In a hurry? Here’s a quick rundown of the steps for petitioning the FTC about cryptojacking:
- Head over to www.ftc.gov/complaint.
- Scroll down and look for the complaint categories. Select Internet Services, Online Shopping, or Computers.
- On the page that appears click on the third option, Computers.
- Fill in all the applicable information and submit your form.
One of the fastest growing trends in cybercrime is cryptojacking, which involves a malicious website using a script to use your computer’s processor to mine cryptocurrency that the site’s controllers profit from.
It’s sneaky, it can damage hardware, and in many cases you may not even know you’ve been hit with an attack. Not all cryptomining on websites is malicious–some sites will even ask your permission to mine on your hardware in exchange for eliminating advertisements.
When someone does it without telling you that’s a whole other story, and it’s one the US Federal Trade Commission (FTC) is interested in knowing about. “While the scammer cashes out, your device may slow down, burn through battery power, or crash,” The FTC said.
How to to file an FTC cryptojacking complaint
The process for submitting an FTC complaint about cryptojacking can look complicated at first glance, but don’t worry: It’s quite simple.
Head over to www.ftc.gov/complaint. Once there you’ll see a list of categories to choose from. Click on Internet Services, Online Shopping, or Computers (Figure A).
A new screen will appear to the right of the categories menu. Pick the third option, Computers (Figure B).
The FTC Complaint Assistant will open (Figure C), and here’s where things start looking overwhelming. The six steps indicated at the top each contain a lot of information that you may not know, like details about the company whose website you visited. Don’t worry–you only need to fill in the portions that are applicable to you. Look over all six steps to be sure you’re including all relevant details, but if you need to leave something blank it’s okay.
Once you’ve filled everything in and are on step six (Figure D) review your information and click Submit, and you’re all done.
SEE: Quick glossary: Malware (Tech Pro Research)
You may or may not hear back from the FTC, so don’t be surprised if they don’t respond.
In the meantime, protect yourself against cryptojacking by not visiting malicious sites, blocking scripts in your web browser, and watching what you download and install.
- Special report: A winning strategy for cybersecurity (free PDF) (TechRepublic)
- Cryptocurrency-mining malware: Why it is such a menace and where it’s going next (ZDNet)
- New cryptomining malware doesn’t need a browser session to operate (TechRepublic)
- Cryptocurrency mining malware now as lucrative as ransomware for hackers (ZDNet)
- How hackers can mine cryptocurrency in your serverless computing environment (TechRepublic)