Applicable for: Windows
Executables: These are typical malicious or Potentially Unwanted Application (PUA) executable files (.exe) placed on the computer and designed to mine cryptocurrencies.
Browser-based Cryptocurrency Miners: These JavaScript (or similar technology) miners perform their work in an Internet browser, consuming resources for as long as the browser remains open on the website. Some miners are used intentionally by the website owner in place of running ads (e.g. Coinhive), while others have been injected into legitimate website without the website owner's knowledge or consent.
Advanced Fileless Miners: Malware has emerged that performs its mining work in a computer's memory by mis-using legitimate tools like PowerShell. One example is MSH.Bluwimps, which carries out additional malicious acts in addition to mining.
Windows
Mac
Linux
Android
Internet of Things (IoT) devices
High CPU and GPU usage
Overheating
Crashes or frequent restarts
Slow response times
Unusual network activity (e.g. connections to mining-related websites or IP addresses).
Close the browser tab in which the detected URL is open. You should avoid visiting the detected website.
The detected potential Coinminer malware program or file should be removed from your computer. You should avoid using the program.
Open your Norton device security product.
If you see the My Norton window, next to Device Security, click Open.
In the Norton product main window, double-click Security, and then click LiveUpdate.
When Norton LiveUpdate is finished, click OK.
Run LiveUpdate until you see the message, "Your Norton product has the latest protection updates".
Exit all programs, and restart the computer.
Open your Norton device security product.
If you see the My Norton window, next to Device Security, click Open.
In the Norton product main window, double-click Security, and then click Scans.
In the Scans window, select Full Scan and click Go.
When the scan is finished, click Finish.
Exclusions reduce your level of protection and should be used only if you have a specific need.
To exclude the Intrusion Prevention detection blocking the given website, read how to Exclude or include attack signatures in monitoring.
To exclude the Antivirus detection blocking the given file or program, read how to Exclude security threats from scanning.
Was this article helpful?