Instead of min(d)ing their own business, are scammers using your computer as their virtual ATM? Three years ago, the FTC warned the public and took action against cryptojacking. That’s where scammers use your device’s processing power to “mine” cryptocurrency, which they can then convert into cold, hard cash.
Cryptojacking scams have continued to evolve, and they don’t even need you to install anything. Scammers can use malicious code embedded in a website or an ad to infect your device. Then they can help themselves to your device’s processor without you even knowing. You might make an unlucky visit to a website that uses cryptojacking code, click a link in a phishing email, or mistype a web address. Any of those could lead to cryptojacking. While the scammer cashes out, your device may slow down, burn through battery power, or crash.
So what can you do? Try the following:
- Follow tried-and-true advice for avoiding malware: use antivirus software, set software and apps to update automatically, never install software or apps you don’t trust, don’t click links without knowing where they lead, and be careful about visiting unfamiliar sites.
- Look for and close performance hogs: It can be hard to diagnose cryptojacking, but one common symptom is poor device performance. Consider closing sites or apps that slow your device or drain your battery.
- Consider playing defense: Some browser extensions and ad blockers say they help defend against cryptojacking, doing things like blocking mining code. These tools may be worth considering, but always do your homework first. Read reviews and check trusted sources before installing any online tools. Remember, too, that some websites may keep you from using their site if you have blocking software installed.
If you think cryptojacking has happened to you, the Federal Trade Commission wants to know. Report it to www.ftc.gov/complaint.
The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.
We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.