Previous All Posts Next

Cryptojacking: Is Your Computer Mining Bitcoin?

Posted: May 4, 2017 to Cryptocurrency.

Tags: Blockchain, Ransomware, Cryptocurrency, Bitcoin, Data Breach

Have you ever looked at America’s debt clock? Take a seat before you do, because it’s the type of horror that you can’t put into words. The basic idea behind governments issuing money is that a government has assets worth a certain amount. They print and issue money that represents the same value of a piece of those assets. At least that’s how it used to be, because now governments are spending themselves silly and currency doesn’t mean what it used to because of massive debts and digital assets like stocks or bonds. So how does a company like Bitcoin issue currency since it’s not a government? Keep reading to find out how and how cybercriminals are taking advantage of the system using everyday people’s computers. Blockchain is the foundation of the Bitcoin system. Basically, every transaction that takes place on bitcoin is recorded as a block, which is then added to a chain of blocks. But the piece of the Blockchain puzzle that makes the whole thing fit together are the hash numbers. Each block gets a hash number that is unique and based off the previous block in the chain, but figuring out those hash numbers isn’t as simple as 1,2,3. In fact, it’s so difficult that Bitcoin issues its currency as a reward to the people who figure out the numbers, aka Bitcoin Miners. For the block to fit into the chain, the hash number must have the right amount of zeros and the calculations needed to produce a hash have a very low probability of producing zeros. That means it takes several attempts before a proper hash is produced. After their block has been verified to fit into the chain, the bitcoin miner is given bitcoins that equal real world currency. That’s the basic idea, but of course people have created ways to tip the system in their favor. There are computer programs that can run the calculations much faster than a person ever can, which means more money for miners. And that’s where hackers come in. Just like a ransomware attack, hackers will lock a user out of their computer. But instead of encrypting their data, the hackers will simply keep the computer locked by password for as long as they can and use it to run the calculations that earn them bitcoins. So while you’re unable to use your computer to do your job, people down the street or on the other side of the world will be using it to earn a living. So what can you do to prevent your computer from being turned into a bitcoin mining machine? Of course common sense measures like not clicking on attachments from strangers are strong passwords always apply. But another step you can take to prevent this particular type of attack is by changing the ports your computer connects to the Internet with. Hackers can scan for devices using the most common ports used by devices. If you change the ports your device uses, not only will hackers have a harder time finding your device but if they do they will have an incentive to go after another device that connected to common ports because it will show that you take your cybersecurity seriously. That’s the value of taking the time to read up on cybersecurity. With one simple change you can separate yourself from the uninformed and make yourself a much less attractive target to hackers. Now you get to choose. Will you stay posted for all the latest cybersecurity trends and happenings? Or let yourself become a part of the helpless crowd of people who have no idea how to defend themselves?

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Blockchain Security & Crypto Forensics

Crypto tracing, blockchain analysis, and digital asset forensics for investigations and legal proceedings.

Explore Forensics Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now