Several ways to check whether you are the victim of a processor of the pirates for covert cryptocurrency mining
The frequent cases of illegal mining, that is, when through malware resource of your computer, the attackers use for the extraction of capitalat lead to outrage users. We consider several variants of protection against covert mining.
To do this check using a Central processing unit (CPU) by opening the task Manager at the performance tab on your computer, according to Cointelegraph. If there is something that really sucks your processing power – it will quickly become clear.
Thus, if all programs are closed but the CPU usage is still very high, may have a problem with malicious software (ON) for cryptoserviceprovider.
Ad blockers can help
Pirate mining can occur not only from visited sites, there were cases when the infected ads on websites has also led to this kind of piracy. Thus, running ad block can stop him.
In addition to the legal software to pirated developments there are more sophisticated forms of malware that actively penetrate the system. They are delivered via infected image files, or after clicking the link leading to a malicious website.
If you have become subject to attack one of them, open task Manager and identify the process that consumes the major part of resource of your computer.
Recall that the tracker of The Pirate Bay put on their pages and software code that makes your users ‘ computers to mine crypto-currency.
In Ukraine, the sites Football.ua, Korrespondent.net, iSport.ua and Tochka.net hidden mainile cryptocurrency Monero through the computers of its users
See also: In Ukraine a draft law on cryptocurrencies