How to spot and block cryptominers on your network (2024)

How to spot and block cryptominers on your network (1)

bySusan Bradley

Contributing Writer

Feature

Nov 10, 20214 mins

MalwareNetwork Security

Cryptominer malware is stealthy and drags down network and device performance. Some simple tasks and basic tools can minimize its impact.

How to spot and block cryptominers on your network (2)

Credit: Romanovskyy / Getty Images

A friend recently traveled to Iceland and came back with the knowledge that the country is a key hub for Bitcoin mining due to its cheap thermal energy source. Your computer or your network’s computers could also be an ideal spot for cryptomining. I know of individuals who were found to be running cryptomining software on customers’ machines in violation of firm’s practices.

Cryptomining is the process of creating cryptocurrency units. Many of the popular cryptocurrencies are mathematical problems that creates units of currency. CPU cycles turn into money. This process is legal, but criminal cryptomining uses the power and CPU cycles of machines that they hijack to earn money.

Cryptojacking occurs when a malicious actor hijacks systems via web servers and web browsers. Malicious JavaScript is typically injected or planted into web servers so that when users visit a web page their browsers become infected, turning their computers into cryptominers.

Can you detect and protect yourself from this activity? Absolutely. Let’s start with the more passive ways to spot cryptominers on your network.

Monitor network performance

First, review performance of systems on your network. End users might notice excessive CPU usage, changes in temperature, or faster fan speeds and report them to IT. This can be a symptom of improperly coded business applications, but it also can indicate hidden malware on systems. Set baselines of your systems to better spot anomalies in your systems.

Don’t rely on performance anomalies alone to identify impacted systems. Recent incidents have shown that attackers are limiting CPU demand on systems to hide their impact. For example, a recent Microsoft Digital Defense Report noted the activities of Vietnamese threat group BISMUTH, which targeted private sector and government institutions in France and Vietnam. “Because cryptocurrency miners tend to be seen as lower-priority threats by security systems, BISMUTH was able to take advantage of the smaller alert profile caused by their malware to slip into systems unnoticed.” As Microsoft noted in a blog post, BISMUTH avoided detection by “blending in” with normal network activity.

Review logs for unauthorized connections

How do you detect such stealthy malicious actors besides a misbehaving computer? Review your firewall and proxy logs for connections they are making. Preferably, you should know exactly what locations and Internet addresses firm resources are authorized to connect to. If this process is too cumbersome, at least review firewall logs and block known cryptominer locations.

A recent Nextron blog post indicates the typical cryptomining pools that they’ve seen in use. You can review firewall or DNS servers to see if you are impacted. Review your logs for patterns that include *xmr.* *pool.com *pool.org and pool.* to see if anyone or anything is misusing your network. If you have a network that is highly sensitive, limit connections to only those IP locations and addresses that are needed for your network. In this age of cloud computing, this can be hard to determine. Even following IP addresses that Microsoft uses can be hard to keep up with. For example, you may need to adjust the list of authorized IP addresses when Microsoft adds new ranges for its Azure data centers.

Use cryptominer-blocking browser extensions

Some browser extensions will monitor for and block cryptominers. The No Coin and MinerBlocker solutions, for example, monitor for suspicious activity and block attacks. Both have extensions available for Chrome, Opera and Firefox. Alternatively, you can block JavaScript from running in your browser as malicious JavaScript applications are delivered through banner ads and other website manipulation techniques. Investigate if blocking JavaScript can be done in your organization, because it may have detrimental impact to some websites that you need for business reasons.

Consider Edge’s Super-Duper Secure Mode

Edge is testing what Microsoft calls Super-Duper Secure Mode. It improves Edge’s security by disabling just-in-time (JIT) compilation in the V8 JavaScript engine. Microsoft says bugs in JavaScript inside modern browsers are the most common vector for attackers. CVE data from 2019 shows that approximately 45% of attacks on V8 relate to JIT.

Disabling JIT compilation does impact performance, and tests conducted by the Microsoft Browser Vulnerability Research showed some regressions. JavaScript benchmarks such as Speedometer 2.0 showed a significant decline of up to 58%. Despite that, Microsoft says users do not notice the performance decrease because that benchmark “tells only part of a larger story” and users rarely notice a difference in their daily use.”

Look at cryptomining from a standpoint of external as well as insider threats. Your network or, if you’re a managed service provider, your clients’ networks might be a temptation that internal users wanting to mine cryptocurrency are not be willing to pass up. Review your options to proactively protect yourself from potential for attacks.

Related content

  • PODCASTS
  • VIDEOS
  • RESOURCES
  • EVENTS

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

How to spot and block cryptominers on your network (2024)

FAQs

How do I detect crypto mining on my network? ›

Highlights. Cryptocurrency mining can be detected in the network. Machine learning can be employed to detect mining services automatically. Dedicated web application collects IP addresses and service availability of various mining pool servers.

How to check if your PC is being mined? ›

Is your PC Infected with a Crypto Miner? Here's How to Find Out
  1. High CPU or GPU Usage. ...
  2. Increased fan noise and overheating. ...
  3. Decrease in performance. ...
  4. Unexplained Network Activity. ...
  5. Crashes and more crashes. ...
  6. Short battery life. ...
  7. Unknown Processes in Task Manager. ...
  8. Blocked access to system monitoring tools.
Jun 12, 2024

How to get rid of a crypto miner? ›

The only way to permanently remove a cryptominer is to format your hard drive and reinstall your software. Preparation is the nemesis of failure.

Can crypto mining be detected? ›

Two threat detection services of the Premium and Enterprise tiers are critical for detecting cryptomining attacks: Event Threat Detection and VM Threat Detection.

How does IRS track crypto mining? ›

Transactions on blockchains like Bitcoin and Ethereum are publicly visible. That means that the IRS can track crypto transactions simply by matching 'anonymous' transactions to known individuals.

Can antivirus detect crypto miners? ›

Yes, antivirus software can detect cryptojacking. Cryptojacking refers to unauthorized cryptocurrency mining activities conducted on a victim's device, using its computational power without consent. Modern antivirus programs have evolved to identify and neutralize cryptojacking threats effectively.

What are some signs that you have a Cryptomining malware installed on a computer? ›

Here are some key signs you may have been infected with cryptojacking malware:
  • High CPU usage. ...
  • Slow devices. ...
  • Slow network. ...
  • Battery dies faster. ...
  • Regular Overheating.
Jan 26, 2024

How do I stop my computer from being mined? ›

Disable JavaScript on specific sites

If you suspect a website is using your computer to mine cryptocurrencies without your permission, you can simply block JavaScript altogether.

How do I get rid of miners on my computer? ›

How to Delete a Miner Virus
  1. Step 1: start the system in Safe Mode. Restart your PC. ...
  2. Step 2: run antivirus software. Make sure that you have legit antivirus software installed. ...
  3. Step 3: restart your device.
  4. Step 4: Don't forget to update the OS and software. Check for system updates.
Jul 4, 2023

How do I block crypto miners? ›

This open-source extension automatically blocks Crypto Mining Scripts. This Google Chrome extension automatically blocks known crypto web mining scripts. Recently ThePirateBay.org and Showtime.com were caught experimenting with CoinHive, a crypto miner for websites.

How do I clean my crypto miner? ›

Ways to clean dust:

(1) Use the air gun to blow the front and rear fans twice gently. Clean up the fans at the back first (the all-in-one power supply should also be cleaned). (2) After cleaning the rear fan, then clean the front fan. Miners and power fans have to be cleaned up.

How to check for malware viruses, crypto miners, and other stowaways? ›

Home remediation
  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.

How do I know if my website is crypto mining? ›

Users can check the CPU usage via Task Manager (Windows) or Activity Monitor (macOS). The CPU usage should generally stay below 20-30%, but it exhibiting unexpected spikes can be the result of a crypto malware running in the background.

What is crypto malware and how to detect it? ›

Crypto malware is malicious software that uses your computer to mine cryptocurrency without your knowledge. If your computer has become slow and unresponsive, you may need to scan it for crypto mining malware.

Where does my mined crypto go? ›

The mined bitcoins go to the miner that found the block. Miners maintain the bitcoin network, for doing so they are rewarded 12.5 bitcoins for each block that is found. This reward incentives the miners to continue their efforts.

How do I know which network is mine? ›

Check the modem sticker

You can find your wireless network information printed on the sticker, which should be attacked to the back or bottom of your modem. Look for the SSID (WiFi network name) and security key (WiFi password). Some modems may have two SSIDs, one for 5 GHz and one for 2.4 GHz.

How do I find Antminer on my network? ›

Find Antminer IP address
  1. Download the software from the official website. It is available for Windows, Linux, Mac, or Raspberry Pi.
  2. Install the software.
  3. Run the software as Administrator.
  4. Enter the range you want to scan (e.g., 192.168. X.X).
  5. Wait for scan to finish.
  6. Export results.

How do I know if my phone is mining bitcoins? ›

Unusual CPU Usage. One of the most telltale signs of cryptojacking or malware infection is a sudden and unexplained spike in CPU usage. Since crypto mining requires significant computational power, an infected device will often show high CPU usage even when not performing any intensive tasks.

Top Articles
Poultry Application Process - The Florida Agricultural Classification
Unlawfully Carrying a Weapon (UCW) in Texas
Friskies Tender And Crunchy Recall
Lakers Game Summary
Design215 Word Pattern Finder
Ffxiv Palm Chippings
My Boyfriend Has No Money And I Pay For Everything
Northern Whooping Crane Festival highlights conservation and collaboration in Fort Smith, N.W.T. | CBC News
The Potter Enterprise from Coudersport, Pennsylvania
Merlot Aero Crew Portal
Embassy Suites Wisconsin Dells
Atrium Shift Select
[PDF] INFORMATION BROCHURE - Free Download PDF
Caresha Please Discount Code
7440 Dean Martin Dr Suite 204 Directions
This Modern World Daily Kos
2015 Honda Fit EX-L for sale - Seattle, WA - craigslist
Napa Autocare Locator
The Pretty Kitty Tanglewood
Metro Pcs.near Me
Johnnie Walker Double Black Costco
1973 Coupe Comparo: HQ GTS 350 + XA Falcon GT + VH Charger E55 + Leyland Force 7V
Www.dunkinbaskinrunsonyou.con
12 Facts About John J. McCloy: The 20th Century’s Most Powerful American?
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Roseann Marie Messina · 15800 Detroit Ave, Suite D, Lakewood, OH 44107-3748 · Lay Midwife
Where to eat: the 50 best restaurants in Freiburg im Breisgau
Osrs Important Letter
Sam's Club Gas Price Hilliard
Eero Optimize For Conferencing And Gaming
How to Use Craigslist (with Pictures) - wikiHow
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
Breckie Hill Fapello
Quake Awakening Fragments
Magicseaweed Capitola
Felix Mallard Lpsg
Qlima© Petroleumofen Elektronischer Laserofen SRE 9046 TC mit 4,7 KW CO2 Wächter • EUR 425,95
This 85-year-old mom co-signed her daughter's student loan years ago. Now she fears the lender may take her house
Atom Tickets – Buy Movie Tickets, Invite Friends, Skip Lines
How I Passed the AZ-900 Microsoft Azure Fundamentals Exam
Vintage Stock Edmond Ok
8776725837
Citymd West 146Th Urgent Care - Nyc Photos
Unit 11 Homework 3 Area Of Composite Figures
The Blackening Showtimes Near Ncg Cinema - Grand Blanc Trillium
Benjamin Franklin - Printer, Junto, Experiments on Electricity
Guy Ritchie's The Covenant Showtimes Near Look Cinemas Redlands
Heat Wave and Summer Temperature Data for Oklahoma City, Oklahoma
Runescape Death Guard
Adams County 911 Live Incident
Famous Dave's BBQ Catering, BBQ Catering Packages, Handcrafted Catering, Famous Dave's | Famous Dave's BBQ Restaurant
Itsleaa
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 6027

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.