You are on United States + Canada website. Select another region to view location-specific content
United States
English
Select another region
Choose region and language
- Americas
- Asia-Pacific
- Europe, Middle East and Africa
The boom in cryptocurrencies and their promise of easy money led to an explosion of cryptomining tools last year. The good news is that Acronis Active Protection, our machine-intelligence-powered defense, keeps your system from being compromised.
Formerly Acronis Cyber Protect Home Office
Essentials
Local backup and anti-ransomware protection
One-year subscription
€39.99per year
Advanced
Local and cloud backup and security
One-year subscription
€54.99per year
Premium
Up to 5TB of cloud and local backup and security
One-year subscription
€94.99per year
Give the gift of cyber protection
Students save 50% off regular price
Get Acronis True Image for students
(Proof of enrollment required)
Need more details?
Over 5.5 million users rely on Acronis True Image every day
With cryptojacking, online criminals use malware to secretly use the computing resources of your system to mine cryptocurrency — which requires tremendous processing power to calculate exceptionally complex digital equations, called hashes. While the malware does not steal your data, it robs you of considerable system resources, slowing your computer’s performance and significantly increasing your energy use.
Sometimes, cryptocurrency mining malware is injected into your system, piggybacking on apps or running in the background hoping to go unnoticed. Other times, the malware attacks via your web browser when you go to an infected website and runs as long as you are connected to that site.
Cryptomining malware is secretely using people’s devices, like computers, smartphones, tablets and even servers, to perform complex mathematical calculations to mine cryptocurrencies. It is basically stealing computing resources to mine a specific cryptocurrency.
Hackers are mining cryptocurrencies with your computers resources. This can happen after clicking on a malicious link which you received though an email or a malicious website.
Cryptomining demands a lot of processing power, and your CPU will be asked to work overtime. If you want to test a PC for mining malware, open your system’s resource monitor (Task Manager for Windows, Activity Monitor for Macs) to see if the CPU use is unusually high. If you’ve closed all the apps on your system and the CPU is still in overdrive, or if CPU use spikes when you visit a specific website, then you may have a cryptominer at work.
Your device is being used to mine cryptocurrency. You can identify if you are a victim of this cryptomining malware by checking to see if the following is occurring:
• High usage of your computer’s CPU.
• Your device is slower then normal.
• You’re experiencing a slower network.
• Power drains from your battery more quickly.
It automatically protects you against cryptojacking with its built-in anti-malware solution that protects your computer and your personal data from harm.
Yes, as it provides real-time protection against malware and protects your device and
It can be any cryptocurrency; therefore, you need protection to keep your device and your personal data protected.
Sorry, your browser is not supported.
It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.