What Is Hidden Mining, Why Is It Dangerous and How to Delete the Virus?


It often happens that when a new method of earning arises, some people begin to create dishonest schemes for its use. Today we will talk about such a concept as hidden mining. In this article you will learn how the intruders take possession of the computing power of unsuspecting people. We’ll figure out how to test your computer for such mining viruses and delete them without consequences for your own equipment. So, let’s talk about everything step-by-step.

(please, click the topic to scroll down to it)

  1. What is hidden mining?
  2. The principle of hidden mining
  3. How to find and delete the shady mining virus from your PC?
  4. Conclusion

1. What is hidden mining?

Scammers can hide the mining virus in any file, up to a torrent, a document or a picture. Getting into the system, the miner bot is installed in the hidden mode and disguised as the Windows registry, so it can remain unnoticed for a long time.

2. The principle of hidden mining

We have already explained how to hide the mining virus, it is time to talk about the basic principles of its work. By infecting a computer, this virus gets access to the processing power of its CPU. After that, it connects to a certain mining pool, which is engaged in cryptocurrency mining using processors. This mining brings a penny from one computer, so the main purpose of scammers is to infect as many devices as possible.

You might have guessed that all the mined money goes straight to the wallets of attackers. Bots can be different, more complex ones can monitor CPU overloads and make adjustments to their work based on this data. That is, if the virus sees that the computer is overloaded, then it turns off the mining so as not to attract unnecessary attention. Some versions of viruses have an additional clone of the source file, which will automatically restore it after uninstallation.

3. How to find and delete the shady mining virus from your PC?

If your computer starts freezing for no reason, although you do not perform any power-consuming tasks, it is already a bad sign that it can be infected with a hidden mining virus. So how do you find the hidden miner? You need to carry out a number of actions:

  1. Test the operation of the device during the execution of simple tasks;
  2. Open more complex programs, such as games;
  3. Run a load test of the graphics card and CPU during operation and after closing background applications;
  4. Analyze the indicators in all of the above loads.

If you find inconsistencies in the system performance report during the above-mentioned tests, then it is likely that your computer is infected with a hidden mining virus.

The next logical step will be to delete it, but this process is not as simple as it may seem at first glance. The fact is that scammers are working every year to improve the algorithms for bypassing the security system of antivirus programs. Thus, the deletion of the bot-miner should be approached with all responsibility. So, how do you delete it?

  1. First, backup all of your important files to an external storage device. It is very important, do not make a full backup of the files, as in this case you will transfer a virus file as well.
  2. Next, install a fresh update of the antivirus software. Additionally, you can install the program CCleaner, it works well in tandem with the antivirus and will increase the chances of completely removing the “program metastases” of the miner.
  3. Before you perform a search on the mining virus, close all applications that run in the background. This is necessary in order to make it easier to recognize malicious software, as it is often masked by the standard processes of the system.
  4. Get rid of all programs or games that were downloaded from questionable sites. After that, run a deep scan of the system for viruses and study all the processes in the task manager, if any of them loads the processor more than 15-20%, then most likely it is the hidden miner.
  5. More complex miners are not displayed in the task manager, and you will  need to download and install a special plugin that neutralizes spyware in automatic mode to get rid of it, for example, Malwarebytes Anti-Malware, CurelT, etc.
  6. If nothing helps, you should perform a full formatting of the hard disk and reinstall the operating system.

4. Conclusion

Many scammers use special viruses in order to use the computing power of multiple computers and mine cryptocurrency in such a way. This leads to inconveniences during the use of a PC, because the system does not work properly. In this article, we learned how to detect a hidden miner on your computer and get rid of it once and for all.

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

AT&T and T-Mobile Are Sued by the People Affected by the Sim Swapping Hacking Attacks

The company Silver Miller has filed a lawsuit against major mobile provider in the US, AT&T and T-Mobile, accusing them of indirect participation in the theft of the crypto assets belonging to this company.

According to the press release of Silver Miller:

In many cases, telephone providers have, in fact, assisted the thieves while they stole the phone number of people and let them access financial records and account information from the victims.

The sim swapping hacker attack resulted in the theft of more than 600 thousand dollars in crypto from the firm.

This is not the first crypto-related scandal for AT&T. We remind you:

An AT&T User Accused the Company of His Crypto Losses Amounting to $224 Million

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

First Mega-Block Was Created On the Bitcoin Cash Network, 32 MB In Size

Bitcoin Cash,in the run-up to its fork, surprised and pleased everyone creating the biggest block on its chain ever. BMG mining pool managed to mine several 32 MB blocks on the Bitcoin Cash (BCH) network.

At 8 a.m. EST on November 10, the first block at a height of 556034 was processed by BMG mining company. It has approximately 31997,634 kB (31,99 MB) in size. This block has exceeded the size of ex-largest block mined on BCH chain ever (546423; 23,15 MB).


Starting mining 32 MB blocks, BMG pool was happened to mine another three blocks. This event was spread in the social networks and forums at a speed of light. All crypto-related people were extremely excited and tested the new block. Results show that block 556034 confirmes a great amount of transactions, overcoming half of average amount of BTC transactions per day.

This event will definitely go down in history, and while everyone is celebrating it, we want to remind you

Bitcoin Cash: History and Predictions

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Blockchain Architecture: Technical Brief

Just recently, on October 31, 2018, Bitcoin celebrated its first anniversary – the first cryptocurrency turned 10 years old. Now almost all modern people have heard about Bitcoin. But only few of them can clearly and concisely answer the question: what are cryptocurrencies, and moreover, what is blockchain? In this article we will try to describe in simple words, what blockchain is and how it works.

(please, click the topic to scroll down to it)

  1. The history of creation and a brief description of Blockchain
  2. Technical Brief
  3. Private and public blockchain
  4. Advantages and disadvantages of blockchain technology
  5. Conclusion


1.  The history of creation and a brief description of Blockchain

Blockchain technology is the basis of cryptocurrency, and since recently it is being applied in other areas of life. From its name it becomes clear that, in fact, it is a chain of interconnected blocks.

The most important feature of the Blockchain technology is decentralization. That means, that the network operability is provided not by a single center, but by all its participants at the same time. For ease of understanding, the principle of operation of the blockchain can be compared with Torrent, where the user and the server are the same. Files that are downloaded from the tracker, are not located on the central server – they are stored by other users. Operations in the blockchain occur exclusively between users, without any intermediaries as well.

The term “blockchain” was first used on October 31, 2008. On the same day, the mysterious creator of Bitcoin Satoshi Nakamoto published his legendary article “Bitcoin: a one-time electronic monetary system.” The Bitcoin network was launched in early January 2009. But the concept of the modern blockchain itself was announced in the 1990s. Satoshi Nakamoto has put a lot of effort into the systematization of cryptographic works, which has been published over the past 20-25 years.

2. Technical Brief

We will not go delve into of cryptography, use narrowly defined terms and draw complex graphs. Firstly, 99.99% of people simply will not understand this (including us), and secondly, in order to open this topic completely, not one article, but an entire book is needed. In this article we are talking only about the basics of the architecture of blockchain systems.

So, the blockchain ledger can be conditionally compared with a book. It contains blocks that can be called “pages” of this book. Each block has a name that contains information about the previous block and the key from the next one. This is called a “chain of blocks”. All information is contained in an encrypted HASH. The keys from blocks are found by miners who maintain network performance.

3. Private and public blockchain

We all are used to associate blockchain with finances only, and more specifically with cryptocurrencies. But it is worth noting, that this technology is much more versatile, it can be applied in other areas of life, such as:

  • logistics;
  • identification;
  • proof of intellectual property rights;
  • voting;
  • music;
  • charity;
  • property;
  • etc.

The Bitcoin or any other cryptocurrency network uses a public blockchain, the keys of which are publicly available. It is perfect for the concept of cryptocurrency, but it cannot be used to maintain the workflow of private companies. The private blockchain is perfect for this. Lately it causes increased interest in many companies. For example, it can be used for tracking of goods trade and shipping companies. Such a solution will significantly reduce costs, as well as eradicate all sorts of fraud.

4. Advantages and disadvantages of blockchain technology

First, let’s talk about the advantages:

  • Decentralization. Such network is almost impossible to be closed, because for this it is necessary to disconnect all its members from the network.
  • Safety and reliability. Technical features of the technology exclude falsification, data fraud, and hacker attacks.
  • Versatility. This technology is predicted a great future, because it can be used in various industries.

Unfortunately, the blockchain technology is not perfect and has several disadvantages:

  • Scaling issues.
  • Irreversibility of operations. After the operation was recorded in blockchain, it is impossible to cancel it, even if it was done by mistake.

5. Conclusion

Blockchain technology can cardinally change our lives. Only narrow specialists are able to understand all mechanisms of its work. Basic principles, which we discussed in this article, will be enough for the vast majority of people.

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Administartion of Chinese Secondary School Was Mining Ethereum: Details of Crime

School seems to be the very place where the laws must be strictly observed, especially in China, a totalitarian country with strict rules, including those related to cryptocurrency and mining. Unfortunately, it is not that simple.

A funny story happened in one of the middle schools in the city of Chenzhou, Hunan. According to local Chinese news outlet HK01, the Principal and Vice Principal were caught mining Ethereum using school assets.

According to the Principal’s words, he first installed the equipment at home, but the electricity bills were too high, so he decided to relocate it to the school dorm, but there was not enough space. He had no choice but to transfer all the servers and equipment to the school.

Source: HK01.com

After some time, namely several months, the teachers of this school began to complain that computers emit a lot of noise and often “slow down”. The teachers decided to find the answer to this issue and found mining rigs.

Principal Lei Hua and Vice Principal Wang Zhipeng have already received their punishment, in the form of dismissal and warning, respectively. Meanwhile, we want to remind you that mining in China is growing and flourishing, thereby threatening the security of the world’s most famous cryptocurrency, Bitcoin.

Bitcoin Is in Danger: Chinese Hegemony Over the Industry

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Japanese GMO Releases a Monthly Update: What Has Changed As For Mining?

A major Japanese company specializing in crypto mining, GMO Internet Group came out with its monthly update which contains a number of important statistical updates about the volumes of mining within its system.

According to this summary, the overall hash rate has increased significantly compared with the previous results. Moreover, among the only 2 coins that are being mined at GMO, Bitcoin Cash managed to beat Bitcoin. Its mining volumes have skyrocketed: 875 BCH coins have been mined, while BTC can only boast of 595.

The plans of the country include the following:

We will continue to introduce the mining machine from other manufacturers to the in-house mining. Our plan is to see our hash rate surpass 800 PH/s by the end of December.

We remind you:

Bitcoin Mining: How Are the Most Popular Coins Mined Today?

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Turkish Police Detained 11 Criminals That Stole Bitcoins for 80 Thousand

The Cybercrime Department of the Turkish National Police has arrested 11 people who are suspected of breaking into cryptocurrency wallets. This has been reported by the Turkish edition Hürriyet.

Istanbul police received appeals from 14 citizens. According to the victims, their cryptocurrency wallets were hacked, and Bitcoins were stolen from there. Law enforcement agencies launched an investigation and a search campaign for the criminals who hacked emails, account data and passwords.

The number of stolen BTC equals to 437 thousand TRY or $80 thousand. Presumably, the hackers transferred the cryptocurrency to several fake accounts in order to convert it into fiat currency.

On October 26, 11 people were arrested in different parts of Istanbul by agents of the cybercrime unit. The alleged criminals were found through SIM-cards that were registered on crypto exchanges. Additionally, the police monitored stolen assets through banks’ security cameras, in case of a quick transfer of funds. During the arrest, the police seized two fake IDs, identifying individuals, a number of devices that were used for hacking, a SIM card and 22 flash devices.

At the moment, the investigation is ongoing. Allegedly, there are many more victims of hacking.

We remind you that recently, a group of players of a popular computer game “Call of Duty” have stolen 3.3 million dollars.

Call of Duty Theft: FBI Details on Stolen $3.3 Million in Crypto

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/