Author

Topic: How to find a hidden miner on a PC (Read 171 times)

newbie
Activity: 10
Merit: 0
April 10, 2018, 07:37:25 AM
#2
This was a good read.  If I had merit, Id offer it.

Keep in mind, some backdoor mining can be beneficial to the community as a whole due to reducing ad fees for an organization.  I just wish they were more open about it when you visit it.  I know the Pirate Bay did a similar practice a while back.  As long as it doesn't kill my performance, and keeps the community I am visiting afloat from lack of ads, I am all for it.
newbie
Activity: 266
Merit: 0
April 10, 2018, 04:39:07 AM
#1
 If your computer is constantly slowing down and running at maximum capacity, it is an occasion to check it for viruses miners. Consider how to detect a hidden miner on your computer and delete it.

What it is and how dangerous
Hidden miner is a virus program that uses the performance of your PC for mining (extraction) of cryptocurrencies. Infection occurs through:                                                                           

1-malicious messages;
2-downloaded files;
3-spam-mailing.                                                                                               

The first mention of hidden mining appeared in 2011, but then it was isolated cases. At the beginning of 2018, this problem occupies a leading position in the news feeds.


 Trojan miner carries a great danger to the PC:
1 Reduces the life of the "iron".
The PC is running at maximum load for a long time, which negatively affects the maximum service life:

processor's;
video card;
RAM;
cooling system.

2 Limits performance.
During the use of the infected computer for its tasks, the user gets scanty performance, because the bulk of it goes to hidden mining.

3 Opens access to personal data.
Since miner is a Trojan, he gets access to the user's personal information. Recently, cases of theft of electronic wallets and passwords have become more frequent. The attacker not only uses the performance of your PC, but also steals sensitive data Note!
The latest Windows update has been protected from mining.                                                                                                                         

How to detect and remove

(Council! Scan the system with an antivirus, you may come across an ordinary miner, who does not hide his presence. In this case, it will be detected and automatically deleted by antivirus software.)

Usually detect Trojan user is quite difficult, because the developers of the virus software tried to hide his work as much as possible. New miners are able to mask their activities:

-Disconnect while the user is working with demanding applications.
-Masquerade as other applications in task Manager.
-Work only during" idle " PC.

Your computer may be infected, and you won't even notice it. It all depends on the ingenuity of hackers. We will try to tell as much as possible in detail how to detect malware.

(Importantly! Be careful when you delete a file, especially if you are unsure of its purpose. All actions you do at your own risk!)

Through the task Manager

A little touch on Internet mining. There are sites that use a special script to access the performance of your PC. The hacker, bypassing the protection of the Internet resource, downloads there its malicious code that mines cryptocurrencies at the time of your stay on the site.

To understand that you got to be very easy, because you visit it your computer will start to slow down and the task Manager will show a heavy load on the hardware. Simply leave the site to stop the mining process.

To detect malware on your system:

1-Go to the task Manager, hold down simultaneously "Ctrl + Shift + Esc".
2-Observe processes for 10 minutes of total inactivity (including mouse movements and keystrokes).

(Importantly! Some viruses close or block the task Manager in order to hide their activities.
If the dispatcher was closed independently or any program began to load the system-this means that the PC is infected with miner).

3-If the virus is not detected, go to The details tab.
4-Find a process that differs from the standard one (for example, incomprehensible characters) and write down the name.
5-In the Windows search, type "regedit" → go to the registry.
6-"Edit" → "Find".
7-Enter a name for the file → delete all matches.
8-Scan your system with antivirus (for example, a standard antivirus is used, which is located in start → Settings → Update & security → Windows Defender).
9-If threats are detected, confirm their removal.
10-Then restart the PC.

(Council! Check out the article" the Best antivirus for Windows 10", which will help you choose the antivirus).
Jump to: