{"id":616,"date":"2019-03-29T14:48:39","date_gmt":"2019-03-29T19:48:39","guid":{"rendered":"https:\/\/blog.glasswire.com\/?p=616"},"modified":"2022-10-11T08:09:28","modified_gmt":"2022-10-11T13:09:28","slug":"the-ultimate-secret-data-hog-cryptomining-malware","status":"publish","type":"post","link":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/","title":{"rendered":"The Ultimate Secret Data Hog &#8211; Cryptomining Malware"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/blog.glasswire.com\/wp-content\/uploads\/2019\/03\/cryptomining_malware-1024x768.png\" alt=\"\" class=\"wp-image-617\" srcset=\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware-1024x768.png 1024w, https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware-475x356.png 475w, https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware-768x576.png 768w, https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png 1192w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Are you already a victim of this data hog?<\/figcaption><\/figure>\n\n\n\n<p><strong>Are you a victim of this data hog?<\/strong><br> Sam Bocetta puts the word out about a new type of data hog and how to spot it.&nbsp; &nbsp; <em>Sam Bocetta is a former naval contractor and security analyst.  He&#8217;s now (mostly) retired and spends his days reading the classics and  fly fishing with his grandkids. Sam can be reached on Linkedin:&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.linkedin.com\/in\/sambocetta\/\" target=\"_blank\">https:\/\/www.linkedin.com\/in\/sambocetta\/<\/a><\/em><\/p>\n\n\n\n<p><br><strong>The Ultimate Secret Data Hog &#8211; Cryptomining Malware<\/strong><br> Malware development, like many non-malicious types of software, is  subject to certain trends that are impacted by a variety of external  factors <em>outside <\/em>the tech industry.<br><br> Ransomware, for example, was the cyber bogeyman of 2017 and 2018 for the following reasons: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Spectacular attacks on high-value targets.<\/li><li>News media headlines.<\/li><li>The modernization of traditional crimes such as hijacking, extortion and ransom.<\/li><li>Availability of leaked cyber warfare weapons and techniques developed by American intelligence agencies.<\/li><li>The use of cryptocurrencies to deliver ransom payments.<\/li><li>Ransomware-as-a-Service platforms.<\/li><\/ul>\n\n\n\n<p>\nIn early 2019, ransomware has thankfully lost some of its shine thanks \nto law enforcement intervention, prosecution and reaction by the \ninformation security community; in other words, this particular malware \nthreat is on a downtrend cycle.<br><br>\nAs can be expected, a new threat has emerged to take ransomware&#8217;s spot \non the malware scoreboard, and it goes by the names of cryptojacking or \ncrypto mining malware.\n<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>\nUnderstanding Cryptojacking<\/h3>\n\n\n\n<p>\nSpeaking of IT trends, let&#8217;s talk about Bitcoin trading: despite \ncryptocurrencies having endured more than a year of bear market \nconditions, they are still being bought, sold, exchanged, and mined for \nvarious reasons.<br><br>\nIn the case of Bitcoin, the most valuable digital currency in the world,\n the market cap of $60 billion is sizable enough to ignore that it has \nplunged from an all-time high near $20,000 in late 2017 to around $3,500\n and lower in early 2019. Some investors remain hopeful that a rally \nsimilar to the one experienced in 2017 could materialize this year, and \nminers are holding even greater hopes.<br><br>\nAs volatile as the cryptocurrency markets are, they present significant \nopportunities for profit, especially for those who engage in mining of \ntokens. In essence, mining entails putting considerable processing power\n and bandwidth to work on behalf of the blockchain that supports \ncryptocurrencies such as Bitcoin, Ethereum, Monero, Stellar, and many \nothers.<br><br>\nThe blockchain is a decentralized and distributed ledger where \ntransactions are verified and cleared through very complex cryptographic\n calculation; miners who perform this service can present the blockchain\n with &#8220;proof-of-work&#8221; performed in exchange for the potential of earning\n a few tokens.<br><br>\nCryptocurrency mining is not a &#8220;get rich quick&#8221; scheme by any means. \nWith valuable tokens such as bitcoin, the barriers to entry include \npowerful <a href=\"https:\/\/www.electronicdesign.com\/industrial-automation\/bitcoin-mining-thermal-perspective\">hardware with efficient cooling systems<\/a>,\n electricity, and broadband connections. These factors are combined into\n rigs that feature plenty of hash power and are fully dedicated to \nblockchain mining work.<br><br>\nIt should be noted that hash power can be distributed in a manner \nsomewhat similar to the distributed ledger of blockchain networks, which\n means that a single computing device can generate some hash power to \ncontribute towards a mining operation.<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/gallery.mailchimp.com\/0ffb35cd4cc82f65050fe48de\/images\/c5cb3852-dcfc-4205-afd7-480eb8da9064.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>IMAGE: Mining Rig <\/strong><br><br>\nIn the early days of Bitcoin mining, some individuals were able to mine a\n few tokens by means of running mining software on their laptops; once \ngreed kicked in and blockchain transactions became increasingly \ndifficult because of market volatility, mining cartels emerged.<br><br>\nBy the time malicious hackers and cybercrime groups latched onto digital currencies, the <a href=\"https:\/\/www.csoonline.com\/article\/3267572\/encryption\/how-to-detect-and-prevent-crypto-mining-malware.html\">development of cryptojacking<\/a>\n was imminent. With cryptojacking, hackers inject malicious code into \ncomputing devices for the purpose of stealing hash power, meaning \nprocessing power, bandwidth and electricity, all with the goal of \nsurreptitiously mining tokens.<br><br>\nBitcoin is not a popular cryptocurrency among cryptojacking attackers; privacy tokens such as Cardano and Monero are preferred.<br><br><strong>How Cryptojacking Malware Works<\/strong><br>\nTo a certain extent, crypto mining malware shares many of the \ncharacteristics of legacy spyware in the sense that injection may take \nplace through click-and-bait strategies or Trojan horse attacks; in \nother words, victims often believed that they were installing software \nor executing code that was not malicious.<br><br>\nIn some cases, remote code injection of cryptojacking malware may be \nconducted through old-school network intrusion, which is often a more \nsophisticated and aggressive approach since it may involve defeating a \nfirewall.<br><br>\nThe most common types of cryptojacking target personal computing devices\n such as desktops, laptops, tablets, and smartphones. It is not \nunreasonable to think that smart home appliances like the Samsung Family\n Hub refrigerators could be next since they are equipped with a \nmotherboard running Android and many connectivity services. These \ndevices can be infected with in-script cryptojacking code or through \nJavaScript browser extensions.<br><br>\nAs can be expected, cryptojacking attacks against business targets tend \nto be more powerful while at the same time being stealthier. A \nsophisticated cybercrime group targeting office networks or enterprise \ndata centers may forego browser extensions and go with rootkits, remote \ncode execution, and virtual machine hijacking. The most trailblazing and\n brazen attacks <a href=\"https:\/\/resources.infosecinstitute.com\/the-top-ten-most-famous-social-engineering-attacks\/\">may utilize social engineering<\/a> to gain credentials and set up fake intranet pages.<br><br>\nOnce installed, cryptojacking malware will transform GPU and CPU \nresources into hash power to conduct transaction verification. According\n to a report published by a respected information security firm, 37 \npercent of corporate networks <a href=\"https:\/\/www.enterpriseinnovation.net\/article\/37-organizations-impacted-cryptomining-over-past-year-2096540467\">were impacted by cryptojacking activity<\/a> in 2018.<br><br>\nMore than 20 percent of business IT security departments are detecting \ncryptojacking attempts on a weekly basis. Companies that implement \n&#8220;bring your own device&#8221; policies are at greater risk.\n<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>\n<strong>Cryptojacking Detection<\/strong><\/h3>\n\n\n\n<p> The first line of defense against cryptojacking involves monitoring network connections between devices and the internet.<br><br><a href=\"https:\/\/blog.glasswire.com\/2016\/06\/15\/glasswire-network-monitoring-accuracy\/\">Network monitoring<\/a>  is a security strategy widely used in the enterprise world, but it is  also available on a personal computing level with smart firewall apps  that notify users of suspicious activity, intrusions, high CPU usage,  and unusual data. It is important to note that cryptojacking crews <a href=\"https:\/\/blog.glasswire.com\/2018\/10\/16\/glasswires-new-android-firewall-is-here\/\">will not ignore mobile devices<\/a> since they are powerful enough to generate hash power and contribute to their wicked trade.<br><br> Aside from monitoring and detection, cryptojacking can also be prevented  with safe computing practices such as the use of virtual private  networking technology. It is not unreasonable to think of public Wi-Fi  hotspots being taken over by hackers for the purpose of distributing  mining malware.<br><br> To this effect, always protect your computer by using standard security  measures when accessing public networks: firewall protection (such as  GlassWire), antivirus scanners, and any no-logging <a href=\"https:\/\/privacyaustralia.net\/#vpn\">VPN service<\/a>.  This is especially when connecting to an enterprise network using your  personal computing device, so as to avoid exposing the entire network to  remote attack. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you a victim of this data hog? Sam Bocetta puts the word out about a new type of data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":617,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-616","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Ultimate Secret Data Hog - Cryptomining Malware - GlassWire Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ultimate Secret Data Hog - Cryptomining Malware - GlassWire Blog\" \/>\n<meta property=\"og:description\" content=\"Are you a victim of this data hog? Sam Bocetta puts the word out about a new type of data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"GlassWire Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/glasswirelabs\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-29T19:48:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-11T13:09:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1192\" \/>\n\t<meta property=\"og:image:height\" content=\"894\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"GlassWire\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GlassWire\" \/>\n<meta name=\"twitter:site\" content=\"@GlassWire\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GlassWire\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/\"},\"author\":{\"name\":\"GlassWire\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e\"},\"headline\":\"The Ultimate Secret Data Hog &#8211; Cryptomining Malware\",\"datePublished\":\"2019-03-29T19:48:39+00:00\",\"dateModified\":\"2022-10-11T13:09:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/\"},\"wordCount\":1095,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png\",\"articleSection\":[\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/\",\"url\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/\",\"name\":\"The Ultimate Secret Data Hog - Cryptomining Malware - GlassWire Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png\",\"datePublished\":\"2019-03-29T19:48:39+00:00\",\"dateModified\":\"2022-10-11T13:09:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#primaryimage\",\"url\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png\",\"contentUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png\",\"width\":1192,\"height\":894},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.glasswire.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Ultimate Secret Data Hog &#8211; Cryptomining Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#website\",\"url\":\"https:\/\/www.glasswire.com\/blog\/\",\"name\":\"GlassWire Blog\",\"description\":\"Free Firewall Software &amp; Network Monitor.\",\"publisher\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.glasswire.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\",\"name\":\"Glasswire\",\"url\":\"https:\/\/www.glasswire.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png\",\"contentUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png\",\"width\":216,\"height\":60,\"caption\":\"Glasswire\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/glasswirelabs\",\"https:\/\/twitter.com\/GlassWire\",\"https:\/\/www.instagram.com\/glasswireofficial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e\",\"name\":\"GlassWire\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g\",\"caption\":\"GlassWire\"},\"url\":\"https:\/\/www.glasswire.com\/blog\/author\/glasswire\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Ultimate Secret Data Hog - Cryptomining Malware - GlassWire Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/","og_locale":"en_US","og_type":"article","og_title":"The Ultimate Secret Data Hog - Cryptomining Malware - GlassWire Blog","og_description":"Are you a victim of this data hog? Sam Bocetta puts the word out about a new type of data [&hellip;]","og_url":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/","og_site_name":"GlassWire Blog","article_publisher":"https:\/\/www.facebook.com\/glasswirelabs","article_published_time":"2019-03-29T19:48:39+00:00","article_modified_time":"2022-10-11T13:09:28+00:00","og_image":[{"width":1192,"height":894,"url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png","type":"image\/png"}],"author":"GlassWire","twitter_card":"summary_large_image","twitter_creator":"@GlassWire","twitter_site":"@GlassWire","twitter_misc":{"Written by":"GlassWire","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#article","isPartOf":{"@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/"},"author":{"name":"GlassWire","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e"},"headline":"The Ultimate Secret Data Hog &#8211; Cryptomining Malware","datePublished":"2019-03-29T19:48:39+00:00","dateModified":"2022-10-11T13:09:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/"},"wordCount":1095,"commentCount":1,"publisher":{"@id":"https:\/\/www.glasswire.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png","articleSection":["Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/","url":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/","name":"The Ultimate Secret Data Hog - Cryptomining Malware - GlassWire Blog","isPartOf":{"@id":"https:\/\/www.glasswire.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png","datePublished":"2019-03-29T19:48:39+00:00","dateModified":"2022-10-11T13:09:28+00:00","breadcrumb":{"@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#primaryimage","url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png","contentUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2019\/03\/cryptomining_malware.png","width":1192,"height":894},{"@type":"BreadcrumbList","@id":"https:\/\/www.glasswire.com\/blog\/2019\/03\/29\/the-ultimate-secret-data-hog-cryptomining-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.glasswire.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Ultimate Secret Data Hog &#8211; Cryptomining Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.glasswire.com\/blog\/#website","url":"https:\/\/www.glasswire.com\/blog\/","name":"GlassWire Blog","description":"Free Firewall Software &amp; Network Monitor.","publisher":{"@id":"https:\/\/www.glasswire.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.glasswire.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.glasswire.com\/blog\/#organization","name":"Glasswire","url":"https:\/\/www.glasswire.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png","contentUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png","width":216,"height":60,"caption":"Glasswire"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/glasswirelabs","https:\/\/twitter.com\/GlassWire","https:\/\/www.instagram.com\/glasswireofficial\/"]},{"@type":"Person","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e","name":"GlassWire","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g","caption":"GlassWire"},"url":"https:\/\/www.glasswire.com\/blog\/author\/glasswire\/"}]}},"_links":{"self":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/comments?post=616"}],"version-history":[{"count":3,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/616\/revisions"}],"predecessor-version":[{"id":620,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/616\/revisions\/620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/media\/617"}],"wp:attachment":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/media?parent=616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/categories?post=616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/tags?post=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}