What Is Hidden Mining, Why Is It Dangerous and How to Delete the Virus?

mining

It often happens that when a new method of earning arises, some people begin to create dishonest schemes for its use. Today we will talk about such a concept as hidden mining. In this article you will learn how the intruders take possession of the computing power of unsuspecting people. We’ll figure out how to test your computer for such mining viruses and delete them without consequences for your own equipment. So, let’s talk about everything step-by-step.

Contents:
(please, click the topic to scroll down to it)

  1. What is hidden mining?
  2. The principle of hidden mining
  3. How to find and delete the shady mining virus from your PC?
  4. Conclusion

1. What is hidden mining?

Scammers can hide the mining virus in any file, up to a torrent, a document or a picture. Getting into the system, the miner bot is installed in the hidden mode and disguised as the Windows registry, so it can remain unnoticed for a long time.

2. The principle of hidden mining

We have already explained how to hide the mining virus, it is time to talk about the basic principles of its work. By infecting a computer, this virus gets access to the processing power of its CPU. After that, it connects to a certain mining pool, which is engaged in cryptocurrency mining using processors. This mining brings a penny from one computer, so the main purpose of scammers is to infect as many devices as possible.

You might have guessed that all the mined money goes straight to the wallets of attackers. Bots can be different, more complex ones can monitor CPU overloads and make adjustments to their work based on this data. That is, if the virus sees that the computer is overloaded, then it turns off the mining so as not to attract unnecessary attention. Some versions of viruses have an additional clone of the source file, which will automatically restore it after uninstallation.

3. How to find and delete the shady mining virus from your PC?

If your computer starts freezing for no reason, although you do not perform any power-consuming tasks, it is already a bad sign that it can be infected with a hidden mining virus. So how do you find the hidden miner? You need to carry out a number of actions:

  1. Test the operation of the device during the execution of simple tasks;
  2. Open more complex programs, such as games;
  3. Run a load test of the graphics card and CPU during operation and after closing background applications;
  4. Analyze the indicators in all of the above loads.

If you find inconsistencies in the system performance report during the above-mentioned tests, then it is likely that your computer is infected with a hidden mining virus.

The next logical step will be to delete it, but this process is not as simple as it may seem at first glance. The fact is that scammers are working every year to improve the algorithms for bypassing the security system of antivirus programs. Thus, the deletion of the bot-miner should be approached with all responsibility. So, how do you delete it?

  1. First, backup all of your important files to an external storage device. It is very important, do not make a full backup of the files, as in this case you will transfer a virus file as well.
  2. Next, install a fresh update of the antivirus software. Additionally, you can install the program CCleaner, it works well in tandem with the antivirus and will increase the chances of completely removing the “program metastases” of the miner.
  3. Before you perform a search on the mining virus, close all applications that run in the background. This is necessary in order to make it easier to recognize malicious software, as it is often masked by the standard processes of the system.
  4. Get rid of all programs or games that were downloaded from questionable sites. After that, run a deep scan of the system for viruses and study all the processes in the task manager, if any of them loads the processor more than 15-20%, then most likely it is the hidden miner.
  5. More complex miners are not displayed in the task manager, and you will  need to download and install a special plugin that neutralizes spyware in automatic mode to get rid of it, for example, Malwarebytes Anti-Malware, CurelT, etc.
  6. If nothing helps, you should perform a full formatting of the hard disk and reinstall the operating system.

4. Conclusion

Many scammers use special viruses in order to use the computing power of multiple computers and mine cryptocurrency in such a way. This leads to inconveniences during the use of a PC, because the system does not work properly. In this article, we learned how to detect a hidden miner on your computer and get rid of it once and for all.

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

John McAfee’s Ex-Treasurer Did Not Manage to Ride Off Into the Sunset With the Stolen Money

John McAfee tracked down the person who robbed his company

Luke Jenkins and his girlfriend Gemma that are suspected in robbing the company of John McAfee could not get away with it.

We remind you:

John McAfee’s Ex Treasurer Stole Millions of Dollars From the Company

According to McAfee, all the financial movements made by the thieves were tracked down. Some of the crypto exchanges have already frozen the accounts of the failed Bonnie and Clyde.

The developers’ team keeps working on bringing the money back to where it belongs.

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Mining Complexity: What It Is and Where It Will Get

mining complexity

Not long ago there was a real gold rush around cryptocurrency mining – thousands of people started digging digital rock to get the precious digital gold, while its rate was beating all records and surpassing all expectations. It all started from simple mining on users devices – laptops, personal computers, tablets, etc. – and turned into a complicated industry with a developed infrastructure. Mining pools appeared, specialized equipment (ASIC-miners) was produced, huge mining farms were set up, where mining was conducted on an industrial scale. Mining even partially switched to the cloud – services appeared that offered cloud cryptocurrency mining without any investments, except for financial ones. Although mining has not changed the structure of the world economy, it is nevertheless not an ordinary phenomenon. The fact that currently cryptocurrency mining consumes more electricity than many countries is a case in point.

Today we will talk about what mining complexity, its function, how it changes, what it depends on and how can it set the tone for the entire cryptocurrency mining industry.

Contents:
(please, click the topic to scroll down to it)

  1. Brief review of mining
  2. Complexity: how it changes and what it depends on
  3. What will happen to mining in the future
  4. Conclusion

 1. Brief review of mining

Mining actually means making computational operations to decode a certain algorithm and find its hash. Every mineable cryptocurrency is based on a particular hashing algorithm. When the algorithm is successfully decoded, a new block is added into blockchain, a new coin is issued and miners get their rewards. Many popular digital currencies can be issued only through mining, these are Bitcoin and its forks, Ethereum, Monero, Litecoin, Dash, Zcash, etc. Some, however, are pre-mined and do not provide mining opportunities, like Ripple, NEO, NEM, EOS, Tether, etc.

Depending on hash features, different equipment can be used to mine different digital currencies. Initially all mineable coins, including BTC, were mined on users devices (PCs or laptops) using CPU. Today it is not that common and there are a few popular coins that still provide such type of mining. Soon CPUs became not enough to profitably mine digital coins and miners started using graphic cards to cope with more resource-intensive calculations and growing complexity.

Later the specialized equipment appeared on the market – ASIC-miners that are used today to mine Bitcoin, as well as other coins, such as Litecoin, Ethereum, Dogecoin, Zcash, Bitcoin Cash, Litecoin, etc. ASIC is a specialized microchip that performs calculations much faster than graphic cards. Although ASIC today is mostly associated with mining, the technology itself was developed in early 1980s to advance graphic performance of PCs. Besides, miners create pools where they combine their processing power to make mining more efficient for the whole group. The reward for the created block is then distributed depending on the processing power provided by each pool member.

There is also another mining solution – cloud mining. Graphic cards and ASIC-miners are rather expensive, more and more of them are required to mine profitably. The equipment needs space to be placed, has to be connected to the power grid, cooled, cleaned, repaired, set up, monitored, etc. Cloud mining implies leasing of computing power from companies that manage large mining farms and data centers. In addition, cryptocurrency is mined in other sometimes even illegal ways. For example, your computer can be infected with a hidden virus-miner that uses its resources to mine a particular coin.

2. Complexity: how it changes and what it depends on

Complexity indicates how difficult it is to find hash. The specified hash parameters determine how difficult calculations should be to find it. The more users are there in the network and the more cryptocurrency is mined – the higher complexity is. Bitcoin complexity is reviewed every 2016 blocks (about 2 weeks) and depends on how much time was spent to mine previous 2016 blocks.

What is the function of complexity? Bitcoin is designed to add every new block in  10 minutes on average. This can differ from one cryptocurrency to another (2.5 minutes for Litecoin and up to 20 seconds for Ethereum). The amount of processing power in the network can drastically change over time – when Satoshi Nakamoto mined the first BTC, there was only one device in the network, probably a laptop or a PC. Today we have huge industrial farms with thousands of special mining devices.

To ensure the stability of the generation of new blocks, cryptocurrency software automatically makes it more or less difficult for miners to find hash. So if there are more miners and the computing power of the network increases, it is more difficult to find hash. If the power decreases – it becomes easier to make all necessary calculations. This is the way the system remains sustainable – no matter how much processing power is their in the network it will still take around 10 minutes to generate new Bitcoin block. In early 2010, Bitcoin complexity was just a little bit above 1, while in 2013 it was already 3 million. Today it has already exceeded 7 trillion.


Source: BitcoinEnergyConsumption.com

So, every 2016 blocks (about every two weeks), Bitcoin corrects its complexity, so that each block is generated in approximately 10 minutes, regardless of the number of miners in the system. Other mineable cryptocurrencies has the same role for complexity and it is implemented in a similar way.

3. What will happen to the mining in the future

Mining is no longer the same as it used to be – says… everyone. While some digital currencies can still be mined using PCs, it is rather difficult to join the “extraction” of most of the leading coins. To start mining Bitcoin today you should have… started mining Bitcoin a few years ago. The same thing is happening to other digital currencies, and ASIC-miners are to blame in fact. They are able to make calculations way faster and more efficient and wherever they enter the mining market, the total complexity increases and CPU/GPU-mining retires. However, some still manage to make money out of mining. There are still those coins that are not mined using ASIC-miners, which means one can still mine them on average laptops or PCs.

Anyway, one thing is clear – today, mining is no longer stands for easy money, and the market is being taken over by large, “professional” miners, who mine digital coins on an industrial scale. Industrial mining is associated with a whole range of logistics, legal and resource issues. Until recently, most of Bitcoin miners were located in China, but last year the government banned ICOs, cryptocurrency trade and mining. Another thing is energy consumption. Calculations require a lot of electricity, so the miners are looking for countries with lower power prices.

 

Source: BitcoinEnergyConsumption.com

Another problem is obsolescence of equipment. Many industrial miners have found out, that the hardware they used to mine BTC 2017 cannot ensure the same profit in 2018.

So, mining becomes less profitable and new members have no chance to join the market easily. This lead to the fact that mining of top coins becomes way less popular. Not mineable coins, as well as those who still provide available mining can take advantage of that. For example, in 2017 there was a boom for mining browser extensions (like Coinhive). Of course, browser-mining of Bitcoin or Ethereum sounds rather weird, but there is another relatively popular coin – Monero – that still provides such an opportunity.

4. Conclusion

So, complexity is one of the key categories that form a technical structure of mineable cryptocurrencies. Written in the protocol, it helps blockchain to remain sustainable in terms of the time necessary for the generation of new blocks. Complexity directly depends on the number of miners in the network and, accordingly, on the total processing power. Most of the leading cryptocurrencies have already became much more difficult to mine and this is obviously an ongoing process. There are more users, more special equipment and more professional industrial-scale miners which make mining unavailable for average users.  

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

John McAfee Launches a New Bounty: 20 Million USD to a Person Able to Hack Bitfi

mcafee

John McAfee keeps surrounding himself with controversies. Hardly has the scandal with Bitfi been forgotten, when he started it all over.

In case you don’t remember what happened, John McAfee claimed his wallet to be unhackable and promised $100 thousand and later $250 thousand to those who would break into it. Although multiple people and even organizations claimed they did hack the wallet and provided evidence, nobody received a reward, moreover, people were threatened by Bitfi. McAfee in his turn said that a wallet can only be considered hacked if assets are stolen from it.

This time McAfee started a new crazy bounty. He offered 20 million USD in crypto to a hacker in case he succeeds to break into Bitfi.

Given all the things that happened in the past, hackers are obviously going to be more careful when dealing with Bitfi. We will be monitoring the situation and report on any updates.

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

It Will Be Possible To Mine Ethereum and Ethereum Classic At BTC.com

mine ETH

According to the statement, BTC.com, owned by Bitmain, is launching mining pools for the mining Ethereum and Ethereum Classic. Innovations are aimed at scaling the mining infrastructure of Ethereum.

The report says that depending on the situation on the market, users of the resource for mining pool.btc.com will be able not only to mine these cryptocurrencies, but also to switch their computing power from the Ethereum pool to the Ethereum Classic pool.

Mining cryptocurrency will be implemented by using the GPU. According to the CEO of BTC.com, Zhuang Zhong, this is due to the universality and simplicity of GPU-miners.

We want to remind you:

A Chinese Mining Giant Bitmain Invests $12 Billion Into EOS

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

DDoSers Tried to Hack John McAfee’s Site

mcAfee hack

Since John McAfee, a famous crypto personality, encouraged everyone to hack his wallet Bitfi, some people took his words seriously and now try to hack everything that he mentions or creates.

As we reported earlier, McAfee has recently launched his own site with crypto prices and market cap data, similar to the well-known the CoinMarketCap.

The portal is so young, but it already suffered a hacker attack. This was informed by McAfee himself on his Twitter.

The attack was a DDoS type (a kind of attack aimed at shutting the website down completely. However, according to the tweet, attackers were not successful.

We remind you

John McAfee’s Ex Treasurer Stole Millions of Dollars From the Company

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Google Play Banned Mining Apps, How Come Some of Them Are Still There?

there are still mining apps on google play despite the ban

As we reported earlier, Google Play Market has officially prohibited any kinds of apps related to mining cryptocurrency. The developers of such applications were given a month to restructure them so that they comply with the rules or remove them from the service completely.

According to the research made by The Next Web, after the given months was over, some developers chose to disobey the regulation. Out of 8 mining-related apps located in Google Play: three were deleted, one was supposedly updated and is now compliant with all the rules.

Meanwhile, the other four applications are still operating on the service and there seem to be no changes whatsoever, you can still mine cryptocurrency using them.

We remind you

A Google Play Scam App Tried to Sell Fake Ethereum for €335 per Coin

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/