{"id":15744,"date":"2021-09-03T07:07:16","date_gmt":"2021-09-03T07:07:16","guid":{"rendered":"https:\/\/fastestvpn.com\/resources\/?p=15744"},"modified":"2025-05-22T15:38:52","modified_gmt":"2025-05-22T15:38:52","slug":"hacking-gaming-pcs","status":"publish","type":"post","link":"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/","title":{"rendered":"Hackers Are Targeting Gaming PCs with a Cryptominer","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As a gamer, there are certain things you must never do if you want to keep your device protected against malicious programs. Like downloading games from unknown sources, you must also be cautious of downloading free games from torrents or elsewhere. The recent revelation of how hackers are targeting gamers is a grim reminder of how malware infiltrates a system.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-15745\" title=\"Hackers Are Targeting Gaming PCs with a Cryptominer\" src=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer-300x125.jpg\" alt=\"Hackers Are Targeting Gaming PCs with a Cryptominer\" width=\"1200\" height=\"500\" srcset=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer-300x125.jpg 300w, https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer-1024x427.jpg 1024w, https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer-768x320.jpg 768w, https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer-1536x640.jpg 1536w, https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer.jpg 1920w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">A new <\/span><a href=\"https:\/\/decoded.avast.io\/danielbenes\/crackonosh-a-new-malware-distributed-in-cracked-software\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">report <\/span><\/a><span style=\"font-weight: 400;\">indicates that a cryptominer is harvesting computing resources and is being distributed through downloadable games. The malware termed \u201c<\/span><b>Crackonosh<\/b><span style=\"font-weight: 400;\">\u201d appears to disable device security like anti-virus to avoid detection and continue functioning without intervention.<\/span><\/p>\n <div class=\"fastest-hd-btn\">\n <a class=\"hd-conter-btn\" href=\"https:\/\/fastestvpn.com\/lifetime-special-deals?a_aid=634829be4d0b2\" title=\"Get FastestVPN\">Get FastestVPN <i class=\"fa fa-hand-o-right\" aria-hidden=\"true\"><\/i><\/a>\n <\/div>\n\n<h3>What is a Cryptominer?<\/h3>\n<p><span style=\"font-weight: 400;\">The term mining refers to the process of producing cryptocurrency. The various cryptocurrencies that exist in the world today are based on Blockchain technology. The \u201ccoins\u201d are generated by solving complex mathematical problems to verify and add a block to the blockchain.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because math is very complex, it requires a great amount of computational prowess to get the job done. Moreover, the complexity of generating new coins increases over time, and may require more specialized hardware.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In its prime, Bitcoin saw people from around the world flock to invest in this cryptocurrency that was rapidly getting more valuable. If you held 1 BTC six years ago at a certain price, it would be valued at nearly $40k in 2021. At $1000 a coin at the time, your holding would have increased forty times. So, it should be apparent why cryptocurrency mining is so lucrative.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, what is the one thing that is popular among miners and gamers? graphics card. The hardware is used to power the video-game experience on screen, and also excellent at mining. Instead of buying expensive graphics cards with better hashrate and dealing with enormous electricity bills, malicious actors found a way to sabotage the millions of gaming PCs in the world.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cryptominer is a type of malware that infiltrates a computer and uses its computing resources to mine cryptocurrency, all without the notice of the user. However, there are some signs that give away if your PC is infected.\u00a0<\/span><\/p>\n<h3>How Cracknosh is Infecting Gaming PCs<\/h3>\n<p><span style=\"font-weight: 400;\">The report is the result of an investigation by Avast after multiple users reported unusual behavior while using its anti-virus application. The complaints revealed that Avast\u2019s folder was empty even though the anti-virus was installed. One of the complaints mentioned how the user downloaded a few games on his PC via torrents.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The in-depth research revealed a cryptominer that has been duly named <\/span><b>Crackonosh <\/b><span style=\"font-weight: 400;\">because of its possible <\/span><b>Czech origin<\/b><span style=\"font-weight: 400;\">. The malware is distributed through these free games and installs itself when the user unpacks the downloaded files and executes the setup.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It makes several modifications to the operating system to ensure it can thrive without detection. Remember that the more computing power someone has, the easier it is to mine for cryptocurrency. The infected PCs create a botnet via the internet. The malware contains the notorious coinminer XMRig. It adds an entry into the Windows Registry to run it on startup. This is what allows the infected PC to connect with other infected PCs around the globe.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It makes several modifications to the operating system to ensure it can thrive without detection. Remember that the more computing power someone has, the easier it is to mine for cryptocurrency. The infected PCs create a botnet via the interrupt. This is what allows the infected PC to connect with other infected PCs around the globe.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By leaching computing resources, the performance of your gaming PC is at the mercy of the miner. It has so far infected more than <\/span><b>222,000 computers<\/b><span style=\"font-weight: 400;\"> worldwide, earning a whopping <\/span><b>$2,000,000<\/b><span style=\"font-weight: 400;\"> in the <\/span><b>Monero <\/b><span style=\"font-weight: 400;\">cryptocurrency. What\u2019s more worrying is the fact that this malware has been in the wild since 2018.\u00a0<\/span><\/p>\n<h2>How to Identify a Cryptominer on Your PC<\/h2>\n<p><span style=\"font-weight: 400;\">The malware in question infects a PC then proceeds to disable security features to continue operating in stealth mode. Some tech-savvy users are capable enough to spot unknown processes running in Task Manager. Hence, the malware cloaks itself by operating under the disguise of legitimate Windows processes, such as <\/span><b>winlogui.exe<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><strong>Here are some of the signs that your PC is infected:\u00a0<\/strong><b><\/b><\/p>\n<ul>\n<li>\n<h3>Slow performance<\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The sole purpose of a mining program is to leach computing resources; it makes your CPU and graphics card run at full capacity even when the PC is idle. Signs like folders and programs taking too long to load, sluggish graphics performance, and programs crashing are the common indicators in this case.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Run <\/span><b>Task Manager<\/b><span style=\"font-weight: 400;\"> and notice if your CPU or GPU is running at peak performance. If you don\u2019t have Windows 10 or above, install third-party programs like <\/span><b>CoreTemp <\/b><span style=\"font-weight: 400;\">for CPU monitoring and <\/span><b>MSI Afterburner<\/b><span style=\"font-weight: 400;\"> for GPU monitoring.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li>\n<h3>Installed Programs Don\u2019t Work<\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As seen in Crackonosh\u2019s behavior, the malware attempts to delete any installed anit-virus and Windows Defender after it has occupied a space on the computer. If multiple programs fail to operate or issue an error that the .exe of the program could not be found, then something is wrong. Programs do not disappear on their own unless they are uninstalled.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li>\n<h3>Unknown Processes<\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While Crackonosh hides in plain sight by running under legit-sounding Windows processes, other crypto miners might not. Bring up the Task Manager, switch to the Performance tab, and click on Open Resource Monitor. See-through the list of processes that are leaching resources. You can look up the name of that process to verify if its legitimate or not.\u00a0<\/span><\/p>\n<h3>How to Prevent Malware Infection<\/h3>\n<p><span style=\"font-weight: 400;\">Torrents are a hotbed for <a href=\"https:\/\/fastestvpn.com\/resources\/most-destructive-malware\/\" target=\"_blank\" rel=\"noopener\">malware<\/a>. Because anyone can sign-up and upload a program or game for others to download, it provides an easy venue for attackers. The allure of free games can be seen from the fact that popular games such as Grand Theft Auto V have thousands of people seeding and leeching at any time.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is extremely dangerous to download anything from a third-party source like torrents. It is akin to downloading a malicious email attachment from an unknown sender.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An anti-virus is a tool that safeguards your device against threats. It monitors executables and programs in the memory for potentially malicious items. Always have an anti-virus on your device, even if you don\u2019t download apps and games from torrents. It is not just downloads, but malware can infiltrate your device through mediums like USB drives and other computers on the network.\u00a0<\/span><\/p>\n<h3>Conclusion<\/h3>\n<p><span style=\"font-weight: 400;\">In addition to having a robust antivirus, keep it updated with the latest malware signatures. Data is a precious asset, and it can be compromised if there\u2019s a vulnerability. Use a <a href=\"https:\/\/fastestvpn.com\/gaming-vpn\" target=\"_blank\" rel=\"noopener\">gaming VPN<\/a> to secure your internet traffic when you surf the web using Wi-Fi networks to prevent bad actors from stealing private information or influence your web browsing experience.<\/span><br \/>\n <div class=\"fastest-hd-cta\">\n <h3>Take Control of Your Privacy Today! \n <span>Unblock websites, access streaming platforms, and bypass ISP monitoring.<\/span>\n <\/h3>\n <a class=\"hd-conter-btn\" href=\"https:\/\/fastestvpn.com\/lifetime-special-deals?a_aid=634829be4d0b2\" title=\"Get FastestVPN\">Get FastestVPN <i class=\"fa fa-hand-o-right\" aria-hidden=\"true\"><\/i><\/a>\n <\/div>\n <\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"<p>As a gamer, there are certain things you must never do if you want to keep your device protected against malicious programs. Like downloading games from unknown sources, you must also be cautious of downloading free games from torrents or elsewhere. The recent revelation of how hackers are targeting gamers is a grim reminder of [&hellip;]<\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":1,"featured_media":15746,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"acf":[],"yoast_head":"\n<title>How Hackers Are Targeting Gamers with a Cryptominer<\/title>\n<meta name=\"description\" content=\"New research has revealed that a cryptominer has affected an alarming number of users. Here\u2019s how hackers are targeting gamers with a cryptominer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Are Targeting Gamers with a Cryptominer\" \/>\n<meta property=\"og:description\" content=\"New research has revealed that a cryptominer has affected an alarming number of users. Here\u2019s how hackers are targeting gamers with a cryptominer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/\" \/>\n<meta property=\"og:site_name\" content=\"Fastest Resources Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-03T07:07:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-22T15:38:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Hackers Are Targeting Gamers with a Cryptominer\" \/>\n<meta name=\"twitter:description\" content=\"New research has revealed that a cryptominer has affected an alarming number of users. Here\u2019s how hackers are targeting gamers with a cryptominer.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/\",\"url\":\"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/\",\"name\":\"How Hackers Are Targeting Gamers with a Cryptominer\",\"isPartOf\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/#website\"},\"datePublished\":\"2021-09-03T07:07:16+00:00\",\"dateModified\":\"2025-05-22T15:38:52+00:00\",\"author\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9\"},\"description\":\"New research has revealed that a cryptominer has affected an alarming number of users. Here\u2019s how hackers are targeting gamers with a cryptominer.\",\"breadcrumb\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fastestvpn.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Are Targeting Gaming PCs with a Cryptominer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#website\",\"url\":\"https:\/\/fastestvpn.com\/resources\/\",\"name\":\"Fastest Resources Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fastestvpn.com\/resources\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n","yoast_head_json":{"title":"How Hackers Are Targeting Gamers with a Cryptominer","description":"New research has revealed that a cryptominer has affected an alarming number of users. Here\u2019s how hackers are targeting gamers with a cryptominer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/","og_locale":"en_US","og_type":"article","og_title":"How Hackers Are Targeting Gamers with a Cryptominer","og_description":"New research has revealed that a cryptominer has affected an alarming number of users. Here\u2019s how hackers are targeting gamers with a cryptominer.","og_url":"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/","og_site_name":"Fastest Resources Blog","article_published_time":"2021-09-03T07:07:16+00:00","article_modified_time":"2025-05-22T15:38:52+00:00","og_image":[{"width":1920,"height":800,"url":"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"How Hackers Are Targeting Gamers with a Cryptominer","twitter_description":"New research has revealed that a cryptominer has affected an alarming number of users. Here\u2019s how hackers are targeting gamers with a cryptominer.","twitter_image":"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/08\/Hackers-Are-Targeting-Gaming-PCs-with-a-Cryptominer.jpg","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/","url":"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/","name":"How Hackers Are Targeting Gamers with a Cryptominer","isPartOf":{"@id":"https:\/\/fastestvpn.com\/resources\/#website"},"datePublished":"2021-09-03T07:07:16+00:00","dateModified":"2025-05-22T15:38:52+00:00","author":{"@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9"},"description":"New research has revealed that a cryptominer has affected an alarming number of users. Here\u2019s how hackers are targeting gamers with a cryptominer.","breadcrumb":{"@id":"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fastestvpn.com\/resources\/hacking-gaming-pcs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fastestvpn.com\/resources\/"},{"@type":"ListItem","position":2,"name":"Hackers Are Targeting Gaming PCs with a Cryptominer"}]},{"@type":"WebSite","@id":"https:\/\/fastestvpn.com\/resources\/#website","url":"https:\/\/fastestvpn.com\/resources\/","name":"Fastest Resources Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fastestvpn.com\/resources\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g","caption":"admin"}}]}},"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/15744"}],"collection":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/comments?post=15744"}],"version-history":[{"count":3,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/15744\/revisions"}],"predecessor-version":[{"id":39926,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/15744\/revisions\/39926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/media\/15746"}],"wp:attachment":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/media?parent=15744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/categories?post=15744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/tags?post=15744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}