{"id":85367,"date":"2018-04-11T09:00:19","date_gmt":"2018-04-11T16:00:19","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=85367"},"modified":"2025-06-03T21:27:54","modified_gmt":"2025-06-04T04:27:54","slug":"parasitic-coin-mining-creates-wealth-destroys-systems","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/","title":{"rendered":"Parasitic Coin Mining Creates Wealth, Destroys Systems"},"content":{"rendered":"<p>The increasing popularity of cryptocurrencies has inspired some people to pursue <a href=\"https:\/\/www.investopedia.com\/tech\/how-does-bitcoin-mining-work\/\" target=\"_blank\" rel=\"noopener\">coin mining,<\/a> essentially making money online. (Mining is the processing of transactions in the digital currency system, in which new transactions are recorded in a digital ledger called the blockchain. Miners help to update the ledger to verify and collect new transactions to be added to the blockchain. In return, miners earn Bitcoins, for example.) Mining is resource intensive and legal if it is done with the proper permissions.<\/p>\n<p>McAfee Labs has recently seen a huge increase in a malware variant, commonly known as CoinMiner or CoinMiner-FOZU!, which takes control of a victim&#8217;s computer <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/malware-mines-steals-cryptocurrencies-from-victims\/\" target=\"_blank\" rel=\"noopener\">to mine new coins<\/a> by infecting user executables, injecting Coinhive JavaScript into HTML files, and blocking the domains of security products to stop signature updates.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-88179\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png\" alt=\"\" width=\"831\" height=\"512\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png 831w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1-300x185.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1-768x473.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1-812x500.png 812w\" sizes=\"auto, (max-width: 831px) 100vw, 831px\" \/><\/a><\/p>\n<p><em>CoinMiner-FOZU!, which we analyzed, has led all major coin-miner malware in prevalence in 2018. (March figures are incomplete.) Source: McAfee Labs.<\/em><\/p>\n<p>The following graphs show statistics and geographic data for recent CoinMiner-FOZU! detections:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-88180\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-2.png\" alt=\"\" width=\"923\" height=\"524\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-2.png 923w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-2-300x170.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-2-768x436.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-2-881x500.png 881w\" sizes=\"auto, (max-width: 923px) 100vw, 923px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-88181\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-3.png\" alt=\"\" width=\"1001\" height=\"507\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-3.png 1001w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-3-300x152.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-3-768x389.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-3-987x500.png 987w\" sizes=\"auto, (max-width: 1001px) 100vw, 1001px\" \/><\/a><\/p>\n<p>W32\/CoinMiner employs\u2014without a user\u2019s consent\u2014machine resources to mine coins for virtual currencies. Its parasitic nature makes it rare as well as destructive: The malware does not put a unique marker on each file it infects. Thus subsequent infections by the same malware will reinfect the victim\u2019s files.<\/p>\n<h2><strong>Analysis<\/strong><\/h2>\n<p>After launching, CoinMiner copies itself into two hardcoded locations:<\/p>\n<ul>\n<li>%Windows%\\360\\360Safe\\deepscan\\ZhuDongFangYu.exe<\/li>\n<li>%filesystemroot%:\\RECYCLER\\S-5-4-62-7581032776-5377505530-562822366-6588\\ZhuDongFangYu.exe<\/li>\n<\/ul>\n<p>These two files are hidden and read only:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85368\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/1.png\" alt=\"\" width=\"1672\" height=\"129\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/1.png 1672w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/1-300x23.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/1-768x59.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/1-1024x79.png 1024w\" sizes=\"auto, (max-width: 1672px) 100vw, 1672px\" \/><\/p>\n<p>The binary executes from the first location and starts the parasitic infection process. The malware prepends itself to user-executable files but, unlike traditional file infectors, it does not allow the original file to run. It targets files with extensions .exe, .com, .scr, and .pif. This malware does not check for multiple infections. If the threat is deleted and later reinfects the system, the same files will again be targeted.<\/p>\n<p>To prevent victims from restoring clean copies of their files, the malware deletes both ISO (disk image) and GHO (Norton Ghost) files:<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85369\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/2-1.png\" alt=\"\" width=\"644\" height=\"290\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/2-1.png 644w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/2-1-300x135.png 300w\" sizes=\"auto, (max-width: 644px) 100vw, 644px\" \/><\/p>\n<p>Once CoinMiner finishes infecting other executable files, it injects a Coinhive script into HTML files. The Coinhive service provides cryptocurrency mining software, which using JavaScript code can be embedded in websites and use the site visitor&#8217;s processing power to mine the cryptocurrency:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85370\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/3-1.png\" alt=\"\" width=\"645\" height=\"90\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/3-1.png 645w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/3-1-300x42.png 300w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><\/p>\n<p>CoinMiner disables the user account control feature, which notifies the user when applications make changes to the system. Through registry updates, it also disables folder options and registry tools, and deletes safe mode.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85371\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/4-1.png\" alt=\"\" width=\"880\" height=\"177\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/4-1.png 880w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/4-1-300x60.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/4-1-768x154.png 768w\" sizes=\"auto, (max-width: 880px) 100vw, 880px\" \/><\/p>\n<p>From its second location on an infected system\u2014the hidden autorun.inf at the file system root\u2014the malware ensures that it starts after rebooting:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85372\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/5-1.png\" alt=\"\" width=\"824\" height=\"126\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/5-1.png 824w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/5-1-300x46.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/5-1-768x117.png 768w\" sizes=\"auto, (max-width: 824px) 100vw, 824px\" \/><\/p>\n<p>To avoid detection by security products, CoinMiner puts security software domains in the hosts file and redirects them to 127.0.0.1, the loopback address on the victim\u2019s system. If users have not created a local website, they will see an error page in their browsers. By doing this, the malware ensures that no victim can receive an update from the security vendor.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-85373\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/6-1.png\" alt=\"\" width=\"887\" height=\"562\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/6-1.png 887w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/6-1-300x190.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/6-1-768x487.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/6-1-789x500.png 789w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/p>\n<p>When the victim runs the script-injected HTML files, the Coinhive script executes, downloading coinhive.min.js (hash: 4d6af0dba75bedf4d8822a776a331b2b1591477c6df18698ad5b8628e0880382) from coinhive.com. This script takes over 100% of the CPU for mining using the function setThrottle(0). The mining stops when the victim closes the infected HTML file:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-88182\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-4.png\" alt=\"\" width=\"874\" height=\"26\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-4.png 874w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-4-300x9.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-4-768x23.png 768w\" sizes=\"auto, (max-width: 874px) 100vw, 874px\" \/><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85374 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/7-1.png\" alt=\"\" width=\"419\" height=\"546\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/7-1.png 419w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/7-1-230x300.png 230w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/7-1-384x500.png 384w\" sizes=\"auto, (max-width: 419px) 100vw, 419px\" \/><\/p>\n<p>The simple hosts-file injection, hiding in the recycle bin, and maximizing CPU usage suggest that this malware has been written by a novice author. McAfee advises all users to keep their antimalware products up to date.<\/p>\n<h2><strong>McAfee Detections<\/strong><\/h2>\n<ul>\n<li>W32\/CoinMiner<\/li>\n<li>CoinMiner-FOZU![Partial hash]<\/li>\n<li>TXT\/CoinMiner.m<\/li>\n<li>HTML\/CoinMiner.m<\/li>\n<li>JS\/Miner.c<\/li>\n<\/ul>\n<h2><strong>Hashes (SHA-256)<\/strong><\/h2>\n<ul>\n<li>80568db643de5f429e9ad5e2005529bc01c4d7da06751e343c05fa51f537560d<\/li>\n<li>bb987f37666b6e8ebf43e443fc4bacd5f0ab795194f20c01fcd10cb582da1c57<\/li>\n<li>4d6af0dba75bedf4d8822a776a331b2b1591477c6df18698ad5b8628e0880382<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5220,76,4452,338,180],"coauthors":[3973],"class_list":["post-85367","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cryptocurrency","tag-cybercrime","tag-cybersecurity","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Parasitic Coin Mining Creates Wealth, Destroys Systems | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the processing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Parasitic Coin Mining Creates Wealth, Destroys Systems | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the processing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-11T16:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T04:27:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"831\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Parasitic Coin Mining Creates Wealth, Destroys Systems\",\"datePublished\":\"2018-04-11T16:00:19+00:00\",\"dateModified\":\"2025-06-04T04:27:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/\"},\"wordCount\":667,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png\",\"keywords\":[\"cryptocurrency\",\"cybercrime\",\"cybersecurity\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/\",\"name\":\"Parasitic Coin Mining Creates Wealth, Destroys Systems | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png\",\"datePublished\":\"2018-04-11T16:00:19+00:00\",\"dateModified\":\"2025-06-04T04:27:54+00:00\",\"description\":\"The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the processing\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Parasitic Coin Mining Creates Wealth, Destroys Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Parasitic Coin Mining Creates Wealth, Destroys Systems | McAfee Blog","description":"The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the processing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Parasitic Coin Mining Creates Wealth, Destroys Systems | McAfee Blog","og_description":"The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the processing","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-04-11T16:00:19+00:00","article_modified_time":"2025-06-04T04:27:54+00:00","og_image":[{"width":831,"height":512,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Parasitic Coin Mining Creates Wealth, Destroys Systems","datePublished":"2018-04-11T16:00:19+00:00","dateModified":"2025-06-04T04:27:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/"},"wordCount":667,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png","keywords":["cryptocurrency","cybercrime","cybersecurity","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/","name":"Parasitic Coin Mining Creates Wealth, Destroys Systems | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png","datePublished":"2018-04-11T16:00:19+00:00","dateModified":"2025-06-04T04:27:54+00:00","description":"The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the processing","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/04\/20180402-Coin-Mining-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/parasitic-coin-mining-creates-wealth-destroys-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Parasitic Coin Mining Creates Wealth, Destroys Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/85367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=85367"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/85367\/revisions"}],"predecessor-version":[{"id":215036,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/85367\/revisions\/215036"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=85367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=85367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=85367"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=85367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}