{"id":45529,"date":"2018-08-13T16:41:51","date_gmt":"2018-08-13T21:41:51","guid":{"rendered":"https:\/\/eshop.macsales.com\/blog\/?p=45529"},"modified":"2020-01-28T11:12:32","modified_gmt":"2020-01-28T17:12:32","slug":"how-someone-can-use-your-macs-processing-power-with-cryptojacking","status":"publish","type":"post","link":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/","title":{"rendered":"How Someone Can Use Your Mac&#8217;s Processing Power with Cryptojacking"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-large wp-image-45534\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-284x284.png\" alt=\"\" width=\"284\" height=\"284\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-284x284.png 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-120x120.png 120w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-190x190.png 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-380x380.png 380w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor.png 512w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-120x120@2x.png 240w\" sizes=\"auto, (max-width: 284px) 100vw, 284px\" \/>If your Mac seems to suddenly be running hot, with the fans making more noise than usual, your battery runtime has taken a nosedive, or you\u2019ve noticed that your Mac seems to be slowing down, you may be experiencing the effects of cryptojacking.<\/p>\n<p>Of course, there are plenty of other reasons why your Mac could be misbehaving as outlined above; <a href=\"https:\/\/eshop.macsales.com\/blog\/39199-rocket-yard-guide-five-mac-utilities-everyone-can-use\" target=\"_blank\" rel=\"noopener noreferrer\">hot summer days can make your Mac run its fans at a higher rate<\/a>, <a href=\"https:\/\/eshop.macsales.com\/blog\/37818-rocket-yard-guide-maximize-the-life-of-your-devices-battery\" target=\"_blank\" rel=\"noopener noreferrer\">battery runtime<\/a>&nbsp;can be affected by the type of processes you\u2019re running, such as video or audio processing, and the Mac&#8217;s processors may simply be engaged in running multiple threads from multiple apps, keeping things a bit tied up.<\/p>\n<p>But you could also be a victim of cryptojacking. In this Rocket Yard Guide, we\u2019re going to take a look at cryptocurrency, how it\u2019s mined, and how it may be affecting your Mac.<\/p>\n<p><strong>What Is Cryptojacking? The New, Friendlier Malware<\/strong><br \/>\nCryptojacking is a somewhat new way for nefarious individuals to make use of your Mac&#8217;s processing power for their own gain. With cryptojacking, the gain is in the acquisition of cryptocurrency coins by having your Mac solve complex mathematical problems. Each solved problem is worth some number of coins or fractions of coins in the cryptocurrency being mined.<\/p>\n<p>Mining for money using your Mac&#8217;s hardware without your consent is commonly referred to as cryptojacking. Coin mining is probably best known as the way to acquire Bitcoins, a popular cryptocurrency that has been in use for a number of years. In the early days of coin mining, the tasks a computer had to perform to generate a coin were easy enough that a moderately outfitted personal computer could perform the tasks in a reasonable amount of time. As cryptocurrency become more popular, the difficulty of the problems that needed to be solved increased dramatically, to the point where multiple specially designed computer rigs were being used together to solve the problems and generate cryptocoins in a reasonable timeframe.<\/p>\n<p>As the various cryptocurrencies gained support, the mining of the coins became more and more difficult, so that the days of someone using an average personal computer to solve problems and generate coins went by the wayside. Nowadays, the mining, a common term for solving the problems and generating the coins, is being performed by highly advanced, dedicated mining rigs, or through distributed computing systems that use a large number of individual computers, each working on a piece of the puzzle.<\/p>\n<p>It&#8217;s this last mining rig type that has spawned the growth of cryptojacking, using computers that have had mining software installed without the consent of the owner to hijack the computer\u2019s processing power to mine for coins.<\/p>\n<p><strong>Types of Cryptojacking<\/strong><br \/>\nCryptojackers use two common methods of manipulating a computer to run mining software. The first, and somewhat less common at the moment, is the old standard malware approach of <a href=\"https:\/\/eshop.macsales.com\/blog\/45473-we-explain-what-system-integrity-protection-on-mac-is-and-how-to-control-it\" target=\"_blank\" rel=\"noopener noreferrer\">using a Trojan app<\/a>&nbsp;to install the mining app on an unsuspecting system. This usually takes the form of a mining app masquerading as another, more popular application. Once the app is downloaded and the installer run, the crypto miner is installed and starts mining for coins.<\/p>\n<p>However, the most likely way for a Mac to run into cryptojacking is through a web browser. The software for mining cryptocurrency has been developed using <a href=\"https:\/\/eshop.macsales.com\/blog\/41842-what-secrets-does-your-browser-know-and-reveal-about-you\" target=\"_blank\" rel=\"noopener noreferrer\">JavaScript<\/a>, which every web browser can run. Cryptojackers can insert the JavaScript code into a hacked website, or they can embed the JavaScript mining code within ads which are then placed on many websites.<\/p>\n<p>All you need to do is visit one of these websites, and your Mac will start happily running the cryptocurrency mining code.<\/p>\n<p>For the cryptojacker, using web-based infection has many advantages. It\u2019s easy to do; while they can hack a website and insert the code, they can also just create an ad and place it with an ad service to have it distributed to many websites. Web-based cryptojacking also doesn\u2019t require any type of enticement to get you to download and install a cryptojacking app; instead, the browser runs the mining code for as long as the webpage is open; no installation of code required.<\/p>\n<p><strong>How to Detect Cryptojacking on Your Mac<\/strong><br \/>\nCryptojacking is relatively new, and as such, most cryptojacking methods use similar JavaScript that runs within a browser page. The JavaScript attacks tend to quickly elevate CPU usage, allowing you to easily detect the intruder\u2019s presence using <a href=\"https:\/\/eshop.macsales.com\/blog\/37411-tech-tip-how-to-monitor-your-macs-memory-usage\" target=\"_blank\" rel=\"noopener noreferrer\">the Mac&#8217;s built-in Activity Monitor app<\/a>.<\/p>\n<figure id=\"attachment_45531\" aria-describedby=\"caption-attachment-45531\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-45531\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640.jpg\" alt=\"\" width=\"640\" height=\"414\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640.jpg 640w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640-186x120.jpg 186w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640-284x184.jpg 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640-190x123.jpg 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640-100x65.jpg 100w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640-186x120@2x.jpg 372w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640-284x184@2x.jpg 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorWindow640-190x123@2x.jpg 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-45531\" class=\"wp-caption-text\"><strong>(A web page actively engaged in cryptomining using a high percentage of CPU power. This site was given permission to make use of the Mac&#8217;s processors.)<\/strong><\/figcaption><\/figure>\n<p>Launch Activity Monitor, located at \/Applications\/Utilities.<\/p>\n<p>In the Activity Monitor window, select the CPU tab.<\/p>\n<p>At the bottom of the window you\u2019ll see the CPU load represented as a graph; you\u2019ll also see the CPU load represented by percentage used by System, User, and Idle.<\/p>\n<p>When you open your browser to a web page, you may see a slight bump in User CPU utilization as the page is loading, but after that, the CPU utilization will likely return to a normal range.<\/p>\n<p>When you load a website where cryptojacking is occurring, you should see the CPU utilization rise quickly and stay in a high range as long as the web page remains loaded in the browser. Close the web page or quit the browser, and the CPU load should drop back to a normal level.<\/p>\n<p>Keeping an Activity Monitor window open on the desktop can get in the way of the work you need to be doing. Instead, you can set the Activity Monitor&#8217;s Dock icon to display the CPU usage history dynamically.<\/p>\n<p>From Activity Monitor\u2019s View menu, select Dock Icon, Show CPU History.<\/p>\n<p>You can now close the Activity Monitor window, and the Dock icon will still display CPU utilization.<\/p>\n<p>If you would like to see an example of cryptocurrency mining and how it affects CPU utilization, you can load <a href=\"https:\/\/www.thehopepage.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">TheHopepage.org<\/a>&nbsp;in your web browser. This page, run by the UNICEF organization, will ask your permission to donate some of your Mac&#8217;s computing horsepower to generate cryptocurrency to be used to help supply water, food, and vaccines to children. This is an example of cryptocurrency mining being used with your permission for a stated goal. You can even set the percentage of CPU power you wish to allow the site to use. Once you close the page, the mining will stop.<\/p>\n<p>Unlike the UNICEF site we used for demonstration, cryptojacking sites use your processing power without your permission and for unknown goals.<\/p>\n<figure id=\"attachment_45530\" aria-describedby=\"caption-attachment-45530\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-45530\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640.jpg\" alt=\"\" width=\"640\" height=\"352\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640.jpg 640w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640-218x120.jpg 218w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640-284x156.jpg 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640-190x105.jpg 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640-100x56.jpg 100w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640-218x120@2x.jpg 436w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640-284x156@2x.jpg 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/ActivityMonitorDock640-190x105@2x.jpg 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-45530\" class=\"wp-caption-text\"><strong>(Activity Monitor&#8217;s Dock icon set to show CPU usage history. Notice the increase in processor usage once a cryptomining web page was loaded in the browser.)<\/strong><\/figcaption><\/figure>\n<p><strong>How to Prevent Cryptojacking<\/strong><br \/>\nBecause browser-based cryptojacking uses JavaScript, you can use one of the many ad-blocking browser extensions. This type of ad blocker will help prevent cryptojacking that is being delivered via ads embedded in websites.<\/p>\n<p>Some browser extensions, such as Adblock, Adblock Plus, No Coin, and MinerBlock, have support for preventing cryptojacking by using a list of known websites that employ cryptojacking tactics. If you use an ad blocker, be sure to check its settings to see if a cryptojacking prevention feature has been added.<\/p>\n<p>Another method to block cryptojacking is to use an anti-malware app, such as <a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes<\/a>&nbsp;(premium version), that has cryptojacking detection capabilities and actively blocks known cryptojacking sites and services, such as Coinhive. Coinhive is a service that offers cryptocurrency miners in the form of JavaScript code to other websites in exchange for a cut of all the cryptocurrency a site generates. Many of the websites actively employing cryptojacking make use of the Coinhive service.<\/p>\n<p>Less common, at least for the Mac community, are cryptojacking apps that run independent of a web browser. One of the original miner apps for the Mac went by the names <a href=\"https:\/\/eshop.macsales.com\/blog\/12500-owc-radio-61-the-end-of-the-world-episode\" target=\"_blank\" rel=\"noopener noreferrer\">DevilRobber<\/a>, Coinbitminer, and Miner-D. Back in 2011, Apple released a security update to thwart how these cryptominers communicated with a remote server.<\/p>\n<p>Since then, hidden mining apps have been few and far between on the Mac, with perhaps the only recent sighting being an app going by the name mshelper. How mshelper is distributed isn\u2019t fully known, though it appears to be attached to other apps a user may download, such as a Flash updater.<\/p>\n<figure id=\"attachment_45533\" aria-describedby=\"caption-attachment-45533\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-45533\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640.jpg\" alt=\"\" width=\"640\" height=\"414\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640.jpg 640w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640-186x120.jpg 186w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640-284x184.jpg 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640-190x123.jpg 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640-100x65.jpg 100w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640-186x120@2x.jpg 372w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640-284x184@2x.jpg 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/mshelper640-190x123@2x.jpg 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-45533\" class=\"wp-caption-text\"><strong>(You can use Activity Monitor to search for the mshelper cryptojacking app. Here it is seen using a little less than half my Mac&#8217;s processing power.)<\/strong><\/figcaption><\/figure>\n<p>Most anti-malware apps can detect and remove mshelper, but you can also check for its presence using Activity Monitor:<\/p>\n<p>Launch Activity Monitor and select the CPU tab.<\/p>\n<p>In the Search field, enter mshelper and press return.<\/p>\n<p>If the app is installed on your Mac, it will be displayed in the list. If nothing shows up, your Mac doesn\u2019t have the cryptomining app mshelper installed.<\/p>\n<p>If it is present, select the mshelper app in the Activity Monitor window, then click the Force Process to Quit button, located at the top left of the Activity Monitor toolbar (it looks like a circle with an X through it).<\/p>\n<p>Once the mshelper has quit, you need to remove two files:<\/p>\n<p>Use the Finder to navigate to \/Library\/LaunchDaemons\/ and delete the file named: com.pplauncher.plist.<\/p>\n<p>Use the Finder to navigate to \/Library\/Application Support\/ and delete the file named: pplauncher.<\/p>\n<p>Both of these files are in the Library folder on the startup drive, and not the individual users\u2019 Library folder.<\/p>\n<p><strong>Cryptojacking&#8217;s Other Side<\/strong><br \/>\nI mentioned earlier that cryptojacking was the new, friendlier malware. That&#8217;s because cryptojacking doesn\u2019t permanently harm your computer, nor does it collect personal information or attempt to encrypt your data to ransom it back to you.<\/p>\n<p>Interestingly, ransomware-based attacks have fallen considerably since the rise of cryptojacking. This may be because cryptojacking is easy to perform and is difficult to trace back to the originator, making it much less risky to attempt.<\/p>\n<p>Also interestingly, a few web services have experimented with using open, aboveboard, and voluntary cryptomining to replace or reduce ads being shown on a website. If you\u2019re a Salon reader, you may have already seen the <a href=\"https:\/\/www.salon.com\/about\/faq-what-happens-when-i-choose-to-suppress-ads-on-salon\/\" target=\"_blank\" rel=\"noopener noreferrer\">opt-in option for cryptomining to replace ads<\/a>.<\/p>\n<p>Salon\u2019s use of cryptomining is a beta and may never actually replace ad revenue, but it\u2019s interesting to see cryptomining being used in ways other than stealing processing performance with cryptojacking.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptojacking is a somewhat new way for nefarious individuals to make use of your Mac&#8217;s processing power for their own gain. Use this guide to see if you have fallen prey.<\/p>\n","protected":false},"author":97,"featured_media":45535,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"spay_email":"","footnotes":""},"categories":[4],"class_list":["post-45529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.2 (Yoast SEO v20.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Someone Can Use Your Mac&#039;s Processor for Cryptojacking<\/title>\n<meta name=\"description\" content=\"In this Rocket Yard guide, we take a look at cryptocurrency, how it\u2019s mined, and how it may be affecting your Mac.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Someone Can Use Your Mac&#039;s Processing Power with Cryptojacking\" \/>\n<meta property=\"og:description\" content=\"In this Rocket Yard guide, we take a look at cryptocurrency, how it\u2019s mined, and how it may be affecting your Mac.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Rocket Yard\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-13T21:41:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-28T17:12:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-284x284-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"284\" \/>\n\t<meta property=\"og:image:height\" content=\"284\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tom Nelson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Nelson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/\"},\"author\":{\"name\":\"Tom Nelson\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/647f465acd469444183711d2a22648cb\"},\"headline\":\"How Someone Can Use Your Mac&#8217;s Processing Power with Cryptojacking\",\"datePublished\":\"2018-08-13T21:41:51+00:00\",\"dateModified\":\"2020-01-28T17:12:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/\"},\"wordCount\":1792,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"keywords\":[\"Activity Monitor\",\"Ad Blockers\",\"cryptocurrency\",\"cryptojacking\",\"cryptomining\",\"javascript\",\"Malware\",\"trojan\"],\"articleSection\":[\"Tech Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/\",\"name\":\"How Someone Can Use Your Mac's Processor for Cryptojacking\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\"},\"datePublished\":\"2018-08-13T21:41:51+00:00\",\"dateModified\":\"2020-01-28T17:12:32+00:00\",\"description\":\"In this Rocket Yard guide, we take a look at cryptocurrency, how it\u2019s mined, and how it may be affecting your Mac.\",\"breadcrumb\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eshop.macsales.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Someone Can Use Your Mac&#8217;s Processing Power with Cryptojacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"name\":\"Rocket Yard\",\"description\":\"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.\",\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\",\"name\":\"OWC\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"contentUrl\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"width\":1024,\"height\":1024,\"caption\":\"OWC\"},\"image\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/647f465acd469444183711d2a22648cb\",\"name\":\"Tom Nelson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb537829ec9582eb81bd2dcf5c7e88d981ed66bd6f65dd36508faf46d38ba5a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb537829ec9582eb81bd2dcf5c7e88d981ed66bd6f65dd36508faf46d38ba5a9?s=96&d=mm&r=g\",\"caption\":\"Tom Nelson\"},\"description\":\"Tom has been an enthusiastic Mac user since the Mac Plus. He\u2019s also been known to dabble in the dark side, otherwise known as Windows, and has a well-deserved reputation for being able to explain almost anything to anybody. Tom\u2019s background includes more than 30 years as an engineer, programmer, network manager, software tester, software reviewer, database designer, and computer network and systems designer. His online experience includes working as a sysop, forum leader, writer, and software library manager.\",\"sameAs\":[\"http:\/\/rocketyard.com\"],\"url\":\"https:\/\/eshop.macsales.com\/blog\/author\/tom-n\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Someone Can Use Your Mac's Processor for Cryptojacking","description":"In this Rocket Yard guide, we take a look at cryptocurrency, how it\u2019s mined, and how it may be affecting your Mac.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/","og_locale":"en_US","og_type":"article","og_title":"How Someone Can Use Your Mac's Processing Power with Cryptojacking","og_description":"In this Rocket Yard guide, we take a look at cryptocurrency, how it\u2019s mined, and how it may be affecting your Mac.","og_url":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/","og_site_name":"Rocket Yard","article_published_time":"2018-08-13T21:41:51+00:00","article_modified_time":"2020-01-28T17:12:32+00:00","og_image":[{"width":284,"height":284,"url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-284x284-1.png","type":"image\/png"}],"author":"Tom Nelson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Nelson","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/#article","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/"},"author":{"name":"Tom Nelson","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/647f465acd469444183711d2a22648cb"},"headline":"How Someone Can Use Your Mac&#8217;s Processing Power with Cryptojacking","datePublished":"2018-08-13T21:41:51+00:00","dateModified":"2020-01-28T17:12:32+00:00","mainEntityOfPage":{"@id":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/"},"wordCount":1792,"commentCount":3,"publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"keywords":["Activity Monitor","Ad Blockers","cryptocurrency","cryptojacking","cryptomining","javascript","Malware","trojan"],"articleSection":["Tech Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/","url":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/","name":"How Someone Can Use Your Mac's Processor for Cryptojacking","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/#website"},"datePublished":"2018-08-13T21:41:51+00:00","dateModified":"2020-01-28T17:12:32+00:00","description":"In this Rocket Yard guide, we take a look at cryptocurrency, how it\u2019s mined, and how it may be affecting your Mac.","breadcrumb":{"@id":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eshop.macsales.com\/blog\/45529-how-someone-can-use-your-macs-processing-power-with-cryptojacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eshop.macsales.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Someone Can Use Your Mac&#8217;s Processing Power with Cryptojacking"}]},{"@type":"WebSite","@id":"https:\/\/eshop.macsales.com\/blog\/#website","url":"https:\/\/eshop.macsales.com\/blog\/","name":"Rocket Yard","description":"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.","publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eshop.macsales.com\/blog\/#organization","name":"OWC","url":"https:\/\/eshop.macsales.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","contentUrl":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","width":1024,"height":1024,"caption":"OWC"},"image":{"@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/647f465acd469444183711d2a22648cb","name":"Tom Nelson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb537829ec9582eb81bd2dcf5c7e88d981ed66bd6f65dd36508faf46d38ba5a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb537829ec9582eb81bd2dcf5c7e88d981ed66bd6f65dd36508faf46d38ba5a9?s=96&d=mm&r=g","caption":"Tom Nelson"},"description":"Tom has been an enthusiastic Mac user since the Mac Plus. He\u2019s also been known to dabble in the dark side, otherwise known as Windows, and has a well-deserved reputation for being able to explain almost anything to anybody. Tom\u2019s background includes more than 30 years as an engineer, programmer, network manager, software tester, software reviewer, database designer, and computer network and systems designer. His online experience includes working as a sysop, forum leader, writer, and software library manager.","sameAs":["http:\/\/rocketyard.com"],"url":"https:\/\/eshop.macsales.com\/blog\/author\/tom-n\/"}]}},"jetpack_featured_media_url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2018\/08\/Activity-Monitor-284x284-1.png","jetpack_shortlink":"https:\/\/wp.me\/pmPaT-bQl","_links":{"self":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/45529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/users\/97"}],"replies":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/comments?post=45529"}],"version-history":[{"count":3,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/45529\/revisions"}],"predecessor-version":[{"id":58193,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/45529\/revisions\/58193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media\/45535"}],"wp:attachment":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media?parent=45529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/categories?post=45529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}