{"id":10031,"date":"2017-12-20T09:00:39","date_gmt":"2017-12-20T14:00:39","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=10031"},"modified":"2020-10-13T16:01:35","modified_gmt":"2020-10-13T12:01:35","slug":"web-miners-protection","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/web-miners-protection\/10031\/","title":{"rendered":"How Kaspersky Lab products protect against miners"},"content":{"rendered":"<p>Cryptocurrencies, ICOs, and the mysterious blockchain are all the rage at the moment. But if you think all this \u201ccrypto\u201d isn\u2019t your business, we have bad news: You are <i><em>its<\/em><\/i> business, big time. In fact, this year has seen the value of many cryptocurrencies skyrocket. And whereas before, cybercrooks were merely interested in them, now they are obsessed.<\/p>\n<h2>What\u2019s a miner?<\/h2>\n<p>Even if you\u2019ve never had a cryptowallet and have no idea why you\u2019d need one, you\u2019re still on cybercriminals\u2019 radar: You have a computer on which cryptocurrencies can be mined \u2014 digitally produced with the help of special mining software.<\/p>\n<p>Actually, the word \u201cminer\u201d refers both to the people who mine cryptocurrencies and to the programs used to do it (see <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/18020\/\" rel=\"noopener noreferrer nofollow\">this post<\/a> for the lowdown on mining). You can install such software yourself \u2014 and use it for your own benefit.<\/p>\n<p>But there might be a miner on your device without your knowledge \u2014 it could\u2019ve been installed by an attacker who somehow gained access to your computer or smartphone. If so, it will mine cryptocurrency on your device for their profit and at your expense. This is known as <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/hidden-miners-botnet-threat\/18707\/\" rel=\"noopener noreferrer nofollow\">hidden mining<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"D9p0PhsScG\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/17768\/\" target=\"_blank\" rel=\"noopener nofollow\">Explainer: Bitcoin mining<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cExplainer: Bitcoin mining\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/17768\/embed\/#?secret=VSWPZmGvaj#?secret=D9p0PhsScG\" data-secret=\"D9p0PhsScG\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Why do AVs detect miners?<\/h3>\n<p>\u201cSo what,\u201d you might say. \u201cIt\u2019s no skin off my nose. It\u2019s not stealing anything. Let it do its thing.\u201d But mining for someone else is no good for you or your computer. Here\u2019s why:<\/p>\n<ul>\n<li>Mining is a very resource-intensive process. It essentially overloads the processor and video card, slowing down the machine, so you might experience lags and freezes while trying to use it for everyday tasks.<\/li>\n<li>The load on the processor and video card not only impacts performance, but also greatly increases power consumption. With a miner working, a computer consumes about five times as much as it would just being used by the average office worker. The electricity bill won\u2019t make for pleasant reading.<\/li>\n<li>The excessive load won\u2019t help the circuitry either \u2014 it could put the device permanently out of action.<\/li>\n<\/ul>\n<p>Hidden miners basically feed off your computer, like a parasite. So, you\u2019ll thank your AV for blocking miners and protecting your motherboard, your electricity costs, and your sanity.<\/p>\n<p>On the flip side, you could install your own miner and mine cryptocurrency for yourself. Your antivirus can\u2019t always determine who or what installed a miner. If, for example, Kaspersky Internet Security or another Kaspersky Lab product is sure that it wasn\u2019t you who did it, it detects the miner as a Trojan and prevents it from running. And if it\u2019s not sure, it still detects the miner, but as <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/\" rel=\"noopener noreferrer nofollow\">not-a-virus<\/a> \u2014 that is, it draws your attention to the miner\u2019s presence in the system but doesn\u2019t classify it as full-blooded malware.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"eKstojRv65\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/\" target=\"_blank\" rel=\"noopener nofollow\">Not-a-Virus: What is it?<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cNot-a-Virus: What is it?\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/embed\/#?secret=GPTlsd4uLF#?secret=eKstojRv65\" data-secret=\"eKstojRv65\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>If you knowingly installed a miner and don\u2019t need AV notifications about it, you can disable them. To do so, in Kaspersky Internet Security\u2019s settings, select <i><em>Additional<\/em><\/i> followed by <i>Threats and Exclusions<\/i>, and clear the <i>Detect other software<\/i> check box. The AV will stop looking for nonmalicious miners in the system. Incidentally, the check box is cleared by default.<\/p>\n<h3>What is a Web miner, and how does it differ from an ordinary miner?<\/h3>\n<p>As if miners weren\u2019t enough, you should also know about Web miners. A Web miner is essentially a script hosted on a website. When a user visits the site, the script runs in the browser and starts mining cryptocurrency.<\/p>\n<p>Such scripts can be embedded either by the site\u2019s webmaster (to monetize the site), or by an attacker who has gained administrative access to the site. In both cases, whoever installed the Web miner gets the money; those who created the miner earn a fee.<\/p>\n<p>The principal difference between Web miners and ordinary miners is that Web miners do not require the installation of any additional programs on the computer; everything happens directly in the browser window. From an AV\u2019s perspective, it might look like a normal browser tab simply consuming a lot of resources.<\/p>\n<p>But the computer slows down and the fan whirs \u2014 and the next electricity bill is a shock. Web miners also work on smartphones and tablets, and that\u2019s where they are a real threat: The increased load might cause the device to overheat and irreversibly damage some of its components.<\/p>\n<p>Kaspersky Lab experts predict that <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/from-ransomware-to-webminers\/20135\/\" rel=\"noopener noreferrer nofollow\">Web miners could be 2018\u2019s most common threat<\/a>. In 2017 our security solutions stopped the launch of Web miners on more than 70 million occasions, and the use of such scripts is only set to rise. The most common Web miner, and the one used in the vast majority of cases, is CoinHive.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Mqrl5MQk20\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/from-ransomware-to-webminers\/20135\/\" target=\"_blank\" rel=\"noopener nofollow\">From ransomware to Web miners<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cFrom ransomware to Web miners\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/from-ransomware-to-webminers\/20135\/embed\/#?secret=DIWpOSJP0L#?secret=Mqrl5MQk20\" data-secret=\"Mqrl5MQk20\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How do Kaspersky Lab products protect you from Web miners?<\/h3>\n<p>To detect a Web miner, the security solution on the computer must know what\u2019s going on in the browser. This feature was only partially implemented in Kaspersky Internet Security 2017, but in Kaspersky Internet Security 2018 and our other next-generation products, including the latest version of Kaspersky Free, it works in all cases.<\/p>\n<p>So if you have any of our latest security solutions installed, rest assured that the AV will find and stop all Web miners.<\/p>\n<p>And although in some cases ordinary miners can be installed by users on purpose, Web miners are most certainly intrusive and need to be blocked. Therefore, <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a> identifies Web miners as malware and blocks them in all cases, regardless of whether the <i><em>Detect other software<\/em><\/i> check box is selected.<\/p>\n<p>In 2018, Web miners are set to become more widespread. Therefore, we recommend that you:<\/p>\n<ul>\n<li>Install a reliable security solution. <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a> protects against both Web miners and ordinary miners, and against Trojans looking to download miners onto your computer as well.<\/li>\n<li>If you already use security solutions from Kaspersky Lab, update them to the latest version. It\u2019s free, and you\u2019ll be even better protected.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n","protected":false},"excerpt":{"rendered":"<p>What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist<\/p>\n","protected":false},"author":675,"featured_media":10032,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[2088,374,1605,1505,1429,192,521,1606],"class_list":{"0":"post-10031","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-tips","9":"tag-bitcoin","10":"tag-coinhive","11":"tag-cryptocurrencies","12":"tag-miners","13":"tag-protection","14":"tag-threats","15":"tag-web-miners"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/web-miners-protection\/10031\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/web-miners-protection\/12051\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/web-miners-protection\/14291\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/web-miners-protection\/12511\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/web-miners-protection\/12239\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/web-miners-protection\/15038\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/web-miners-protection\/14859\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/web-miners-protection\/19390\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/web-miners-protection\/4578\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/web-miners-protection\/20556\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/web-miners-protection\/8705\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/web-miners-protection\/15564\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/web-miners-protection\/9078\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/web-miners-protection\/19262\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/web-miners-protection\/19243\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10031"}],"version-history":[{"count":9,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10031\/revisions"}],"predecessor-version":[{"id":17469,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10031\/revisions\/17469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10032"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}