{"id":120094,"date":"2021-04-15T09:00:18","date_gmt":"2021-04-15T16:00:18","guid":{"rendered":"\/blogs\/?p=120094"},"modified":"2025-05-20T19:32:48","modified_gmt":"2025-05-21T02:32:48","slug":"why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/","title":{"rendered":"Why Coin Miners Go Bad &#038; How to Protect Your Tech When They Do"},"content":{"rendered":"<p><span data-contrast=\"auto\">Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and\u00a0<\/span><span data-contrast=\"auto\">Monero<\/span><span data-contrast=\"auto\">\u00a0to cash in on the\u00a0<\/span><span data-contrast=\"auto\">recent\u00a0<\/span><span data-contrast=\"auto\">gold rush.\u00a0<\/span><span data-contrast=\"auto\">Bitcoin\u2019s meteoric rise in value<\/span><span data-contrast=\"auto\">\u00a0is making\u00a0<\/span><span data-contrast=\"auto\">coin mining<\/span><span data-contrast=\"auto\">\u00a0an appealing hobby or<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">even\u00a0<\/span><span data-contrast=\"auto\">a whole\u00a0<\/span><span data-contrast=\"auto\">new career<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Coin min<\/span><span data-contrast=\"auto\">ing software is<\/span><span data-contrast=\"auto\">\u00a0the main<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">tool in a\u00a0<\/span><span data-contrast=\"auto\">prospector\u2019s belt<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Some coin\u00a0<\/span><span data-contrast=\"auto\">miners<\/span><span data-contrast=\"auto\">, also known as cryptocurrency miners,<\/span><span data-contrast=\"auto\">\u00a0are tempted by the dark side of the industry and resort to nefarious means to harness the immense computing power\u00a0<\/span><span data-contrast=\"auto\">needed for\u00a0<\/span><span data-contrast=\"auto\">cryptocurrency\u00a0<\/span><span data-contrast=\"auto\">profits.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Greedy cryptocurrency criminals employ<\/span><span data-contrast=\"auto\">\u00a0a practice called<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">cryptojacking<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">steal<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0the computer power of unsuspecting devices to help them mine faster. Y<\/span><span data-contrast=\"auto\">our device could be at risk at being recruited to their efforts.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Let\u2019s dig into<\/span><span data-contrast=\"auto\">\u00a0how coin mining programs work, wh<\/span><span data-contrast=\"auto\">y<\/span><span data-contrast=\"auto\">\u00a0they turn malicious<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0and how you can\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/bitcoin-mining-security-risks\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">stay safe from\u00a0<\/span><span data-contrast=\"none\">cryptojackers<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">How Coin Mining Works<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Mining cryptocurrency<\/span><span data-contrast=\"auto\">\u00a0takes a lot of time and computer processing power.\u00a0<\/span><span data-contrast=\"auto\">A<\/span><span data-contrast=\"auto\">\u00a0coin mining home setup<\/span><span data-contrast=\"auto\">\u00a0requires<\/span><span data-contrast=\"auto\">\u00a0a graphics processing unit (GPU) or an application-specific integrated\u00a0<\/span><span data-contrast=\"auto\">circuit (ASIC).<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Coin mining\u00a0<\/span><span data-contrast=\"auto\">software\u00a0<\/span><span data-contrast=\"auto\">then run<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0off the GPU or ASIC.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Each central processing unit<\/span><span data-contrast=\"auto\">\u00a0(CPU), or the brain of the computer<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0plus the GPU or ASIC<\/span><span data-contrast=\"auto\">\u00a0is referred to as a mining rig.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Once the software is installed,\u00a0<\/span><span data-contrast=\"auto\">t<\/span><span data-contrast=\"auto\">he\u00a0<\/span><span data-contrast=\"auto\">rig<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">is ready to mine<\/span><span data-contrast=\"auto\">, running\u00a0<\/span><span data-contrast=\"auto\">mathematical calculations to verify and col<\/span><span data-contrast=\"auto\">lect new\u00a0<\/span><span data-contrast=\"auto\">cryptocurrency\u00a0<\/span><span data-contrast=\"auto\">transactions. Each calculation is known as a hash, and hash rates are the number of calculations that can be run per\u00a0<\/span><span data-contrast=\"auto\">second.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">From there, casual miners\u00a0<\/span><span data-contrast=\"auto\">may<\/span><span data-contrast=\"auto\">\u00a0choose to join a mining pool, which is a club of miners who agree to consolidate their\u00a0<\/span><span data-contrast=\"auto\">computing<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">power and split the profits based on how much work each miner contributed to the output.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Bitcoin rewards miners every\u00a0<\/span><span data-contrast=\"auto\">10<\/span><span data-contrast=\"auto\">\u00a0minutes f<\/span><span data-contrast=\"auto\">or their efforts<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Each time miners solve a string of mathematical puzzles, they\u00a0<\/span><span data-contrast=\"auto\">validate a<\/span><span data-contrast=\"auto\">\u00a0chain of transactions<\/span><span data-contrast=\"auto\">, thus helping make the entire Bitcoin system more secure<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">M<\/span><span data-contrast=\"auto\">iners are paid in bitcoin and they also receive a transactional fee.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Wh<\/span><\/b><b><span data-contrast=\"auto\">y<\/span><\/b><b><span data-contrast=\"auto\">\u00a0Coin Mining Turns Malicious<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">While coin<\/span><span data-contrast=\"auto\">\u00a0min<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0typically starts off as a casual hobby, coin mining<\/span><span data-contrast=\"auto\">\u00a0programs<\/span><span data-contrast=\"auto\">\u00a0can<\/span><span data-contrast=\"auto\">\u00a0turn malicious when\u00a0<\/span><span data-contrast=\"auto\">cryptocurrency<\/span><span data-contrast=\"auto\">\u00a0miners want to earn more without investing in boosting their own computing power. Instead, they<\/span><span data-contrast=\"auto\">\u00a0reroute\u00a0<\/span><span data-contrast=\"auto\">their\u00a0<\/span><span data-contrast=\"auto\">targets<\/span><span data-contrast=\"auto\">\u2019<\/span><span data-contrast=\"auto\">\u00a0computing power without asking.<\/span><span data-contrast=\"auto\">\u00a0This is called\u00a0<\/span><span data-contrast=\"auto\">cryptojacking<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mining requires incredible amounts of electricity and the more\u00a0<\/span><span data-contrast=\"auto\">rig<\/span><span data-contrast=\"auto\">s\u00a0<\/span><span data-contrast=\"auto\">involved;<\/span><span data-contrast=\"auto\">\u00a0the more cryptocurrency can be mined. Usually, the utility bills and the cost of running coin mining software negates any profit.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">For example, a casual miner may have o<\/span><span data-contrast=\"auto\">ne\u00a0<\/span><span data-contrast=\"auto\">rig<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">devoted to mining.\u00a0<\/span><span data-contrast=\"auto\">A<\/span><span data-contrast=\"auto\">n average\u00a0<\/span><span data-contrast=\"auto\">rig<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">processes<\/span><span data-contrast=\"auto\">\u00a0approximately 500 hashes per second on the\u00a0<\/span><a href=\"https:\/\/www.csoonline.com\/article\/3253572\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Monero<\/span><span data-contrast=\"none\">\u00a0network<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">(a type of cryptocurrency<\/span><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0However, 500<\/span><span data-contrast=\"auto\">\u00a0hashes per second\u00a0<\/span><span data-contrast=\"auto\">translates to<\/span><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/cryptojacking-the-unseen-threat\/a\/d-id\/1338903\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">less than a dollar<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">per week\u00a0<\/span><span data-contrast=\"auto\">in traditional, or fiat, currency.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Greedy\u00a0<\/span><span data-contrast=\"auto\">cryptocurrency<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">criminals<\/span><span data-contrast=\"auto\">\u00a0recruit CPU soldiers to their mining army<\/span><span data-contrast=\"auto\">\u00a0to improve their hash rate<\/span><span data-contrast=\"auto\">. To do so,\u00a0<\/span><span data-contrast=\"auto\">criminals<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">download coin mining software to a device and then program it to report back\u00a0<\/span><span data-contrast=\"auto\">to their server. The device\u2019s thinking power is\u00a0<\/span><span data-contrast=\"auto\">diverted<\/span><span data-contrast=\"auto\">\u00a0from\u00a0<\/span><span data-contrast=\"auto\">the owner and funneled straight<\/span><span data-contrast=\"auto\">\u00a0to the\u00a0<\/span><span data-contrast=\"auto\">criminal\u2019s\u00a0<\/span><span data-contrast=\"auto\">server that now controls it.\u00a0<\/span><span data-contrast=\"auto\">Compromised<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">device<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0run considerably slower and\u00a0<\/span><span data-contrast=\"auto\">can\u00a0<\/span><span data-contrast=\"auto\">overheat<\/span><span data-contrast=\"auto\">, and<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><span data-contrast=\"auto\">strain on\u00a0<\/span><span data-contrast=\"auto\">the<\/span><span data-contrast=\"auto\">\u00a0device\u00a0<\/span><span data-contrast=\"auto\">can\u00a0<\/span><span data-contrast=\"auto\">eventually destroy it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">How to Stay Safe from\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Cryptojacking<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">C<\/span><span data-contrast=\"auto\">ryptojackers<\/span><span data-contrast=\"auto\">\u00a0are<\/span><span data-contrast=\"auto\">\u00a0not your everyday<\/span><span data-contrast=\"auto\">\u00a0thieves<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">T<\/span><span data-contrast=\"auto\">heir target is your CPU power<\/span><span data-contrast=\"auto\">, and they employ\u00a0<\/span><span data-contrast=\"auto\">devious<\/span><span data-contrast=\"auto\">\u00a0methods to funnel it for their own use. Luckily, there are a few easy ways\u00a0<\/span><span data-contrast=\"auto\">to<\/span><span data-contrast=\"auto\">\u00a0thwart their efforts:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">1.\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Beware of p<\/span><\/b><b><span data-contrast=\"auto\">hishing<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Personal devices are often infected through phishing<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">within emails<\/span><span data-contrast=\"auto\">\u00a0and texts<\/span><span data-contrast=\"auto\">. There are\u00a0<\/span><span data-contrast=\"auto\">many\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/phishing-email-examples-how-to-recognize-a-phishing-email\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">tell-tale signs of a phishing\u00a0<\/span><span data-contrast=\"none\">message<\/span><\/a><span data-contrast=\"auto\">. For example, they are often poorly written and\u00a0<\/span><span data-contrast=\"auto\">use language that indicates\u00a0<\/span><span data-contrast=\"auto\">that the sender\u00a0<\/span><span data-contrast=\"auto\">want<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0a hasty\u00a0<\/span><span data-contrast=\"auto\">response<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0Also, phishing attempts often charade as official organizations, like banks and credit card companies.<\/span><span data-contrast=\"auto\">\u00a0If you are ever suspicious of a<\/span><span data-contrast=\"auto\">n email or text,<\/span><span data-contrast=\"auto\">\u00a0do not open any of the links and do not reply. Instead,\u00a0<\/span><span data-contrast=\"auto\">contact the organization\u2019s\u00a0<\/span><span data-contrast=\"auto\">customer\u00a0<\/span><span data-contrast=\"auto\">support\u00a0<\/span><span data-contrast=\"auto\">to verify<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><span data-contrast=\"auto\">legitimacy of the\u00a0<\/span><span data-contrast=\"auto\">message<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">2.\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Use a<\/span><\/b><b><span data-contrast=\"auto\">d blockers<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Another way\u00a0<\/span><span data-contrast=\"auto\">miners<\/span><span data-contrast=\"auto\">\u00a0gain access to personal devices is\u00a0<\/span><span data-contrast=\"auto\">by\u00a0<\/span><span data-contrast=\"auto\">camouflag<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0malicious code in pop-up ads.<\/span><span data-contrast=\"auto\">\u00a0An easy way to\u00a0<\/span><span data-contrast=\"auto\">avoid being\u00a0<\/span><span data-contrast=\"auto\">cryp<\/span><span data-contrast=\"auto\">t<\/span><span data-contrast=\"auto\">ojacked<\/span><span data-contrast=\"auto\">\u00a0is to simply never click on\u00a0<\/span><span data-contrast=\"auto\">these ads<\/span><span data-contrast=\"auto\">. Or even better, install an ad blocker<\/span><span data-contrast=\"auto\">\u00a0to\u00a0<\/span><span data-contrast=\"auto\">help\u00a0<\/span><span data-contrast=\"auto\">eliminate the risk<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">3. <\/span><\/b><b><span data-contrast=\"auto\">Connect to a\u00a0<\/span><\/b><b><span data-contrast=\"auto\">VPN<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Public wi-fi\u00a0<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">\u00a0poorly protected\u00a0<\/span><span data-contrast=\"auto\">networks\u00a0<\/span><span data-contrast=\"auto\">present a\u00a0<\/span><span data-contrast=\"auto\">vulnerable entry point<\/span><span data-contrast=\"auto\">\u00a0for<\/span><span data-contrast=\"auto\">\u00a0cybercriminals<\/span><span data-contrast=\"auto\">\u00a0to hack into your device<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Cybercriminals often attempt to\u00a0<\/span><span data-contrast=\"auto\">download software remotely to your laptop, desktop<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">or mobile<\/span><span data-contrast=\"auto\">\u00a0device<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">to<\/span><span data-contrast=\"auto\">\u00a0reroute\u00a0<\/span><span data-contrast=\"auto\">its<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">computing\u00a0<\/span><span data-contrast=\"auto\">power\u00a0<\/span><span data-contrast=\"auto\">for\u00a0<\/span><span data-contrast=\"auto\">their own selfish gains.\u00a0<\/span><span data-contrast=\"auto\">Always connect to a VPN like\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/vpn\/mcafee-safe-connect.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee Safe Connect VPN<\/span><\/a><span data-contrast=\"auto\">\u00a0to\u00a0<\/span><span data-contrast=\"auto\">safely\u00a0<\/span><span data-contrast=\"auto\">surf\u00a0<\/span><span data-contrast=\"auto\">unsecure networks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">4. <\/span><\/b><b><span data-contrast=\"auto\">Run a<\/span><\/b><b><span data-contrast=\"auto\">ntivirus software<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">C<\/span><span data-contrast=\"auto\">ryptojacking<\/span><span data-contrast=\"auto\">\u00a0code is inconspicuous<\/span><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><span data-contrast=\"auto\">generally\u00a0<\/span><span data-contrast=\"auto\">hidden in<\/span><span data-contrast=\"auto\">\u00a0legitimate code<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Antivirus software<\/span><span data-contrast=\"auto\">, such as\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee Total Protection<\/span><\/a><span data-contrast=\"none\">,<\/span><span data-contrast=\"auto\">\u00a0is a recommended way to proactively\u00a0<\/span><span data-contrast=\"auto\">scan for malware and even identify fraudulent websites.<\/span><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/safe-browser\/mcafee-webadvisor.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee\u00a0<\/span><span data-contrast=\"none\">WebAdvisor<\/span><\/a><span data-contrast=\"auto\">\u00a0has a Chrome extension that<\/span><span data-contrast=\"auto\">\u00a0specifically<\/span><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/service.mcafee.com\/webcenter\/portal\/oracle\/webcenter\/page\/scopedMD\/s55728c97_466d_4ddb_952d_05484ea932c6\/Page29.jspx?wc.contextURL=%2Fspaces%2Fcp&amp;locale=en-US&amp;articleId=TS102875&amp;fromSearch=true&amp;platform=&amp;_afrLoop=1220682685123410&amp;leftWidth=0%25&amp;showFooter=false&amp;showHeader=false&amp;rightWidth=0%25&amp;centerWidth=100%25#!%40%40%3Fplatform%3D%26showFooter%3Dfalse%26locale%3Den-US%26fromSearch%3Dtrue%26_afrLoop%3D1220682685123410%26articleId%3DTS102875%26leftWidth%3D0%2525%26showHeader%3Dfalse%26wc.contextURL%3D%252Fspaces%252Fcp%26rightWidth%3D0%2525%26centerWidth%3D100%2525%26_adf.ctrl-state%3D10vjl1dfzw_120\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">blocks\u00a0<\/span><span data-contrast=\"none\">cryptojackers<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">5. Monitor your devices<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">B<\/span><span data-contrast=\"auto\">e aware of the signs your devices have been\u00a0<\/span><span data-contrast=\"auto\">cryptojacked<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">For example, monitor\u00a0<\/span><span data-contrast=\"auto\">any changes in the speed of your devices<\/span><span data-contrast=\"auto\">\u00a0and<\/span><span data-contrast=\"auto\">\u00a0check out your utility bills for dramatic spikes.\u00a0<\/span><span data-contrast=\"auto\">By r<\/span><span data-contrast=\"auto\">emain<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0vigilant<\/span><span data-contrast=\"auto\">\u00a0with these tips, you will<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">keep your devices safe from cryptocurrency miners gone\u00a0<\/span><span data-contrast=\"auto\">rogue<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Stay Updated<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">To stay updated on all things\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee<\/span><\/a><span data-contrast=\"auto\">\u00a0and on top of the latest consumer and mobile security threats, follow\u00a0<\/span><a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">@McAfee_Home<\/span><\/a><span data-contrast=\"auto\">\u00a0on Twitter, subscribe to our\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/landing-page\/direct\/dr\/social\/generic\/newsletter.html?csrc=social&amp;csrcl2=blog&amp;cctype=newsletter_signup&amp;ccstype=&amp;ccoe=direct&amp;ccoel2=dr&amp;pkg_id=521&amp;affid=0\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">email<\/span><\/a><span data-contrast=\"auto\">, listen to our podcast\u00a0<\/span><a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Hackable?<\/span><\/a><span data-contrast=\"auto\">, and \u2018Like\u2019 us on\u00a0<\/span><a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Facebook<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and\u00a0Monero\u00a0to cash in on the\u00a0recent\u00a0gold rush.\u00a0Bitcoin\u2019s meteoric rise in value\u00a0is&#8230;<\/p>\n","protected":false},"author":1228,"featured_media":120109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661],"tags":[5219,7768,5220,5658],"coauthors":[7231],"class_list":["post-120094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","tag-bitcoin","tag-coin-mining","tag-cryptocurrency","tag-cryptojacking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Coin Miners Go Bad &amp; How to Protect Your Tech When They Do | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and\u00a0Monero\u00a0to cash in on the\u00a0recent\u00a0gold rush.\u00a0Bitcoin\u2019s meteoric rise in value\u00a0is\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Coin Miners Go Bad &amp; How to Protect Your Tech When They Do | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and\u00a0Monero\u00a0to cash in on the\u00a0recent\u00a0gold rush.\u00a0Bitcoin\u2019s meteoric rise in value\u00a0is\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-15T16:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-21T02:32:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vishnu Varadaraj\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vishnu Varadaraj\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/\"},\"author\":{\"name\":\"Vishnu Varadaraj\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a\"},\"headline\":\"Why Coin Miners Go Bad &#038; How to Protect Your Tech When They Do\",\"datePublished\":\"2021-04-15T16:00:18+00:00\",\"dateModified\":\"2025-05-21T02:32:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/\"},\"wordCount\":943,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png\",\"keywords\":[\"Bitcoin\",\"coin mining\",\"cryptocurrency\",\"cryptojacking\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/\",\"name\":\"Why Coin Miners Go Bad & How to Protect Your Tech When They Do | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png\",\"datePublished\":\"2021-04-15T16:00:18+00:00\",\"dateModified\":\"2025-05-21T02:32:48+00:00\",\"description\":\"Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and\u00a0Monero\u00a0to cash in on the\u00a0recent\u00a0gold rush.\u00a0Bitcoin\u2019s meteoric rise in value\u00a0is\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png\",\"width\":1250,\"height\":675,\"caption\":\"man on laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Coin Miners Go Bad &#038; How to Protect Your Tech When They Do\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a\",\"name\":\"Vishnu Varadaraj\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4218d9114a5a31272a04c8be649b0a2b\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg\",\"caption\":\"Vishnu Varadaraj\"},\"description\":\"Vishnu Varadaraj leads product development in the areas of mobile &amp; desktop security services, identity platform and mobile threat research. Vishnu brings more than two decades of experience in building products for consumer markets with a focus on innovation &amp; customer experience. Outside of work Vishnu enjoys swimming, snowboarding, kayaking, etc. depending on the weather.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/vishnuvaradaraj\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/vishnu-varadaraj\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Coin Miners Go Bad & How to Protect Your Tech When They Do | McAfee Blog","description":"Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and\u00a0Monero\u00a0to cash in on the\u00a0recent\u00a0gold rush.\u00a0Bitcoin\u2019s meteoric rise in value\u00a0is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Why Coin Miners Go Bad & How to Protect Your Tech When They Do | McAfee Blog","og_description":"Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and\u00a0Monero\u00a0to cash in on the\u00a0recent\u00a0gold rush.\u00a0Bitcoin\u2019s meteoric rise in value\u00a0is","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-04-15T16:00:18+00:00","article_modified_time":"2025-05-21T02:32:48+00:00","og_image":[{"width":1250,"height":675,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png","type":"image\/png"}],"author":"Vishnu Varadaraj","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Vishnu Varadaraj","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/"},"author":{"name":"Vishnu Varadaraj","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a"},"headline":"Why Coin Miners Go Bad &#038; How to Protect Your Tech When They Do","datePublished":"2021-04-15T16:00:18+00:00","dateModified":"2025-05-21T02:32:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/"},"wordCount":943,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png","keywords":["Bitcoin","coin mining","cryptocurrency","cryptojacking"],"articleSection":["How To Guides and Tutorials","Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/","name":"Why Coin Miners Go Bad & How to Protect Your Tech When They Do | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png","datePublished":"2021-04-15T16:00:18+00:00","dateModified":"2025-05-21T02:32:48+00:00","description":"Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and\u00a0Monero\u00a0to cash in on the\u00a0recent\u00a0gold rush.\u00a0Bitcoin\u2019s meteoric rise in value\u00a0is","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250X675.png","width":1250,"height":675,"caption":"man on laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/why-coin-miners-go-bad-how-to-protect-your-tech-when-they-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Why Coin Miners Go Bad &#038; How to Protect Your Tech When They Do"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a","name":"Vishnu Varadaraj","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4218d9114a5a31272a04c8be649b0a2b","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg","caption":"Vishnu Varadaraj"},"description":"Vishnu Varadaraj leads product development in the areas of mobile &amp; desktop security services, identity platform and mobile threat research. Vishnu brings more than two decades of experience in building products for consumer markets with a focus on innovation &amp; customer experience. Outside of work Vishnu enjoys swimming, snowboarding, kayaking, etc. depending on the weather.","sameAs":["https:\/\/www.linkedin.com\/in\/vishnuvaradaraj\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/vishnu-varadaraj\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/120094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1228"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=120094"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/120094\/revisions"}],"predecessor-version":[{"id":213978,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/120094\/revisions\/213978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/120109"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=120094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=120094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=120094"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=120094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}