What is encryption? How to protect yourself from this growing cyber crime

[ad_1]

If you are familiar with cryptocurrency e blockchain technology, you may have heard of cryptojacking. But while it sounds almost like an adventure sport, unfortunately there is nothing exciting. The only thing that will rise with cryptojacking is the victim's electricity bill. And of course, the bad hacker fills his wallet with Monero.

What is encryption?

Let's recap: what is cryptojacking again? Cryptojacking is a growing threat to cybersecurity, the the biggest in 2018. It is indiscriminate and infects all types of devices, from laptops and servers to desktops and mobile phones.

For further context, as much as a quarter of all companies have been infected with cryptographic malware since 2018.

If your device is encrypted, it is detected and forced to undermine the cryptocurrency, often without your knowledge.

Does cryptocurrency mining not require much power?

The cryptocurrency of data mining requires a high level of computing power, far more than your laptop can offer. But cryptojacking, unlike ransomware or malware, is not a vicious and unequivocal attack that turns off the machine, steals your data or drains your wallet. It's more like a lye that crashes and dumps a small amount of CPU over time.

When hackers set their code to use a very low amount of CPU, you can not even notice it's happening. Many of the symptoms of cryptojacking are similar to those of a malfunctioning computer that many of us endure daily. For example, think of a superheated fan, a still browser and a lackluster performance.

In addition to these hassles, the worst cryptojacking problem is that it uses a large amount of energy. So, if you had wiped out a poor-performing computer until old age, you should finally put two and two together when the electricity bill arrives at the end of the month.

Although cryptojacking is a non-aggressive form of cybercrime, in some cases it can actually damage the device, not to mention slow it down significantly. Moreover, simply because the authors do not aggressively steal your data does not mean they are less guilty. They are still using other people's devices illegally without permission.

The highest case of cryptojacking so far has been, without a doubt, that of the Botnet Mining Shominru. Infecting more than 500,000 machines, this giant cryptographic robot targeted Windows servers and, over time, destroyed a huge $ 3.5 million in Monero.

How do I get cryptojacked?

Do not make the mistake of thinking that cryptography is only for cryptocurrency users. It is not necessary to explore cryptographic media or open an account in a bag to be infected. Seemingly innocent carriers such as free content management systems (CMS) can contain malicious code and are easy to download without realizing it.

In fact, a huge one 13,000 WordPress plugins they were found to contain critical security vulnerabilities last year that made them easy targets for the illegal extraction of cryptocurrency.

Social media is another important vector for phishing tactics that use official e-mail to encourage victims to click on a link and download malicious code. Malvertising can also infect your device, but using an adblocker can help you avoid it.

Avast software he also revealed that GitHub was popular among cryptocurrency miners as they were launching existing legitimate products and stealthily hiding their malware inside.

Unlike other viruses, you do not even need to download malware to get encrypted. Thanks to the increase in programs like Coinhive JavaScript, websites can be infected with malware encryption quite easily.

While some sites intentionally use this code as an alternative to advertising revenue streams, like the Pirate baymost websites get infected without their knowledge.

In 2018, more than 300 websites The use of the Drupal content management system was infected by Coinhive JavaScript and were used to extract Monero. Among the sites there were those of the San Diego Zoo, Lenovo and UCLA.

Can I protect myself against cryptojacking?

Using a robust antivirus is a good start, but this does not make you immune. There are also plugins like NoCoin for Chrome and Firefox and Threat. However, even with these in place, as much as 82% of infected sites continue to not be detected.

Furthermore, due to the indiscriminate nature of cryptojacking, it is not just companies with large servers that are an obvious target. Cyber ​​criminals follow anyone with a personal computer, mobile phone or even an IoT device.

According to a research by Kaspersky LabMobile mining is increasing and, once more profitable, will explode in terms of proliferation. Android users are particularly sensitive to cryptojacking, with 60 million devices already used for the extraction of illegal cryptocurrencies by February 2018.

Cryptojacking: the take-out key

Although you may not always be able to prevent cryptojacking, you can stay alert to symptoms and use common sense while browsing online. Make sure your adblocker and antivirus software are up to date. Never click on a link in an email or download unofficial software and check two or three URLs before opening them. Do not make it easier for hackers to use the device for personal gain.

[ad_2]Source link