Skip to main content

How to protect from Cyptojacking ?

What is Cryptojacking ?

Cryptojacking is one of the fastest-growing cybercrime globally and the resulting theft of cryptocurrency is incalculable at this time where your computer or other device (smartphones, IoT devices, and servers have also fallen victim) are infected with malware in the form of mining botnets. They feed off your CPU (central processing unit) to mine cryptocurrency – in many cases, without your knowledge
HOW IT WORKS ?
Mining botnets use your device’s power to mine cryptocurrency, usually Monero. There are already thousands of websites infected with mining malware. If you happen upon one of them, you may notice your computer suddenly running very slowly. In this case, the easiest way out is to simply close your browser.
It downloads the vicious code onto your machine that really causes a problem. This is much easier to do that than you might think. For example, a free movies from a content platform like Torrent may have hidden code inside.
Another option to get infected directly from the site,phishing emails or online advertisements.
HOW TO PROTECT ?
  • User Antivirus - An obvious option to protect your system from any malware, however only paid one may help.
  • Use Anti-Mining Plugins - Anti miner, Miner blocker etc browser plugins are there. Opera browser has inbuilt feature to protect from cryptojacking attempts.
  • Watchout processing speed - You are visiting certain websites and you feel slowness (No, not because of your 3G/4G connectivity issue..haha), close the browser and open it again. You might on infected website . Same with your smartphone. If your battery get drains unusually when you open particular apps your phone could have cryptojacked.
  • Disable Java Script - Probably this is not good option as this can decrease your overall website content, however good option to to prevent from in-browser cryptojacking.
  • Addblocker - As always to prevent unnecessary ads you have used Ad-blocker but now it is also useful to prevent from cryptojacking as I've said before , adware/ online advertise banner may infected.
  • Awareness - Always practice a good cyber hygine by locking your desktop before leave, not sharing password and not to click unknown links. etc. Beware from suspicious email links and attachments.
Cryptojacking isn’t going to cause you too many problems other than a slight headache and a bigger power bill. But it is proved that if mining botnet can breach your system and enter unknowingly, that means your system is vulnerable and the become an open gate for next virus to break in could be a lot worse.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત