How to recognize a cryptomining attack?
Cryptomining and cryptojacking are associated with extremely high processor activity that has noticeable side-effects. Victims often report visibly reduced performance of their device, its overheating as well as increased fan activity (and thus noticeable noise).
On Android devices, the computational load can even lead to “bloating” of the battery and thus to physical damage to, or destruction of, the device.
How can you protect yourself from malicious cryptominers?
Use a reliable and multilayered security solution to block unwanted cryptomining and cryptojacking activity. If you notice that accessing a specific website dramatically increases the use of your CPU, close the browser.
In some cases, a reboot may be necessary in order to close the hidden browser windows, which continue with the mining in the background. After the restart, don’t allow your browser to autoload the previous session, as this might re-open the cryptojacking tab.
This revenue model has become very popular among cybercriminals, who started “infecting” websites around the world with Coinhive’s code, misusing these sites for their financial gain without the consent of their owners or visitors. Cybercrooks have also started creating copycat cryptomining services of their own, offering similar code, but with outright malicious intentions.