CoinMiner: What it is, signs to spot, and how to remove cryptojacking malware

CoinMiner

What it is

CoinMiner is malware that hijacks your computer’s CPU/GPU to mine cryptocurrency for someone else. You get slowdowns, heat, and bigger power bills; they get the coins. See common signs and fixes in our CoinMiner guide

What you may notice

  • Fans roaring and laptop getting hot when you’re idle

  • Apps lagging; games drop frames; battery drains fast

  • Task Manager shows high CPU/GPU from unknown processes

  • Power bill spikes; browser tabs that pin CPU

How it gets in

  • Cracked “free” software and fake updates

  • Phishing attachments or droppers from other malware

  • Rogue browser extensions or scripts that run mining code in tabs

Remove it now (quick steps)

  1. Disconnect from the internet.

  2. Run a full anti-malware scan and reboot.

  3. In Task Scheduler/Startup, remove unknown items; uninstall shady extensions.

  4. Update OS, drivers, and browser; clear browser cache and site data.

Prevent it

  • Install software only from official sources; avoid cracks.

  • Keep OS, browsers, and security tools updated.

  • Use real-time protection and consider blocking known mining scripts.

  • Watch Task Manager: if idle usage isn’t idle, investigate.

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Data Execution Prevention

        What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
      • Malware

        What it is Malware is any software made to harm your device or data. It can steal passwords, lock your files, spy on activity, or hijack your browser. For a quick primer and examples, see our malware explainer. How it spreads Phishing emails and fake ...
      • EDR (Endpoint Detection and Response)

        What it is EDR is your always-on security team for laptops and servers. It watches what’s happening on each device, spots attacks in progress, and helps you respond fast - quarantine, investigate, and clean up. For details on capabilities and use ...
      • Fileless Malware

        What it is Fileless malware runs from memory instead of dropping obvious files on your disk. It often abuses built-in tools (like PowerShell or WMI) and trusted apps, making it harder for traditional antivirus to spot. How it works You visit a ...
      • Crypto Malware (Cryptojacking)

        What it is Cryptojacking is sneaky malware that hijacks your CPU/GPU to mine cryptocurrency for someone else. You pay the price—slowdowns, heat, battery drain—while the attacker collects the coins. What you may notice Fans roaring and the device runs ...