{"id":10307,"date":"2018-02-19T10:36:28","date_gmt":"2018-02-18T23:36:28","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=10307"},"modified":"2018-02-19T10:36:28","modified_gmt":"2018-02-18T23:36:28","slug":"protecting-servers-crypto-mining-malware","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware","title":{"rendered":"Protecting Servers From Crypto-Mining Malware"},"content":{"rendered":"<p>If you didn&#8217;t have enough to protect your servers from\u2014such as hardware failure, user error and ransomware\u2014there&#8217;s now a new threat on the rise.<\/p>\n<p>It&#8217;s called crypto-mining malware. The short explanation is if this malware makes it onto your server, it will hog all your resources to mine <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptocurrency\">crypto-currencies<\/a>. This process is known as\u00a0<strong>cryptojacking<\/strong>.<\/p>\n<p>It probably doesn&#8217;t sound that bad compared to all the other things that can befall your machines. After all, it&#8217;s not like <a href=\"https:\/\/www.backupassist.com\/blog\/news\/ransomware-play-safe-or-pay-up\/\">ransomware<\/a> where you&#8217;re being asked to pay thousands of dollars, or a virus that damages your data and systems.<\/p>\n<p>The problem is, there&#8217;s a reason someone wants to hijack your system and mine crypto-currency on <em>your<\/em> machine instead of their machine. And it&#8217;s exactly the reason you don&#8217;t want this sort of infection.<\/p>\n<h4>What is Crypto-Mining Malware?<\/h4>\n<p>You may have heard of crypto-currencies, and how they&#8217;re a digital currency that&#8217;s soaring in value. But where does it come from?<\/p>\n<p>The short story is basically from solving equations. Crypto-coin miners use special software to solve math equations, and are issued a certain number of coins in exchange.<\/p>\n<p>So these are not the sort of equations you can solve by getting out a pen and paper and crunching some math. And solving one pays out like striking gold. That&#8217;s why you have people who have set up crypto-coin mining &#8216;farms&#8217; &#8211; imagine rows and rows of graphics cards linked together, all trying to solve these equations.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-10319\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Capture-e1517443934305-700x392.jpg\" alt=\"\" width=\"700\" height=\"392\" \/><\/p>\n<p>Sounds quaint so far &#8211; just some hardware strapped together doing some math. Harmless, right? But there&#8217;s some big problems with it.<\/p>\n<p>Firstly, the equations gets harder and harder over time &#8211; the easy ones are, of course, done first. That means mining becomes harder &#8211; and chews up more processing power. More processing power leads to hardware burning out at an incredible rate, and an obscene electricity bill. A lot of people run these farms in nations where electricity is cheap, like in Latin America.<\/p>\n<p>But you&#8217;re still paying money, both in hardware costs and electricity. So someone thought &#8216;why not make other people pay the costs to mine our bitcoin?&#8217;<\/p>\n<p>Enter crypto-mining malware &#8211; a form of malware that infects your system and gets it to mine crypto-coin. Not for you, of course, but for the person who infected your system in the first place.<\/p>\n<h4>Why Crypto-Mining Malware is Bad for Your Server<\/h4>\n<p>Cryptojacking is a threat to all devices. If run on mobile phones, the sheer\u00a0heat generated from mining can <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/12\/currency-mining-android-malware-is-so-aggressive-it-can-physically-harm-phones\/\">physically warp<\/a>\u00a0an infected device.<\/p>\n<p>While hardware damage of this type is really unlikely for your server, it is a problem if your resources are hijacked.\u00a0That means if your server is running slow and this is at odds with its actual load, it might be infected with crypto-mining malware.<\/p>\n<p>The other thing to be concerned about is having to foot the\u00a0electrical bill that someone else doesn&#8217;t want to pay for crypto-coin mining.<\/p>\n<h4>How to Protect Against Crypto-Mining Malware<\/h4>\n<p>Crypto-mining malware may be a new form of malware, but it still needs to infect your system through the same routes. This means it\u00a0is going to access your server through a weak point. This might be social engineering (tricking a user to click on a link, <a href=\"https:\/\/www.backupassist.com\/blog\/news\/spear-phishing-is-on-the-rise-know-how-to-spot-it\/\">spear phishing<\/a>, etc), abusing a known exploit in <a href=\"https:\/\/www.backupassist.com\/blog\/news\/eol-products-are-a-server-security-risk-it-experts\/\">out-of-date software<\/a>, or brute force.<\/p>\n<p>Put in place your front-of-house protections such as firewalls and anti-malware software, and also engage in regular user training. On the back-end, you need to have <a href=\"https:\/\/www.backupassist.com\/backupassist.html\">backups in place<\/a> so you can recover should this kind of ransomware compromise your systems.<\/p>\n<p>Don&#8217;t rely on just one solution to protect you against this threat. Make sure you have an array of defenses, and a contingency plan for if your system is infected anyway. Performing a <a href=\"https:\/\/www.backupassist.com\/backupassist\/features\/physical-virtual-servers.html\">bare-metal recovery<\/a> with an image backup should be there as your last resort if you can&#8217;t uninfect your compromised system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are infecting business servers with harmful crypto-mining malware which can affect your systems. Here&#8217;s how to prevent it.<\/p>\n","protected":false},"author":3,"featured_media":10322,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[666,667,668,634],"class_list":["post-10307","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-support","tag-bitcoin","tag-cryptocoin","tag-cryptomining-malware","tag-featured"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Servers From Crypto-Mining Malware - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Servers From Crypto-Mining Malware - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"Hackers are infecting business servers with harmful crypto-mining malware which can affect your systems. Here&#039;s how to prevent it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-18T23:36:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Ipsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Ipsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware\"},\"author\":{\"name\":\"Adam Ipsen\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\"},\"headline\":\"Protecting Servers From Crypto-Mining Malware\",\"datePublished\":\"2018-02-18T23:36:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware\"},\"wordCount\":657,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg\",\"keywords\":[\"bitcoin\",\"cryptocoin\",\"cryptomining malware\",\"featured\"],\"articleSection\":[\"Support\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware\",\"url\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware\",\"name\":\"Protecting Servers From Crypto-Mining Malware - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg\",\"datePublished\":\"2018-02-18T23:36:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg\",\"width\":1000,\"height\":625},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Servers From Crypto-Mining Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\",\"name\":\"Adam Ipsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"caption\":\"Adam Ipsen\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Servers From Crypto-Mining Malware - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware","og_locale":"en_US","og_type":"article","og_title":"Protecting Servers From Crypto-Mining Malware - Cyber Resilience Blog","og_description":"Hackers are infecting business servers with harmful crypto-mining malware which can affect your systems. Here's how to prevent it.","og_url":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware","og_site_name":"Cyber Resilience Blog","article_published_time":"2018-02-18T23:36:28+00:00","og_image":[{"width":1000,"height":625,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg","type":"image\/jpeg"}],"author":"Adam Ipsen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Ipsen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware"},"author":{"name":"Adam Ipsen","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d"},"headline":"Protecting Servers From Crypto-Mining Malware","datePublished":"2018-02-18T23:36:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware"},"wordCount":657,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg","keywords":["bitcoin","cryptocoin","cryptomining malware","featured"],"articleSection":["Support"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware","url":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware","name":"Protecting Servers From Crypto-Mining Malware - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg","datePublished":"2018-02-18T23:36:28+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Elliptic-and-LexisNexis-Team-Up-to-Control-Bitcoin-Money-Laundering.jpg","width":1000,"height":625},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/protecting-servers-crypto-mining-malware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Protecting Servers From Crypto-Mining Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d","name":"Adam Ipsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","caption":"Adam Ipsen"},"url":"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/10307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=10307"}],"version-history":[{"count":0,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/10307\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/10322"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=10307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=10307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=10307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}