MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

This should come as absolutely no surprise. Cryptocurrencies are ideal for cybercriminals, largely due to their high values and equally high levels of anonymity. However, mining even the smallest amount through legitimate means is an expensive and lengthy process that requires specialized computer hardware and significant amounts of electrical power.

As a result, there has been a rise in a new threat to users called crypto jacking. Malware will infect a user’s device and hide in the background, leeching off of the host computer’s resources to mine for cryptocurrency. This causes the exact side effects that you would expect: increased electric bills and hindered performance for the user, with an increased rate of wear on their computer components. Worse, this malware only requires a compromised website to be visited for the malware to go to work - and while this once meant that the malware would only work as long as the unwitting host was on the website, cybercriminals have even found a way to work around that. Now, some infected sites will create a pop-up that hides behind the computer’s taskbar, unnoticed, and continues to eat up resources for the cybercriminal’s profit.

In addition to malware downloads, crypto-miners are often spread through hidden code on the websites themselves, as well as untrustworthy browser extensions. This variety of the malware has been discovered in the websites for the United States Courts, the United Kingdom’s National Health Service, and the Australian state governments of Victoria and Queensland. It was found in a text-to-speech and translation plugin used on those sites. The developer of the plugin removed it from all websites immediately.

Business owners should pay close attention to these events, as they could easily have a direct effect on business operations. After all, you pay a pretty penny for your Internet and its bandwidth - why should it profit some cybercriminal, and not you? Furthermore, mining cryptocurrency is no easy task for any hardware, which means it shortens the life of the machine and the components inside. This ultimately means that you will also be on the hook to replace that hardware sooner, costing your business even more.

Fortunately, not all hope is lost. Many browsers are incorporating anti-cryptocurrency measures, and some antivirus programs can block crypto jacking attempts. There are also some extensions available for some browsers that help to stop cryptomining and crypto jacking scripts.

At MERIT Solutions, we’re here to help keep your IT running efficiently. This includes preventing threats and malware. Give us a call at (757) 420-5150 to find out what we can do for you.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Managed IT Services Backup Business Management Mobile Devices google Computer Outsourced IT Business Microsoft Disaster Recovery Hardware communications VoIP Business Continuity IT Support Windows 10 Innovation IT Services Cybersecurity Email User Tips Data Backup Efficiency Cybercrime Tech Term Windows Server Saving Money Ransomware Mobile Device Management Internet of Things Small Business Apps Managed IT Mobility Data Recovery Operating System Productivity Law Enforcement browser Smartphone Data BDR Money Save Money Telephone Systems Android Virtualization Office 365 Phishing Passwords Data Security Smartphones Cloud Computing Hosted Solution Quick Tips Managed Service Provider VPN Information Technology Password Recovery Holiday Network IT Support Microsoft Office Chrome BYOD Communication Automation Alert Health Vulnerability Miscellaneous Computers Two-factor Authentication Facebook Government Wireless Data Breach Social Media Best Practice Risk Management Update Unsupported Software Gadgets Workplace Tips Budget Data Management Work/Life Balance Cost Management Collaboration Wi-Fi Social upgrade Application Google Drive Hacking App Avoiding Downtime Compliance Personal Information Spam Politics User Error Office tips Applications Private Cloud Managed IT Services History Remote Computing Cleaning USB Proactive IT Save Time Gmail The Internet of Things Users Identity Theft Employer-Employee Relationship Artificial Intelligence Flexibility Shortcut Social Engineering Data Protection Tech Support Streaming Media Router Firewall Wireless Technology Antivirus Current Events search Audit Blockchain Telephony Mobile Computing Mobile Security Transportation Devices Automobile Excel Robot Value Wireless Charging Google Assistant Data Storage End of Support Saving Time Fraud OneNote Office Phone System Computer Care Networking Legal Data Loss Encryption IT solutions Humor Disaster Marketing DDoS Google Docs Project Management Big Data Sports MSP Television Apple Education Hacker Vendor Management Redundancy SaaS Travel Solid State Drive Internet Exlporer WiFi Commerce Samsung Management Content Filtering Going Green Bandwidth Cortana Battery Patch Management iPhone HaaS Windows 10 eWaste Touchscreen Bring Your Own Device Lifestyle Identities Point of Sale Business Intelligence HIPAA Outlook Running Cable Server 2008 Company Culture Charger Consultant Printing Safety Word Text Messaging Black Market Ali Rowghani Hybrid Cloud Smart Technology Legislation IoT Trending Managed IT Service Identity Avoid Downtime iOS Windows Ink Spyware Shadow IT Business Technology Comparison Language Document Management Data Privacy Experience Regulation Computer Fan server installation dvd "cannot install required files" Evernote Computer Forensics Google Maps Laptop stock Uninterrupted Power Supply Wasting Money Specifications Screen Mirroring Hard Drive Sync Video Games Dark Web PowerPoint Software as a Service Edge Virtual Reality Meetings Touchpad tweet Emails Amazon Scam Sales Virus Cast Reputation Workers Chromebook Music Adobe Advertising calculator Wireless Internet Ciminal Settings Twitter control Virtual Assistant Employer Employee Relationship Retail Proactive Updates Smart Tech Analytics Licensing WannaCry Data storage Gamification Keyboard Instant Messaging WSJ HBO Administration Webinar Chromecast Exchange Alexa for Business Computer Accessories Conferencing Websites Worker Commute Mobile Device Microsoft Word Connectivity Mobile Distributed Denial of Service altivista Memory Microsoft Excel Managing Stress Remote Monitoring Colocation IT solutions SBS Gifts Data Theft Content Filter Books Professional Services Hard Drives Scalability compaq Files Students Hiring/Firing File Sharing intranet IT Management Wearable Technology Windows 10s Administrator Lithium-ion battery Computing Monitoring How To Nanotechnology hp Unified Communications Benefits Storage IT budget Analysis WIndows Server 2008 Relocation Hard Disk Drive Access domain Credit Cards Unified Threat Management Tablets Maintenance Root Cause Analysis Financial App store Entertainment remote Training FAQ Upgrades Financial Technology Electronic Medical Records NFL PDF Device Security Augmented Reality Yahoo Emergency CrashOverride Thank You Congratulations Worker Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...