Covert mining malware is a category of malicious code designed to use the processing power of a user’s device to mine cryptocurrency. In this case, victims do not consent or even suspect such activity.
What is hidden mining?
How do I detect hidden mining?
Cryptomining and cryptojacking require extremely high CPU activity. In particular, victims often report a noticeable decrease in device performance, overheating, and increased activity (and thus noticeable noise).
On Android devices, the computational load can even lead to “bloating” of the battery and thus physical damage to the gadget.
How do I protect myself from malware viruses?
If you notice that accessing a certain website drastically increases your CPU usage, close the browser.
In some cases, you may need to reboot to close hidden browser windows that continue to run in the background. After a restart, do not let the web browser automatically start the previous session, as this may reopen the crypto-jacking tab.
A brief history
Hidden mining became widespread in 2017 due to the increase in the price of various cryptocurrencies. Older variants of such malware are usually designed to infiltrate the victim’s device and install a miner virus. In September 2017, a new mining service, Coinhive, was created.