of the Week Websites Data Theft Memory Cybercrime Networking Smartphone Content Filtering Saving Money Browser Compliance Alert Wi-Fi Innovation Antivirus Identity Theft Office 365 Managed Service Provider Gamification Financial Technology Cloud Identities Proactive Management Hackers Social Engineering Application HBO Spyware Communication Software intranet Printing Patch Management Hard Drive Devices Credit Cards IT Support Education Regulation IT Services Computer Softphones Legislation Microsoft Office Thank You Workers Router Big Data Project Management Microsoft Word Identity Operating System Congratulations Content Filter Computer Forensics Comparison Google Drive OneNote Device Security IT budget Specifications Streaming Media Google Assistant Financial Cleaning SaaS Windows Ink Analysis Employer-Employee Relationship Shortcut Ciminal Best Practices Efficiency