Protection against the Coinminer malware
What is CoinMiner malware?
However, malware authors have created threats and viruses which use commonly-available mining software to take advantage of someone else's computing resources (CPU, GPU, RAM, network bandwidth, and power), without their knowledge or consent (i.e. cryptojacking).
What are the types of coin miners?
-
Executables: These are typical malicious or Potentially Unwanted Application (PUA) executable files (.exe) placed on the computer and designed to mine cryptocurrencies.
-
Browser-based Cryptocurrency Miners: These JavaScript (or similar technology) miners perform their work in an Internet browser, consuming resources for as long as the browser remains open on the website. Some miners are used intentionally by the website owner in place of running ads (e.g. Coinhive), while others have been injected into legitimate website without the website owner's knowledge or consent.
-
Advanced Fileless Miners: Malware has emerged that performs its mining work in a computer's memory by mis-using legitimate tools like PowerShell. One example is MSH.Bluwimps, which carries out additional malicious acts in addition to mining.
How do I know if my device is being used for coin mining?
-
Windows
-
Mac
-
Linux
-
Android
-
Internet of Things (IoT) devices
Indications that a computer is mining include:
-
High CPU and GPU usage
-
Overheating
-
Crashes or frequent restarts
-
Slow response times
-
Unusual network activity (e.g. connections to mining-related websites or IP addresses).
Am I protected against this malware?
-
Close the browser tab in which the detected URL is open. You should avoid visiting the detected website.
-
The detected potential Coinminer malware program or file should be removed from your computer. You should avoid using the program.
Run LiveUpdate
-
Open your Norton device security product.
If you see the My Norton window, next to Device Security, click Open.
-
In the Norton product main window, double-click Security, and then click LiveUpdate.
-
When Norton LiveUpdate is finished, click OK.
-
Run LiveUpdate until you see the message, "Your Norton product has the latest protection updates".
-
Exit all programs, and restart the computer.
Run Full Scan
-
Open your Norton device security product.
If you see the My Norton window, next to Device Security, click Open.
-
In the Norton product main window, double-click Security, and then click Scans.
-
In the Scans window, select Full Scan and click Go.
-
When the scan is finished, click Finish.
How can I exclude this website or program?
Exclusions reduce your level of protection and should be used only if you have a specific need.
-
To exclude the Intrusion Prevention detection blocking the given website, read how to Exclude or include attack signatures in monitoring.
-
To exclude the Antivirus detection blocking the given file or program, read how to Exclude security threats from scanning.
How can I whitelist this website or program?
Járuljon hozzá a megoldás fejlesztéséhez.
Köszönjük, hogy segít a vásárlói élmény fejlesztésében.
Most mit szeretne tenni?
Keresse meg a megoldásokat vagy a Kapcsolatfelvétel lehetőséget.
Operációs rendszer: Windows
Utolsó módosítás: 05/09/2024