Instead of min(d)ing their own business, are scammers using your computer as their virtual ATM? Three years ago, the FTC warned the public and took action against cryptojacking. That’s where scammers use your device’s processing power to “mine” cryptocurrency, which they can then convert into cold, hard cash.
Cryptojacking scams have continued to evolve, and they don’t even need you to install anything. Scammers can use malicious code embedded in a website or an ad to infect your device. Then they can help themselves to your device’s processor without you even knowing. You might make an unlucky visit to a website that uses cryptojacking code, click a link in a phishing email, or mistype a web address. Any of those could lead to cryptojacking. While the scammer cashes out, your device may slow down, burn through battery power, or crash.
So what can you do? Try the following:
- Follow tried-and-true advice for avoiding malware: use antivirus software, set software and apps to update automatically, never install software or apps you don’t trust, don’t click links without knowing where they lead, and be careful about visiting unfamiliar sites.
- Look for and close performance hogs: It can be hard to diagnose cryptojacking, but one common symptom is poor device performance. Consider closing sites or apps that slow your device or drain your battery.
- Consider playing defense: Some browser extensions and ad blockers say they help defend against cryptojacking, doing things like blocking mining code. These tools may be worth considering, but always do your homework first. Read reviews and check trusted sources before installing any online tools. Remember, too, that some websites may keep you from using their site if you have blocking software installed.
If you think cryptojacking has happened to you, the Federal Trade Commission wants to know. Report it to www.ftc.gov/complaint.
49 Comments
Read Our Privacy Act Statement
It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.
Comment Policy
This is a moderated blog; we review all comments before they are posted. We expect participants to treat each other and the bloggers with respect. We will not post comments that do not comply with our commenting policy. We may edit comments to remove links to commercial websites or personal information before posting them.
We won’t post:
Comments submitted to this blog become part of the public domain. To protect your privacy and the privacy of others, please do not include personal information. Also, do not use this blog to report fraud; instead, file a complaint.