Aditya Birla Group Cryptojacked! Take These Steps Now to Safeguard Your Computer

May 16, 2018

Editor's Note: Just last week, one of India's biggest conglomerates - The Aditya Birla Group - was 'cryptojacked'. More than 2,000 computers in various group companies were attacked.

Whether you have cryptos or not, your computer is vulnerable to an attack.

So, what exactly is cryptojacking, and how can you keep your computer safe?

Prasheel Vartak's Crypto Confidential subscribers already know about this new technique used by hackers. However, I now think it is crucial for everyone to take protective measures - so, for your benefit, dear reader I've asked Prasheel to share his strategy below.

Read On...

Bitcoin and cryptos have become so popular in the past year - everyone wants a piece of the crypto pie.

All that demand has jacked up prices, and despite the fall in the last couple of months, Bitcoin - the leading cryptocurrency, is still up by 850% from January last year.

As you know, there are two ways to get your hands on cryptos.

  1. Buy it on an exchange or from someone you know;
  2. Mine it yourself.

By now, I am sure you know that cryptocurrencies like Bitcoin, are 'mined' using computing power to solve complex mathematical problems.

You also know that mining bitcoin is an expensive operation and requires significant investments in terms of purchasing capable computers and processors, electricity, and cooling costs.

At high prices, the costs often outweigh the benefits for individual users, making mining prohibitive for a small operation.

--- Advertisement ---
Discover the Profits Hidden In Lesser-Known Small Companies

Believe it or not, unusual and lesser-known small companies are capable of generating BIG profits.

But just any small company will not do. You need to invest in the 'right' small companies in order to make BIG returns.

To know how you could do that, just click here…

So, you can't make money by mining your own cryptos.

But what about using other people to mine crypto for you?

Sounds fishy, right?

It is.

Hackers have found a way to do exactly this!

Now there's a third way of getting some crypto for yourself.

Cryptojacking - as it is called - is using someone else's computer to generate, or mine, cryptocurrency for oneself.

To put it simply, hackers and websites host sections of malicious code that have the ability to hijack your computing power towards mining cryptocurrency for the hackers' gain.

This doesn't install anything on your computer, nor does it take your consent. All it needs to do its dirty work is for you to visit a compromised website. That's it.

Once you visit a website affected by cryptojacking, this code makes your computer or mobile processor operate at full capacity which results in high electricity consumption. If you stayed for long on the website, you'd notice that your computer gets hotter and its fans get louder.

These cryptojackers are not only stealing the processing capabilities of your device, but they also make you foot the electricity bill!

As cryptojacking uses a bulk of the computing power, systems can freeze, personal data can be lost, gaps can be created that other hackers can exploit?-?all of which can negatively impact individual security and productivity.

Cryptojacking FAQs

  1. How exactly does it work?
  2. Cryptojacking works by embedding a JavaScript component in a website that can use a visiting device's processing power to mine a crypto.

    One of the most popular tools among cryptojackers is a JavaScript plugin called Coinhive, which mines Monero - a privacy focused cryptocurrency. Notably, Monero was mined in the Aditya Birla attempt as well.

    A portion of the processing power that a computer allots to a website with the Coinhive plugin goes toward the mining process, which goes to the hackers. The creators of the tool then get a 22% cut of the mined Monero.

  3. What's the incentive?
  4. Hackers use cryptojacking to mine cryptos (usually Monero) for themselves.

    While each visitor might only do a tiny bit of mining while they're there, every user lending some computing power over time can generate real money. And users might not even notice what's happening.

    Although not as valuable as bitcoin, a single Monero is worth around US $250. And it's easy to mine on a personal computer, unlike bitcoin, whose mining process usually requires large server farms. It's easy money for the hackers, without much risk or costs.

  5. What devices are affected?
  6. Cryptojacking affects anything that runs a browser with JavaScript. So, your desktop, laptop and even your mobile phone could be potential targets.

  7. Will I notice if a webpage is cryptojacking?
  8. It depends. If you are using a computer with a fast processor, you might not even notice the difference. But with other laptops or computers, the fan may start whirring louder or the device could heat up in a short time. With mobile devices, it would be difficult to notice as apps run in the background. But a slowdown or a quick battery drain could be indicative of cryptojacking.

  9. Is it dangerous?
  10. Cryptojacking can significantly affect the performance of your device. Especially if it is an older device. This may impact user experience as systems may freeze and personal data may be lost. In addition, it may also pump up the electricity bill.

  11. How to protect yourself?
  12. If you hear your computer's fan start whirring when you're visiting a website, or if the browser suddenly slows down dramatically, a cryptojacking miner may be running. If a website is mining currency with your computer, you can close simply close the webpage page to stop the activity.

    Browser extensions like NoCoin can also be used to block Coinhive and other cryptojacking miners. Further, ad blocking extensions and an updated anti-virus program can help keep you protected.

But some good can come of this...

While cryptojacking may be inherently bad, it could also have a silver lining.

The concept behind Coinhive could be a potential new way for websites to earn revenue. It may even replace pesky and intruding ads which have their own problems. Site owners could inform their users about leasing their computing power in lieu for the site's content.

Many charities are beginning to implement this concept to use visitor's computing power as donations to fund projects. Visitors are told transparently about how this process works, and can choose to voluntarily donate their computing power. Notably, the UN body - UNICEF has started 'The Hope Page' which allows visitors to fund its charitable missions with their computer's processing power.

However, in the vast majority of cryptojacking scams that have surfaced, neither the website nor its users were aware that they were victims.

Thus, at this stage, it is best to stop this activity from growing, so that it can eventually be mitigated and stopped.

Warm regards,

Prasheel Vartak
Prasheel Vartak, CBP (Certified Bitcoin Professional)
Editor, Crypto Confidential

PS: Cryptos go up and they go down, but they are not going away. The opportunity here could still be enormous IF you can stay ahead of the game. Can you? Yes - and quite easily - if you follow crypto expert Prasheel Vartak. Click here.

Recent Articles

Wait! Don't Chase Smallcaps Now September 18, 2020
Let the markets take a breather before you jump in.
Why We Picked This Small-cap Stock for Our Hidden Treasure Subscribers September 17, 2020
This leading household brand will profit big time in a post covid world.
How to Profit from the Most Underrated Risk India Faces from China September 16, 2020
An Indian tech company will cash in by defending Indians against this risk.
A Rs 280 Billion Bonanza for Smallcaps? September 15, 2020
Will the new regulations mark the beginning of a bull run in smallcaps?

Equitymaster requests your view! Post a comment on "Aditya Birla Group Cryptojacked! Take These Steps Now to Safeguard Your Computer". Click here!