{"id":138680,"date":"2019-05-15T19:31:10","date_gmt":"2019-05-15T17:31:10","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=138680"},"modified":"2025-07-01T21:57:17","modified_gmt":"2025-07-02T04:57:17","slug":"cryptojacked-pc","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/cryptojacked-pc\/","title":{"rendered":"How to tell if your PC is cryptojacked"},"content":{"rendered":"\n<p>There are a lot of reasons a computer could be slow: Excessive programs running in the background; bloated temp files; a corrupted hard drive; or if you&#8217;re unlucky, it could be malware and viruses. One particularly sinister emerging threat is <strong>cryptojacking<\/strong>, which can increase overheating, slow down processing speed, and drain your batteries &#8211; all under the radar.<\/p>\n\n\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/09\/computer-pc-laptop-speed-192.jpg\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">5 ways to make your computer run faster<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/5-ways-to-make-your-computer-run-faster\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Speed up your PC \u25ba<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/5-ways-to-make-your-computer-run-faster\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is cryptojacking?<\/h2>\n\n\n\n<p>Cryptojacking is <strong>when someone takes hold of your computer to mine cryptocurrency<\/strong>. Often, hackers will ensnare you by infecting a website or online ad with an infected JavaScript code. The code auto-executes once loaded into your browser. Alternatively, a hacker might lure you into <strong>clicking a malicious link in an email<\/strong>. Once you click it, it uploads a cryptomining code to your computer and suddenly <strong>your processing power is getting leeched to an outside source.<\/strong><\/p>\n\n\n\n<p>Why would someone bother doing this?<\/p>\n\n\n\n<p>Money.<\/p>\n\n\n\n<p>Cryptojacking allows someone with malicious intent to steal computing resources from a victim&#8217;s device instead of having to build their own dedicated cryptomining computer. In this way, they can compete against sophisticated cryptomining operations without any of the costly overhead.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stay protected<\/h2>\n\n\n\n<p>Even on a healthy computer, it&#8217;s tough to track the origin of a program that&#8217;s draining all your CPU. It&#8217;s harder still when you&#8217;re trying to do so on an infected computer that&#8217;s slow as dirt. Troubleshooting when your computer can barely chug along is a nightmare. As such, the best way to deal with cryptojacking threats is to <a href=\"https:\/\/en.softonic.com\/solutions\/what-are-the-best-antivirus\" target=\"_blank\" rel=\"noopener noreferrer\">not get infected in the first place<\/a>.<\/p>\n\n\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/08\/malware192192.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">Top 5 anti-malware tools<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/en.softonic.com\/articles\/top-5-anti-malware-tools\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">What's the best anti-malware tool? \u25ba<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/en.softonic.com\/articles\/top-5-anti-malware-tools\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>A smart, secure browser is your first line of defense &#8211; especially one that can block JavaScript. While this effectively closes any door on a cryptojacking attempt, the obvious drawback is that blocking JavaScript will also cull functions that you like and need. The best middle ground is <a href=\"https:\/\/opera.en.softonic.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Opera<\/a>, a browser that&#8217;s been fighting the cryptojacking war since before we even knew about it. If you install Opera on your mobile device, <strong>it&#8217;ll actually block risky mining scripts when visiting a site<\/strong>. It&#8217;s analyzed <em>over 100 mined websites<\/em>, and <a href=\"https:\/\/blogs.opera.com\/mobile\/2018\/01\/opera-introduces-bitcoin-mining-protection-mobile-browsers\/\" target=\"_blank\" rel=\"noopener noreferrer\">noted how smartphones such as the Galaxy S8 or HTC One suffered reduced performance when exposed to cryptojacking<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/05\/CryptojackingProtection.jpg\" alt=\"Opera Mini cryptojacking\" class=\"wp-image-138689\" \/><\/figure><\/div>\n\n\n\n<p>You can also download an extension like <a href=\"https:\/\/no-coin.en.softonic.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">No Coin<\/a> which blocks miners using your computer resources without consent. <strong>Opera even comes with the extension already installed on download.<\/strong><\/p>\n\n\n\n<p>Lastly, Opera even made <a href=\"https:\/\/cryptojackingtest.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">this cool test<\/a> to tell you whether you&#8217;ve been cryptojacked. If you&#8217;re a regular user of cryptocurrency, it might be a good idea to bookmark the page.<\/p>\n\n\n\n<p>Using Opera in tandem with a strong anti-malware tool will help keep your PC protected from cryptojacking attempts, but it always helps to take extra precautions before clicking on that sketchy email, or opening a link that you don&#8217;t trust. Stay frosty, and stay tuned with Softonic for more tips and tricks to keep protect your computer protected.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Opera\" src=\"https:\/\/images.sftcdn.net\/images\/t_optimized,f_auto\/p\/e9b8b260-96d0-11e6-98d4-00163ec9f5fa\/217236501\/opera-217236501.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Opera<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/opera.en.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">Download free \u25ba<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--80\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"80\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"8\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\">8<\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/opera.en.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is cryptojacking and how do you know if you&#8217;re affected?<\/p>\n","protected":false},"author":9155,"featured_media":138835,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[2518,2441],"tags":[1853,1655,1472,1440,1027],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-138680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-how-to","tag-browser","tag-cryptocurrency","tag-hacking","tag-opera","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/138680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9155"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=138680"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/138680\/revisions"}],"predecessor-version":[{"id":326048,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/138680\/revisions\/326048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/138835"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=138680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=138680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=138680"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=138680"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=138680"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=138680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}