Cryptojacking: a new attack technique
These malicious scripts are used to stealthily excavate the Monero cryptocurrency using the processor of the infected computer. By installing the appropriate script in the browser with a unique website code, the cybercriminal enriches himself in Monero every time an unconscious attack turns on the computer and visits websites - explains Robert Dąbrowski, head of the Fortinet engineering team.
So if you hear the fans of your computer running at full speed for no apparent reason, you should check the CPU usage. When you see a list of all processes running on your computer and setting the filter for real-time CPU usage, you should usually close your web browser. This will terminate the connection to the infected site. After doing this, you can open the browser again and easily visit other websites.
The next step recommended by Fortinet specialists should be to secure the computer with reputable protection software against another cryptojacking attack. It is also worth using the guide prepared by AVLab , where experts provide valuable tips on protection against cryptocurrency diggers in the browser. Of course, you can also opt out of visiting sites with pirated content.
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.