ℹ️ Skipped - page is already crawled
| Filter | Status | Condition | Details |
|---|---|---|---|
| HTTP status | PASS | download_http_code = 200 | HTTP 200 |
| Age cutoff | PASS | download_stamp > now() - 6 MONTH | 0.1 months ago |
| History drop | PASS | isNull(history_drop_reason) | No drop reason |
| Spam/ban | PASS | fh_dont_index != 1 AND ml_spam_score = 0 | ml_spam_score=0 |
| Canonical | PASS | meta_canonical IS NULL OR = '' OR = src_unparsed | Not set |
| Property | Value |
|---|---|
| URL | https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining |
| Last Crawled | 2026-04-05 05:37:44 (3 days ago) |
| First Indexed | 2020-11-19 09:54:17 (5 years ago) |
| HTTP Status Code | 200 |
| Meta Title | What Is Bitcoin Mining? How to Prevent Bitcoin Scams? | Fortinet |
| Meta Description | Bitcoin mining involves using a computer to solve difficult mathematical equations for the user to earn bitcoin. Learn how bitcoin mining works and its associated risks. |
| Meta Canonical | null |
| Boilerpipe Text | Bitcoin mining, in and of itself, is not harmful and involves using a computer to solve difficult mathematical equations for the user to earn bitcoin. The user earns bitcoin by verifying transactions on the blockchain, which is a digital ledger—similar to a bankbook—that keeps track of all the transactions of a given cryptocurrency. Each time a hash is solved, the user who solves it earns
bitcoin
.
However, to solve the math problems, a computer has to run nonstop, expending a lot of central processing unit (CPU) power. This takes a lot of electricity.
Hackers
have begun hijacking other people’s computers to use them, their resources, and the user’s electricity to mine bitcoin, which the hacker can then cash in on.
Bitcoin mining uses
malware
. Hackers have written malware with the ability to access your computer and use its resources to mine bitcoin and other cryptocurrencies. For the hacker to earn cryptocurrencies, they have to verify transactions on a blockchain. Cryptocurrencies depend on this to maintain solvency.
Each transaction generates an ID labeled with a hash. On the bitcoin blockchain, a hash is a 256-bit encryption, which is essentially a password. Each computer on the network tries to figure out the 256-bit password, and if it gets even one character wrong, the hash is not solved. Other computers work to verify the authenticity of the solutions the “winning” computer came up with. All of this work is rewarded with cryptocurrencies—in this case, bitcoin.
In some cryptocurrency ecosystems, users also get voting rights in the system’s governance structure. This means they get to cast a vote regarding the decisions the development team makes about the future of the currency, its token, and how they will be used.
Although it is not hard for a computer to solve a hash, to do it fast enough so that the problem is solved before other users' computers solve it, the computer has to be fast. But a fast computer is not enough. As the CPU tries to churn out an answer as quickly as possible, it has to fire billions of electrical impulses in a short period of time. To keep the computer from burning up, powerful fans are run constantly. This takes a lot of electricity. This is why hackers come after your computer—to bring it into one of their hijacked bitcoin mining pools.
A hacker installs bitcoin mining malware on hundreds of computers to divide the work among them. All of the computers become bitcoin miners verifying bitcoin transactions. Bitcoin mining calculators have calculated the electric draw of these operations, and they are enough to cause electric bills to spike, CPUs to burn up, and computers to completely fail. |
| Markdown | [Skip to content](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining#CONTENT) [Skip to navigation](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining#HEADER) [Skip to footer](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining#FOOTER)
- [FREE PRODUCT DEMO](https://www.fortinet.com/demo-center)
- SERVICES
- SUPPORT
- [DOWNLOADS](https://www.fortinet.com/support/product-downloads)
- [FORTICLOUD LOGIN](https://support.fortinet.com/app/common/Saml/InitiateSingleSignOn?returnurl=https%3A%2F%2Fwww.fortinet.com%2Fresources%2Fcyberglossary%2Fwhat-is-bitcoin-mining&uid=&sid=&pid=&im=&poid=12)
username
- - [USA (English)](https://www.fortinet.com/)
- [UK & Ireland (English)](https://www.fortinet.com/uk)
- [Germany (Deutsch)](https://www.fortinet.com/de)
- [France (Français)](https://www.fortinet.com/fr)
- [Italy (Italiano)](https://www.fortinet.com/it)
- [Mainland China (简体中文)](https://www.fortinet.com/cn)
- [Taiwan (繁體中文)](https://www.fortinet.com/tw)
- [Korea (한국어)](https://www.fortinet.com/kr)
- [Japan (日本語)](https://www.fortinet.com/jp)
- [Brazil (Portugués)](https://www.fortinet.com/br)
- [Latin America (Español)](https://www.fortinet.com/lat)
[](https://www.fortinet.com/)
- [](https://www.fortinet.com/)
- Products
- The Fortinet Platform
Hybrid Mesh Firewall
- [Next-Generation Firewalls](https://www.fortinet.com/products/next-generation-firewall)
- [AI-Powered Security Services](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/fortigate-security-bundles)
More
Enterprise Networking
- [Secure Ethernet Switches](https://www.fortinet.com/products/ethernet-switches)
- [Secure Wireless LAN](https://www.fortinet.com/products/wireless-access-points)
More
AI Security
- [FortiAI Overview](https://www.fortinet.com/solutions/ai-security)
- [Generative AI and AIOPs](https://www.fortinet.com/products/fortiai-assist)
Operating System
- [FortiOS](https://www.fortinet.com/products/fortigate/fortios)
Unified SASE
- [SASE](https://www.fortinet.com/products/sase)
- [Secure SD-WAN](https://www.fortinet.com/products/sd-wan)
More
Cloud Security
- [Cloud NGFW](https://www.fortinet.com/products/private-cloud-security/fortigate-virtual-appliances)
- [CNAPP](https://www.fortinet.com/products/forticnapp)
More
Security Operations
- [SOC Platform](https://www.fortinet.com/solutions/soc-platform)
- [Unified Endpoint Platform](https://www.fortinet.com/products/fortiendpoint)
More
Operational Technology
- [Modernized OT Security](https://www.fortinet.com/solutions/ot-security)
- [Ruggedized Products](https://www.fortinet.com/products/rugged)
More
[Learn more about GenAI Security »](https://www.fortinet.com/solutions/enterprise-midsize-business/fortiai)
- Network Security
Network Firewall
- [Firewall Appliances](https://www.fortinet.com/products/next-generation-firewall)
- [Cloud Firewalls](https://www.fortinet.com/products/private-cloud-security/fortigate-virtual-appliances)
Services
- [AI-Powered Security Services](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/fortiguard-subscriptions)
- [FortiGate-as-a-Service](https://www.fortinet.com/products/fortigate-as-a-service)
Quantum Security
- [Overview](https://www.fortinet.com/solutions/quantum-security)
- [Quantum Safety](https://www.fortinet.com/resources/hubs/quantum-security)
Operating System
- [FortiOS](https://www.fortinet.com/products/fortigate/fortios)
NOC Management
- [Centralized Management](https://www.fortinet.com/products/management/fortimanager)
- [GenAI for NOC](https://www.fortinet.com/products/fortiai-assist)
- [Firewall Migration Service](https://www.fortinet.com/products/next-generation-firewall/forticonverter)
Latest from Fortinet
[](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-hmf)
[Fortinet Named a Leader in the 2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-hmf)
[Get the Report](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-hmf)
[Learn more about Secure Networking »](https://www.fortinet.com/solutions/network-security)
- Enterprise Networking
LAN
- [Switching](https://www.fortinet.com/products/ethernet-switches)
- [Chassis Switching](https://www.fortinet.com/products/ethernet-switches/chassis)
- [WLAN](https://www.fortinet.com/products/wireless-access-points)
- [High-Density](https://www.fortinet.com/products/wireless-access-points/high-density)
- [NAC](https://www.fortinet.com/products/network-access-control)
NOC Management
- [Cloud-based LAN Management](https://www.fortinet.com/products/fortiedge-cloud)
- [Centralized Management](https://www.fortinet.com/products/management/fortimanager)
- [AIOps](https://www.fortinet.com/products/fortiaiops)
- [GenAI for NOC](https://www.fortinet.com/products/fortiai-assist)
Operating System
- [FortiOS](https://www.fortinet.com/products/fortigate/fortios)
WAN
- [Secure SD-WAN](https://www.fortinet.com/products/sd-wan)
- [5G/LTE Wireless WAN](https://www.fortinet.com/products/extender)
Latest from Fortinet
[](https://www.fortinet.com/resources/analyst-reports/gartner-wired-wireless-lan)
[Fortinet Named a Leader in the 2025 Gartner® Magic Quadrant™ for Enterprise Wired and Wireless LAN Infrastructure](https://www.fortinet.com/resources/analyst-reports/gartner-wired-wireless-lan)
[Get the Report](https://www.fortinet.com/resources/analyst-reports/gartner-wired-wireless-lan)
[Learn more about Secure Networking »](https://www.fortinet.com/solutions/network-security)
- Unified SASE
SASE
- [SASE](https://www.fortinet.com/products/sase)
- [Secure SD-WAN](https://www.fortinet.com/products/sd-wan)
- [Universal ZTNA](https://www.fortinet.com/solutions/enterprise-midsize-business/network-access/application-access)
Services
- [AI-Powered Security Services](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/fortiguard-subscriptions/sase)
Operating System
- [FortiOS](https://www.fortinet.com/products/fortigate/fortios)
NOC Management
- [Centralized Management](https://www.fortinet.com/products/management/fortimanager)
- [GenAI for NOC](https://www.fortinet.com/products/fortiai-assist)
- [DEM](https://www.fortinet.com/products/fortimonitor)
Latest from Fortinet
[](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-sase)
[Fortinet Recognized as a Leader in 2025 Gartner® Magic Quadrant™ for SASE Platforms](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-sase)
[Get the Report](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-sase)
[Learn more about Unified SASE »](https://www.fortinet.com/solutions/unified-sase)
- Cloud Security
Cloud Network Security
- [Cloud Firewalls](https://www.fortinet.com/products/private-cloud-security/fortigate-virtual-appliances)
Web Application / API Protection
- [Unified WAAP Platform](https://www.fortinet.com/products/fortiappsec)
- [WAF](https://www.fortinet.com/products/web-application-firewall/fortiweb)
- [Application Delivery & Server Load Balancing](https://www.fortinet.com/products/application-delivery-controller/fortiadc)
Operating System
- [FortiOS](https://www.fortinet.com/products/fortigate/fortios)
Cloud-Native Protection
- [CNAPP](https://www.fortinet.com/products/forticnapp)
- [Cloud AI Workload Protection](https://www.fortinet.com/products/fortiai-secure)
Cloud Service Providers
- [CSP Overview](https://www.fortinet.com/solutions/cloud-service-providers)
Services
- [Cloud Security Consulting Services](https://www.fortinet.com/resources/security-consulting-services)
Latest from Fortinet
[](https://www.fortinet.com/resources/analyst-reports/kuppingercole-cnapp)
[Fortinet Recognized for Leadership in Three KuppingerCole CNAPP Compass Categories](https://www.fortinet.com/resources/analyst-reports/kuppingercole-cnapp)
[Get the Report](https://www.fortinet.com/resources/analyst-reports/kuppingercole-cnapp)
[Learn more about Cloud Security »](https://www.fortinet.com/solutions/enterprise-midsize-business/secure-cloud-application-journey)
- Security Operations
Security and Risk Management
- [Turnkey SOC](https://www.fortinet.com/products/management/fortianalyzer)
- [SIEM](https://www.fortinet.com/products/siem/fortisiem)
- [SOAR](https://www.fortinet.com/products/fortisoar)
- [SOCaaS](https://www.fortinet.com/products/socaas)
- [GenAI for SOC](https://www.fortinet.com/products/fortiai-assist)
Endpoint
- [Unified Endpoint Platform](https://www.fortinet.com/products/fortiendpoint)
- [Unified Agent](https://www.fortinet.com/products/endpoint-security/forticlient)
- [EDR](https://www.fortinet.com/products/endpoint-security/fortiedr)
Identity
- [FortiAuthenticator](https://www.fortinet.com/products/identity-access-management/fortiauthenticator)
- [FortiIdentity Cloud](https://www.fortinet.com/products/identity-access-management/fortiidentity-cloud)
- [FortiToken](https://www.fortinet.com/products/identity-access-management/fortitoken)
- [FortiPAM](https://www.fortinet.com/products/fortipam)
Data Protection
- [Data Loss Prevention](https://www.fortinet.com/products/fortidlp)
Network Detection
- [NDR](https://www.fortinet.com/products/network-detection-and-response)
- [Deception Technology](https://www.fortinet.com/products/fortideceptor)
- [Sandbox](https://www.fortinet.com/products/fortisandbox)
Continuous Threat Exposure Management
- [Threat Exposure Management](https://www.fortinet.com/products/fortirecon)
Email and Workspace Security
- [Email Security](https://www.fortinet.com/products/email-security)
- [Workspace Security](https://www.fortinet.com/products/fortimail-workspace-security)
Services
- [Incident Response](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/respond)
Operating System
- [FortiOS](https://www.fortinet.com/products/fortigate/fortios)
Latest from Fortinet
[](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-siem)
[Fortinet named a Challenger in the 2025 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM)](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-siem)
[Get the Report](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-siem)
[Learn more about Security Operations »](https://www.fortinet.com/solutions/security-operations)
- Operational Technology
Overview
- [Secure Operational Technology](https://www.fortinet.com/solutions/ot-security)
Secure Networking
- [Ruggedized Products](https://www.fortinet.com/products/rugged)
- [OT Security Service](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/industrial-security)
Zero Trust
- [NAC for OT](https://www.fortinet.com/products/network-access-control)
Security Operations for OT
- [SOC Analytics](https://www.fortinet.com/products/management/fortianalyzer)
- [NDR](https://www.fortinet.com/solutions/ot-security/fortindr)
Eco-system
- [OT Tech Alliance](https://www.fortinet.com/partners/partnerships/alliance-partners?p_function=Operational%20Technology)
Latest from Fortinet
[](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
[Fortinet Named a Challenger in the 2026 Gartner® Magic Quadrant™ for Cyber-Physical Systems Protection Platforms](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
[Get the Report](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
[Learn more about the Fortinet Security Fabric »](https://www.fortinet.com/solutions/enterprise-midsize-business/security-fabric)
- FortiGuard AI Services
AI-Powered Subscriptions
- [FortiGuard Services Portfolio](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/fortiguard-subscriptions)
- [FortiGuard Services Bundles](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/fortigate-security-bundles)
SaaS, Data & Zero-day Protection
- [Data Loss Prevention](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/data-loss-prevention)
- [Inline Malware Prevention](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/inline-malware-prevention)
- [CASB](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/casb)
Compliance & Governance
- [Attack Surface Security Service](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/security-rating)
Web/DNS Security
- [URL Filtering](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/web-filtering)
- [DNS Filtering](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/dns-security)
Network & File Security
- [Intrusion Prevention Service](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/intrusion-prevention)
- [Antivirus](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/antivirus)
OT Security
- [OT Security Service](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/industrial-security)
Latest From Fortinet
[](https://www.fortinet.com/resources/reports/threat-landscape-report)
[FortiGuard Labs' latest report reveals how AI, automation & the dark web are fueling faster, smarter cyberattacks—and how to fight back.](https://www.fortinet.com/resources/reports/threat-landscape-report)
[Download the Report](https://www.fortinet.com/resources/reports/threat-landscape-report)
- [View All Products](https://www.fortinet.com/products)
- Solutions
- Enterprise
Network Security
Network Modernization
- [Overview](https://www.fortinet.com/solutions/network-security)
- [Simplify Operations](https://www.fortinet.com/solutions/enterprise-midsize-business/simplify-operations)
- [Hybrid Mesh Firewall](https://www.fortinet.com/solutions/hybrid-mesh-firewall)
- [Data Center Firewall](https://www.fortinet.com/solutions/data-center-firewall)
- [Quantum Security](https://www.fortinet.com/solutions/quantum-security)
Generative AI Security
Secure AI Transformation
- [Overview](https://www.fortinet.com/solutions/ai-security)
- [Protect from AI Threats](https://www.fortinet.com/products/fortiai-protect)
- [Automate SOC and NOC](https://www.fortinet.com/products/fortiai-assist)
- [Secure AI Infrastructure](https://www.fortinet.com/products/fortiai-secure)
Unified SASE
Secure Access Everywhere
- [Overview](https://www.fortinet.com/solutions/unified-sase)
- [Secure Hybrid Workforce](https://www.fortinet.com/solutions/enterprise-midsize-business/secure-hybrid-workforce)
- [Optimizing Digital Experience](https://www.fortinet.com/solutions/enterprise-midsize-business/optimize-digital-experience)
- [Zero Trust Journey](https://www.fortinet.com/solutions/enterprise-midsize-business/zero-trust-journey)
Code-to-Cloud Journey
- [Overview](https://www.fortinet.com/solutions/enterprise-midsize-business/secure-cloud-application-journey)
- [Cloud-Native App Protection Platform](https://www.fortinet.com/products/forticnapp)
- [Application Security](https://www.fortinet.com/products/fortiappsec)
Security Operations
Security Transformation
- [Overview](https://www.fortinet.com/solutions/security-operations)
- [SOC Platform](https://www.fortinet.com/solutions/soc-platform)
- [Attack Surface Management](https://www.fortinet.com/solutions/enterprise-midsize-business/attack-surface-management)
- [Network Detection](https://www.fortinet.com/solutions/network-detection)
- [Workspace Security](https://www.fortinet.com/solutions/workspace-security)
- Small & Midsize Business
Overview
- [Small & Midsize Business](https://www.fortinet.com/solutions/small-business)
Use Cases
- [Secure Users](https://www.fortinet.com/solutions/small-business/secure-users)
- [Secure Offices](https://www.fortinet.com/solutions/small-business/network-security)
- [Secure Applications](https://www.fortinet.com/solutions/small-business/secure-applications)
Products
- [Next-Generation Firewall](https://www.fortinet.com/solutions/small-business/firewall)
- [Virtual Next-Generation Firewall](https://www.fortinet.com/products/smallbusiness/virtual-firewall)
- [Switching](https://www.fortinet.com/products/smallbusiness/secure-switching)
- [Wireless LAN (WLAN)](https://www.fortinet.com/solutions/small-business/wireless)
- [Management & Reporting](https://www.fortinet.com/products/smallbusiness/fortigate-cloud)
- [Secure Access Service Edge (SASE)](https://www.fortinet.com/products/smallbusiness/sase)
- [Cloud-Native NGFW Firewall](https://www.fortinet.com/products/public-cloud-security/cloud-native-firewall)
Services
- [FortiGuard Security Portfolio](https://www.fortinet.com/solutions/small-business/fortiguard-services)
- [FortiConverter](https://www.fortinet.com/products/next-generation-firewall/forticonverter)
- [FortiCare Support Services](https://www.fortinet.com/support)
- [Security Awareness Training](https://www.fortinet.com/training/security-awareness-training)
- [Cyber Threat Assessment](https://www.fortinet.com/assess)
- [Cloud Consulting Services](https://www.fortinet.com/resources/security-consulting-services)
Expert Services
- [SOC-as-a-Service (SOCaaS)](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/socaas)
- [Managed FortiGate Service](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/managed-fortigate-service)
- [Overlay-as-a-Service (OaaS)](https://www.fortinet.com/products/sd-wan#networking-services)
- [FortiGate-as-a-Service (FGaaS)](https://www.fortinet.com/products/fortigate-as-a-service)
Latest From Fortinet
[](https://www.fortinet.com/resources/reports/threat-landscape-report)
[2025 Global Threat Landscape Report](https://www.fortinet.com/resources/reports/threat-landscape-report)
FortiGuard Labs' latest report reveals how AI, automation & the dark web are fueling faster, smarter cyberattacks—and how to fight back.
[Download the Report](https://www.fortinet.com/resources/reports/threat-landscape-report)
- Operational Technology
Overview
- [Secure Operational Technology](https://www.fortinet.com/solutions/ot-security)
Secure Networking
- [Ruggedized Products](https://www.fortinet.com/products/rugged)
- [OT Security Service](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/industrial-security)
Zero Trust
- [NAC for OT](https://www.fortinet.com/products/network-access-control)
Security Operations for OT
- [SOC Analytics](https://www.fortinet.com/products/management/fortianalyzer)
- [NDR](https://www.fortinet.com/solutions/ot-security/fortindr)
Eco-system
- [OT Tech Alliance](https://www.fortinet.com/partners/partnerships/alliance-partners?p_function=Operational%20Technology)
Latest from Fortinet
[](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
[Fortinet Named a Challenger in the 2026 Gartner® Magic Quadrant™ for Cyber-Physical Systems Protection Platforms](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
[Get the Report](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
[Learn more about the Fortinet Security Fabric »](https://www.fortinet.com/solutions/enterprise-midsize-business/security-fabric)
- Industries
IT/OT
- [Operational Technology](https://www.fortinet.com/solutions/ot-security)
- [Manufacturing](https://www.fortinet.com/solutions/industries/manufacturing)
- [SCADA/ICS](https://www.fortinet.com/solutions/industries/scada-industrial-control-systems)
- [Oil & Gas](https://www.fortinet.com/solutions/industries/oil-gas)
- [Power Utilities](https://www.fortinet.com/solutions/industries/power-utilities)
Health and Medical
- [Healthcare](https://www.fortinet.com/solutions/industries/healthcare)
- [Pharmaceutical](https://www.fortinet.com/solutions/industries/pharma)
Education
- [Higher Education](https://www.fortinet.com/solutions/industries/higher-ed)
- [K–12 School Districts](https://www.fortinet.com/solutions/industries/education/k12)
Consumer
- [Financial Services](https://www.fortinet.com/solutions/industries/financial-services)
- [Retail](https://www.fortinet.com/solutions/industries/retail)
- [Hospitality](https://www.fortinet.com/solutions/industries/hospitality)
All Industries
- [View All](https://www.fortinet.com/solutions/industries)
Latest From Fortinet
[](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
[Fortinet Named a Challenger in the 2026 Gartner® Magic Quadrant™ for Cyber-Physical Systems Protection Platforms](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
[Get the Report](https://www.fortinet.com/resources/analyst-reports/gartner-magic-quadrant-cps)
- Service Providers
- Cloud Service Providers
Providers
- [Overview](https://www.fortinet.com/solutions/cloud-service-providers)
- [AWS](https://www.fortinet.com/products/public-cloud-security/aws)
- [Microsoft Azure](https://www.fortinet.com/products/public-cloud-security/azure)
- [Google](https://www.fortinet.com/products/public-cloud-security/gcp)
- [Oracle](https://www.fortinet.com/products/public-cloud-security/OracleCloud)
Case Studies
- [Diversified Energy](https://www.fortinet.com/customers/diversified-energy)
- [Coop](https://www.fortinet.com/customers/coop)
- [Mutual Ser EPS](https://www.fortinet.com/customers/mutual-ser)
- Managed Services
Solutions
- [MSSP Cybersecurity](https://www.fortinet.com/solutions/service-provider/communications-service-provider/mssp)
- [Managed SD-WAN for Service Providers](https://www.fortinet.com/solutions/service-provider/managed-secure-sd-wan-service-with-fortinet)
- [Managed SOC Service](https://www.fortinet.com/solutions/service-provider/communications-service-provider/mssp?tab=use-case-2)
- [Managed Cloud Security Service](https://www.fortinet.com/solutions/service-provider/communications-service-provider/mssp?tab=use-case-3)
- [Managed WAF Service](https://www.fortinet.com/solutions/service-provider/communications-service-provider/mssp?tab=use-case-4)
Case Studies
- [Orange Business Services](https://www.fortinet.com/customers/orange-business-services)
- [GTT Communications](https://www.fortinet.com/customers/gtt-communications)
- [Spark NZ](https://www.fortinet.com/customers/spark-nz)
- [View All](https://www.fortinet.com/customers?limit=15®ion=&industry=service-provider&solutions=)
- Mobile Provider
Overview
- [Cybersecurity for Mobile Networks and Ecosystems](https://www.fortinet.com/solutions/mobile-carrier/cybersecurity-for-mobile-networks-and-ecosystems)
Latest From Fortinet
[](https://global.fortinet.com/emea-lp-en-service-provider-energy-paper)
[Energy- and Space-Efficient Security in Telco Networks](https://global.fortinet.com/emea-lp-en-service-provider-energy-paper)
Secure your infrastructure while reducing energy costs and overall environmental impact
[Download the White Paper](https://global.fortinet.com/emea-lp-en-service-provider-energy-paper)
- Support
- FortiCare Support
Technical Support
- [Contact FortiCare Customer Support](https://www.fortinet.com/support/contact)
- [New to Fortinet? Get Started](https://www.fortinet.com/welcome)
Support Services
- [Customer Support & RMA](https://www.fortinet.com/support)
- [Advanced Support](https://www.fortinet.com/support/advanced-support)
Resources
- [Experienced a Breach?](https://www.fortinet.com/corporate/about-us/contact-us/experienced-a-breach)
- [Documents Library](https://docs.fortinet.com/)
- [Fortinet Community](https://community.fortinet.com/?pageNum=1)
Latest From Fortinet
[](https://www.fortinet.com/resources/reports/threat-landscape-report)
[2025 Global Threat Landscape Report](https://www.fortinet.com/resources/reports/threat-landscape-report)
FortiGuard Labs' latest report reveals how AI, automation & the dark web are fueling faster, smarter cyberattacks—and how to fight back.
[Download the Report](https://www.fortinet.com/resources/reports/threat-landscape-report)
- FortiCare Professional Services
Services
- [Professional Services](https://www.fortinet.com/support/support-services/professional-services)
- [Cloud Consulting Services](https://www.fortinet.com/resources/security-consulting-services)
Latest From Fortinet
[](https://www.fortinet.com/resources/reports/threat-landscape-report)
[2025 Global Threat Landscape Report](https://www.fortinet.com/resources/reports/threat-landscape-report)
FortiGuard Labs' latest report reveals how AI, automation & the dark web are fueling faster, smarter cyberattacks—and how to fight back.
[Download the Report](https://www.fortinet.com/resources/reports/threat-landscape-report)
- Fortinet Services and Training
Expert Services
- [Incident Response](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/respond)
- [Managed Detection & Response (MDR)](https://www.fortinet.com/solutions/enterprise-midsize-business/mdr)
- [Ransomware Advisory Services](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/ransomware-advisory)
- [Security Advisory Services](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/security-advisory)
- [SOC-as-a-Service (SOCaaS)](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/socaas)
- [Managed FortiGate Service](https://www.fortinet.com/solutions/enterprise-midsize-business/security-as-a-service/managed-fortigate-service)
- [FortiGate-as-a-Service (FGaaS)](https://www.fortinet.com/products/fortigate-as-a-service)
Employee Training
- [Free Training & On-demand Labs](https://www.fortinet.com/training/cybersecurity-professionals)
- [Security Awareness Training](https://www.fortinet.com/training/infosec-awareness)
- [Phishing Simulation](https://www.fortinet.com/products/phishing-simulation)
Latest From Fortinet
[](https://www.fortinet.com/resources/reports/threat-landscape-report)
[FortiGuard Labs' latest report reveals how AI, automation & the dark web are fueling faster, smarter cyberattacks—and how to fight back.](https://www.fortinet.com/resources/reports/threat-landscape-report)
[Download the Report](https://www.fortinet.com/resources/reports/threat-landscape-report)
- Partners
- For Partners
Partner Portal
- [Log In](https://www.fortinet.com/partners/partner-program/partner-login)
Resources
- [Partner Case Studies](https://www.fortinet.com/partners/case-studies?industry=service-provider)
Partner Programs
- [Technology Partners](https://www.fortinet.com/partners/partnerships/alliance-partners)
- [Resale Partners](https://www.fortinet.com/partners/partner-program/become-a-fortinet-partner)
- [Global System Integrators](https://www.fortinet.com/partners/global-system-integrators)
- [Managed Services](https://www.fortinet.com/solutions/service-provider/communications-service-provider/mssp)
- [Mobile Provider](https://www.fortinet.com/solutions/mobile-carrier)
2026 AI Cybersecurity Summit
[](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
[The New Security Reality Shaped by AI](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
This Summit brings together leading experts to show how to secure AI at enterprise scale while accelerating innovation with confidence.
[Register Now](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
- Become a Partner
Join our Ecosystem
- [Become a Technology Partner](https://www.fortinet.com/partners/technology-alliances/join-the-ecosystem)
- [Become a Channel Partner](https://www.fortinet.com/partners/partner-program/become-a-fortinet-partner)
2026 AI Cybersecurity Summit
[](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
[The New Security Reality Shaped by AI](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
This Summit brings together leading experts to show how to secure AI at enterprise scale while accelerating innovation with confidence.
[Register Now](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
- Find a Partner
Partner Portal
- [Log In](https://www.fortinet.com/partners/partner-program/partner-login)
Partner Programs
- [Technology Partner Directory](https://www.fortinet.com/partners/partnerships/alliance-partners)
- [Channel Partner Directory](https://www.fortinet.com/partners/partner-locator)
2026 AI Cybersecurity Summit
[](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
[The New Security Reality Shaped by AI](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
This Summit brings together leading experts to show how to secure AI at enterprise scale while accelerating innovation with confidence.
[Register Now](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
- Company
- Company
Fortinet
- [About Us](https://www.fortinet.com/corporate/about-us/about-us)
- [Executive Management](https://www.fortinet.com/corporate/about-us/executive-management)
- [Investor Relations](https://investor.fortinet.com/)
- [Executive Briefing Center](https://www.fortinet.com/corporate/ebc)
- [Newsroom](https://www.fortinet.com/corporate/about-us/newsroom)
- [Blogs](https://www.fortinet.com/blog)
- [Social Responsibility](https://www.fortinet.com/corporate/about-us/corporate-social-responsibility)
Life at Fortinet
- [Careers](https://www.fortinet.com/corporate/careers)
- [Early Talent Programs](https://www.fortinet.com/corporate/careers/early-talent-program)
Connect With Us
- [Fortinet Community](https://community.fortinet.com/?pageNum=1)
- [Email Preference Center](https://global.fortinet.com/PreferenceCenter)
Trust
- [Fortinet Trust Center](https://www.fortinet.com/trust)
- [Security Certifications](https://trust.fortinet.com/)
- [Product Certifications](https://www.fortinet.com/corporate/about-us/product-certifications)
- [Fortinet Federal, Inc.](https://www.fortinetfederal.com/)
- [Analyst Reports](https://www.fortinet.com/solutions/analyst-reports)
Advisory Councils
- [Veterans Program Advisory Council](https://www.fortinet.com/training/veterans-program/advisory-council)
Resources
- [Customer Stories](https://www.fortinet.com/customers)
- [Resource Center](https://www.fortinet.com/resources)
- [Ransomware Hub](https://www.fortinet.com/ransomware-hub)
- [Fortinet TV](https://fortinet-tv.com/)
- [Cyber Glossary](https://www.fortinet.com/resources/cyberglossary)
- [Fortinet Icon Library](https://icons.fortinet.com/)
- [Fortinet Video Library](https://video.fortinet.com/)
- [Ordering Guides](https://www.fortinet.com/resources/ordering-guides?document_type=ordering-guide&q=ordering%20guide)
- [Fortinet Contracts & Grants](https://www.fortinet.com/resources/sled-contracts-grants)
Events & Webinars
- [Accelerate 2026](https://www.fortinetaccelerate.com/lasvegas_26/)
- [Events](https://www.fortinet.com/corporate/about-us/events?typ=Events)
- [Webinars](https://www.fortinet.com/corporate/about-us/events?typ=Webinars)
- [On-Demand Webinars](https://www.fortinet.com/corporate/about-us/events?typ=On-Demand)
[Get the latest Corporate Brochure »](https://www.fortinet.com/content/dam/fortinet/assets/brochures/FortinetBroch.pdf)
- Training
Overview
- [Training Institute](https://www.fortinet.com/nse-training)
- [Certification Program](https://www.fortinet.com/training-certification)
- [Free Training & On-demand Labs](https://www.fortinet.com/training/cybersecurity-professionals)
- [Authorized Training Centers](https://www.fortinet.com/support/training/learning-center)
Platform
- [Training Institute Portal](https://training.fortinet.com/auth/saml2/selectidp.php)
Programs and Workshops
- [Academic Partner Program](https://www.fortinet.com/training/academic-partner-program)
- [Education Outreach Program](https://www.fortinet.com/training/education-outreach-program)
- [Veterans Program](https://www.fortinet.com/training/veterans-program)
- [Fast Track Workshops](https://www.fortinet.com/training/fast-track)
Security Awareness Service
- [For Enterprise and SMBs](https://www.fortinet.com/training/security-awareness-training)
- [For All Schools](https://www.fortinet.com/training/security-awareness-training/education-edition)
- [For United States Schools](https://www.fortinet.com/training/security-awareness-training/k12us)
- [For United Kingdom Schools](https://www.fortinet.com/training/security-awareness-training/education-edition-uk)
- [For Australian Schools](https://www.fortinet.com/training/security-awareness-training/education-edition-australia)
- [For Canadian Schools](https://www.fortinet.com/training/security-awareness-training/education-edition-canada)
- [For Saudi Arabian Schools](https://www.fortinet.com/training/security-awareness-training/education-edition-saudi-arabia)
Latest From Fortinet
[](https://www.fortinet.com/blog/industry-trends/2025-security-awareness-report-why-training-works-and-where-organizations-still-fall-short)
[2025 Security Awareness and Training Global Research Report](https://www.fortinet.com/blog/industry-trends/2025-security-awareness-report-why-training-works-and-where-organizations-still-fall-short)
67% of organizations report fewer incidents with security awareness training. Benchmark your program with global insights and practical next steps.
[Read the Blog](https://www.fortinet.com/blog/industry-trends/2025-security-awareness-report-why-training-works-and-where-organizations-still-fall-short)
- Contact Us
- Contact Sales
SALES
- [Connect with a Security Expert](https://www.fortinet.com/corporate/about-us/contact-us#contact-sales)
- [Request a Quote](https://www.fortinet.com/corporate/about-us/request-a-quote)
- [Schedule a Meeting](https://www.fortinet.com/security-expert-ws?lsci=701Hr000002RxKgIAK)
INCIDENT RESPONSE
- [Experienced a Breach?](https://www.fortinet.com/corporate/about-us/contact-us/experienced-a-breach)
- [Assess Your Networks for Cyber Threats](https://www.fortinet.com/assess)
2026 AI Cybersecurity Summit
[](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
[The New Security Reality Shaped by AI](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
This Summit brings together leading experts to show how to secure AI at enterprise scale while accelerating innovation with confidence.
[Register Now](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
- Find a Reseller
FIND A RESELLER
- [North America](https://www.fortinet.com/partners/partner-program/find-a-partner/north-america-partner-locator)
- [EMEA](https://www.fortinet.com/partners/partner-program/find-a-partner/emeapartners)
- [Latin America & Caribbean](https://www.fortinet.com/partners/partner-program/find-a-partner/latin-america-partner)
- [APAC, Australia & New Zealand](https://www.fortinet.com/partners/partner-program/find-a-partner/apacpartners)
2026 AI Cybersecurity Summit
[](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
[The New Security Reality Shaped by AI](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
This Summit brings together leading experts to show how to secure AI at enterprise scale while accelerating innovation with confidence.
[Register Now](https://www.fortinet.com/corporate/about-us/events/events/ai-summit)
- Support
SUPPORT
- [Contact FortiCare Customer Support](https://www.fortinet.com/support/contact)
- [Fortinet Community: Support Forum](https://community.fortinet.com/t5/Support-Forum/bd-p/fortinet-discussion)
Latest from Fortinet
[](https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2025/fortinet-annual-report-indicates-ai-skillsets-critical-to-cybersecurity-skills-gap-solution)
[2025 Cybersecurity Skills Gap Global Research Report](https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2025/fortinet-annual-report-indicates-ai-skillsets-critical-to-cybersecurity-skills-gap-solution)
87% see AI enhancing cyber roles—but without upskilling, skill gaps and AI-driven threats put orgs at greater risk.
[Read the Press Release](https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2025/fortinet-annual-report-indicates-ai-skillsets-critical-to-cybersecurity-skills-gap-solution)
[FortiGuard Labs Threat Intelligence](https://www.fortinet.com/fortiguard/labs)
[CyberGlossary](https://www.fortinet.com/resources/cyberglossary) › [Cybersecurity](https://www.fortinet.com/topics/cybersecurity) › What Is Bitcoin Mining? How to Prevent Bitcoin Scams?
# What Is Bitcoin Mining? How to Prevent Bitcoin Scams?
Learn how bitcoin mining works and its associated risks.
[2025 THREAT LANDSCAPE REPORT](https://www.fortinet.com/resources/reports/threat-landscape-report?utm_content=cg-cybersecurity-cta)
[](https://www.fortinet.com/)
[Bitcoin Mining Definition](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
[Bitcoin Mining Security Risks](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
[Securing Devices](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
[FAQs](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
[](https://www.fortinet.com/)
Bitcoin Mining Definition
Bitcoin Mining Definition
Bitcoin Mining Security Risks
Securing Devices
FAQs
## Bitcoin Mining Meaning
Bitcoin mining, in and of itself, is not harmful and involves using a computer to solve difficult mathematical equations for the user to earn bitcoin. The user earns bitcoin by verifying transactions on the blockchain, which is a digital ledger—similar to a bankbook—that keeps track of all the transactions of a given cryptocurrency. Each time a hash is solved, the user who solves it earns [bitcoin](https://www.fortinet.com/content/dam/fortinet/assets/solution-guides/sb-protecting-nextgen-911-systems.pdf).
However, to solve the math problems, a computer has to run nonstop, expending a lot of central processing unit (CPU) power. This takes a lot of electricity. [Hackers](https://www.fortinet.com/resources/cyberglossary/what-is-hacking) have begun hijacking other people’s computers to use them, their resources, and the user’s electricity to mine bitcoin, which the hacker can then cash in on.
## How Does Bitcoin Mining Work?
Bitcoin mining uses [malware](https://www.fortinet.com/resources/cyberglossary/malware). Hackers have written malware with the ability to access your computer and use its resources to mine bitcoin and other cryptocurrencies. For the hacker to earn cryptocurrencies, they have to verify transactions on a blockchain. Cryptocurrencies depend on this to maintain solvency.
Each transaction generates an ID labeled with a hash. On the bitcoin blockchain, a hash is a 256-bit encryption, which is essentially a password. Each computer on the network tries to figure out the 256-bit password, and if it gets even one character wrong, the hash is not solved. Other computers work to verify the authenticity of the solutions the “winning” computer came up with. All of this work is rewarded with cryptocurrencies—in this case, bitcoin.
In some cryptocurrency ecosystems, users also get voting rights in the system’s governance structure. This means they get to cast a vote regarding the decisions the development team makes about the future of the currency, its token, and how they will be used.
Although it is not hard for a computer to solve a hash, to do it fast enough so that the problem is solved before other users' computers solve it, the computer has to be fast. But a fast computer is not enough. As the CPU tries to churn out an answer as quickly as possible, it has to fire billions of electrical impulses in a short period of time. To keep the computer from burning up, powerful fans are run constantly. This takes a lot of electricity. This is why hackers come after your computer—to bring it into one of their hijacked bitcoin mining pools.
A hacker installs bitcoin mining malware on hundreds of computers to divide the work among them. All of the computers become bitcoin miners verifying bitcoin transactions. Bitcoin mining calculators have calculated the electric draw of these operations, and they are enough to cause electric bills to spike, CPUs to burn up, and computers to completely fail.
[ 2025 Global Threat Landscape Report Use this report to understand the latest attacker tactics, assess your exposure, and prioritize action before the next exploit hits your environment. Download Now](https://www.fortinet.com/resources/reports/threat-landscape-report?utm_content=cg-cybersecurity-ribbon)
## What Are The Bitcoin Mining Risks/Security Risks?
If your computer is hacked and bitcoin mining malware is installed, your computer may be destroyed and your electricity bill may skyrocket.
Because bitcoin transactions require so much computing power to verify, the hardware for bitcoin mining has to be cooled constantly by special fans. Your average cell phone, desktop, or laptop computer does not have the cooling capabilities to keep the CPU from overheating. As a result, when a computer is hijacked for cryptocurrency mining, it often overheats and burns up.
Also, 100% of your device’s computing power may be used for mining. This can bring your computer’s operation to a halt when it comes to business-critical computations. Bitcoin mining software is designed to consume huge portions of a computer’s processing power, leaving little to no room for even relatively low-demand tasks.
In addition, your computer could be used as a launching point to spread the malware to other computers that connect to your network. This could erode the trust you have with customers, business partners, and others who depend on you to deliver services and communications safely. However, there are also specific types of scams that hackers use, and each of these can be a threat to users on your network.
### Wallet scams
Bitcoins are held in bitcoin wallets. With a wallet scam, fake wallets are set up online, and scammers will request that you either give them money upfront or they will provide you with a bitcoin address that ends up putting your funds in their wallet, not yours. There are also fake hardware wallets with built-in vulnerabilities that make it easy for scammers to get in and steal your bitcoins.
### Mining scams
Some companies pretend to provide mining services using a bitcoin mining cloud. They take your money but never mine any bitcoin for you. People often fall for the scam because they want to get their hands on the bitcoin cryptocurrency, and while there are legitimate services out there, some are fraudulent.
### Exchange scams
When you trade bitcoin, especially for another digital currency, you may use an exchange. Each transaction requires a fee. Scam exchanges may lure in unsuspecting bitcoin holders with very low fees. But they then steal your money by using the wallet ID and password you provide.
[](https://www.fortinet.com/content/dam/fortinet/images/cyberglossary/bitcoin-mining.png) 3 Risks of Bitcoin Mining Security
## How To Secure Your Devices From The Risks?
If you fail to secure your devices against these kinds of attacks, your device, as well as others connected to the networks it uses, can become infected and suffer from failure. The CPU may get too hot, and the device could literally melt or burn up. In addition, the vast majority—as much as 100%—of the device’s computing power can be hijacked. This could make it useless for the user, stopping business and creating a time-consuming task for the IT team charged with eradicating the threat.
### Avoid public Wi-Fi networks
[Public Wi-Fi](https://www.fortinet.com/resources/cyberglossary/vpn-wifi) networks are a popular target for those who want to mine cryptocurrency on the bitcoin blockchain using other people’s devices. Because the connections are not secure, it is relatively easy for a hacker to gain access to a user’s computer and install malware in a public network. Avoid connecting to the internet using a publicly provided connection like in a café or store.
### Use a VPN
A [virtual private network (VPN)](https://www.fortinet.com/resources/cyberglossary/what-is-a-vpn) can offer adequate protection against [cryptojackers](https://www.fortinet.com/resources/cyberglossary/cryptojacking). With a VPN, you can access a network that is separate from other users. In this way, only you and other people with a username and password can gain access. Also, traffic on a VPN is encrypted, making it far harder to hack than traditional network activity. This can prevent cryptojacking on your device.
### Secure your devices
To secure your devices, the following measures should be implemented:
1. **Antivirus protection**: [Antivirus protection](https://www.fortinet.com/support/support-services/fortiguard-security-subscriptions/antivirus) programs filter threats, like mining [botnet](https://www.fortinet.com/resources/cyberglossary/what-is-botnet) infections, and keep them from attacking your devices. They can also quarantine and eliminate threats that have already penetrated your device, freeing your computer from their effects.
2. **Use a personal VPN**: On each device you use, you can access the internet with your own personal [VPN](https://www.fortinet.com/resources/cyberglossary/what-is-a-vpn). This keeps your internet use private and secure.
3. **Use a firewall**: If your internet activity happens behind the protection of a [firewall](https://www.fortinet.com/resources/cyberglossary/firewall), threats like those stemming from bitcoin cryptomining hacks can be kept out. Also, because the firewall can monitor the data leaving your computer, it can prevent your device from being used to hack into others.
## Bitcoin Mining FAQs
### How long does it take to mine 1 Bitcoin?
The user earns bitcoin by verifying transactions on the blockchain, which is a digital ledger—similar to a bankbook—that keeps track of all the transactions of a given cryptocurrency. Each time a hash is solved, the user who solves it earns bitcoin.
### Is Bitcoin mining safe for my computer?
Bitcoin mining uses malware. Hackers have written malware with the ability to access your computer and use its resources to mine bitcoin and other cryptocurrencies. For the hacker to earn cryptocurrencies, they have to verify transactions on a blockchain.
### Can Bitcoin miners be hacked?
Yes, a hacker installs bitcoin mining malware on hundreds of computers to divide the work among them.
## Cybersecurity Resources
- [What is Cybersecurity?](https://www.fortinet.com/resources/cyberglossary/what-is-cybersecurity)
- [Cyber Threat Intelligence](https://www.fortinet.com/resources/cyberglossary/cyber-threat-intelligence)
- [What is a Cyber Attack?](https://www.fortinet.com/resources/cyberglossary/what-is-cyber-attack)
- [Types of Cyber Attacks](https://www.fortinet.com/resources/cyberglossary/types-of-cyber-attacks)
- [Cybersecurity Management](https://www.fortinet.com/resources/cyberglossary/cybersecurity-management)
- [IT vs OT Cybersecurity](https://www.fortinet.com/resources/cyberglossary/it-vs-ot-cybersecurity)
- [Recent Cyber Attacks](https://www.fortinet.com/resources/cyberglossary/recent-cyber-attacks)
- [Cyber Extortion](https://www.fortinet.com/resources/cyberglossary/cyber-extortion)
- [Cyber Warfare](https://www.fortinet.com/resources/cyberglossary/cyber-warfare)
- [Cybersecurity Analytics](https://www.fortinet.com/resources/cyberglossary/cybersecurity-analytics)
- [Cybersecurity Management](https://www.fortinet.com/resources/cyberglossary/cybersecurity-management)
- [What is Cyber Safety?](https://www.fortinet.com/resources/cyberglossary/cyber-safety)
- [Cybersecurity Statistics](https://www.fortinet.com/resources/cyberglossary/cybersecurity-statistics)
- [Cybersecurity Mesh](https://www.fortinet.com/resources/cyberglossary/what-is-cybersecurity-mesh)
- [AI Cybersecurity](https://www.fortinet.com/resources/cyberglossary/artificial-intelligence-in-cybersecurity)
- [What is Cyber Insurance?](https://www.fortinet.com/resources/cyberglossary/cyber-insurance)
***
### Quick Links
- [Fortinet Products](https://www.fortinet.com/products?utm_content=cg-cyber-ql)
- [Fortinet Demos](https://www.fortinet.com/demo-center?utm_content=cg-cyber-ql#demos)
- [Analyst Reports](https://www.fortinet.com/solutions/analyst-reports?utm_content=cg-cyber-ql)
- [FortiGuard Threat Intelligence](https://www.fortiguard.com/?utm_source=cyberglossary&utm_campaign=quicklinks)
- [Contact Us](https://www.fortinet.com/corporate/about-us/contact-us?utm_content=cg-cyber-ql#contact-sales)
## Speak with an Expert
Please fill out the form and a knowledgeable representative will get in touch with you soon.
Not you? [Click here.](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
Products
### Enterprise
- [Secure Networking](https://www.fortinet.com/solutions/network-security)
- [User and Device Security](https://www.fortinet.com/solutions/enterprise-midsize-business/user-device-security)
- [Security Operations](https://www.fortinet.com/solutions/security-operations)
- [Application Security](https://www.fortinet.com/solutions/enterprise-midsize-business/cloud-security)
- [FortiGuard Labs Threat Intelligence](https://www.fortinet.com/fortiguard/labs)
### Small Mid-Sized Businesses
- [Overview](https://www.fortinet.com/solutions/small-business)
### Service Providers
- [MSSP](https://www.fortinet.com/solutions/service-provider/communications-service-provider/mssp)
- [Mobile Providers](https://www.fortinet.com/solutions/mobile-carrier/cybersecurity-for-mobile-networks-and-ecosystems)
Partners
- [Overview](https://www.fortinet.com/partners/technology-alliances/alliances-ecosystem)
- [Alliances Ecosystem](https://www.fortinet.com/partners/partnerships/alliance-partners)
- [Find a Partner](https://partnerportal.fortinet.com/directory/)
- [Become a Partner](https://www.fortinet.com/partners/partner-program/become-a-fortinet-partner)
- [Partner Login](https://www.fortinet.com/partners/partner-program/partner-login)
Trust Center
- [Trusted Products](https://www.fortinet.com/trust?tab=trusted%20products)
- [Trusted Company](https://www.fortinet.com/trust?tab=trusted%20company)
- [Trusted Process](https://www.fortinet.com/trust?tab=trusted%20process)
- [Trusted Partners](https://www.fortinet.com/trust?tab=trusted%20partners)
- [Product Certifications](https://www.fortinet.com/corporate/about-us/product-certifications)
More
- [About Us](https://www.fortinet.com/corporate/about-us/about-us)
- [Training](https://www.fortinet.com/nse-training)
- [Resources](https://www.fortinet.com/resources)
- [Ransomware Hub](https://www.fortinet.com/resources/hubs/ransomware)
- [Support](https://www.fortinet.com/support)
- [Downloads](https://www.fortinet.com/support/product-downloads)
- [CyberGlossary](https://www.fortinet.com/resources/cyberglossary)
- [Careers](https://www.fortinet.com/corporate/careers)
- [Early Talent Program](https://www.fortinet.com/corporate/careers/early-talent-program)
- [Investor Relations](https://investor.fortinet.com/)
- [Social Responsibility](https://www.fortinet.com/corporate/about-us/corporate-social-responsibility)
- [Sitemap](https://www.fortinet.com/sitemap)
Connect With Us
- [Blogs](https://www.fortinet.com/blog)
- [Fortinet Community](https://community.fortinet.com/)
- [Email Preference Center](https://global.fortinet.com/PreferenceCenter)
- [Contact Us](https://www.fortinet.com/corporate/about-us/contact-us)
- [](https://www.linkedin.com/company/fortinet)
- [](https://www.x.com/Fortinet)
- [](https://www.youtube.com/channel/UCJHo4AuVomwMRzgkA5DQEOA?sub_confirmation=1)
- [](https://www.instagram.com/fortinet/)
- [](https://www.facebook.com/fortinet)
- [](https://www.fortinet.com/rss-feeds)
Products
[Enterprise](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
- [Secure Networking](https://www.fortinet.com/solutions/network-security)
- [User and Device Security](https://www.fortinet.com/solutions/enterprise-midsize-business/user-device-security)
- [Security Operations](https://www.fortinet.com/solutions/security-operations)
- [Application Security](https://www.fortinet.com/solutions/enterprise-midsize-business/cloud-security)
- [FortiGuard Labs Threat Intelligence](https://www.fortinet.com/fortiguard/labs)
[Small Mid-Sized Businesses](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
- [Overview](https://www.fortinet.com/solutions/small-business)
[Service Providers](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
- [MSSP](https://www.fortinet.com/solutions/service-provider/communications-service-provider/mssp)
- [Mobile Providers](https://www.fortinet.com/solutions/mobile-carrier/cybersecurity-for-mobile-networks-and-ecosystems)
Partners
- [Overview](https://www.fortinet.com/partners/technology-alliances/alliances-ecosystem)
- [Alliances Ecosystem](https://www.fortinet.com/partners/partnerships/alliance-partners)
- [Find a Partner](https://partnerportal.fortinet.com/directory/)
- [Become a Partner](https://www.fortinet.com/partners/partner-program/become-a-fortinet-partner)
- [Partner Login](https://www.fortinet.com/partners/partner-program/partner-login)
Trust Center
- [Trusted Products](https://www.fortinet.com/trust?tab=trusted%20products)
- [Trusted Company](https://www.fortinet.com/trust?tab=trusted%20company)
- [Trusted Process](https://www.fortinet.com/trust?tab=trusted%20process)
- [Trusted Partners](https://www.fortinet.com/trust?tab=trusted%20partners)
- [Product Certifications](https://www.fortinet.com/corporate/about-us/product-certifications)
More
- [About Us](https://www.fortinet.com/corporate/about-us/about-us)
- [Training](https://www.fortinet.com/nse-training)
- [Resources](https://www.fortinet.com/resources)
- [Ransomware Hub](https://www.fortinet.com/resources/hubs/ransomware)
- [Support](https://www.fortinet.com/support)
- [Downloads](https://www.fortinet.com/support/product-downloads)
- [CyberGlossary](https://www.fortinet.com/resources/cyberglossary)
- [Careers](https://www.fortinet.com/corporate/careers)
- [Early Talent Program](https://www.fortinet.com/corporate/careers/early-talent-program)
- [Investor Relations](https://investor.fortinet.com/)
- [Social Responsibility](https://www.fortinet.com/corporate/about-us/corporate-social-responsibility)
- [Sitemap](https://www.fortinet.com/sitemap)
Connect With Us
- [Blogs](https://www.fortinet.com/blog)
- [Fortinet Community](https://community.fortinet.com/)
- [Email Preference Center](https://global.fortinet.com/PreferenceCenter)
- [Contact Us](https://www.fortinet.com/corporate/about-us/contact-us)
[](https://www.fortinet.com/)
[](https://www.fortinet.com/romain-attanasio)
[](https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2024/juventus-football-club-annouces-fortinet-as-its-official-cybersecurity-partner)
[](https://www.fortinet.com/fortinet-cup-americas)
[](https://www.fortinet.com/dp-world-tour)
[](https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2024/fc-barcelona-selects-fortinet-as-official-cybersecurity-partner-for-future-spotify-camp-nou)
[](https://www.fortinet.com/lpga-fortinet-founders-cup)
Copyright © 2026 Fortinet, Inc. All Rights Reserved.
- [Terms of Service](https://www.fortinet.com/corporate/about-us/legal)
- [Privacy Policy](https://www.fortinet.com/corporate/about-us/privacy)
- [Notice for California Residents](https://www.fortinet.com/corporate/about-us/privacy#npr-ca)
- [Do Not Sell Or Share My Personal Information](https://www.fortinet.com/corporate/about-us/privacy/individual-rights)
- [GDPR](https://www.fortinet.com/corporate/about-us/gdpr)
- [Canadian Accessibility](https://www.fortinet.com/corporate/about-us/canadian-accessibility)
- [Cookie Settings](https://www.fortinet.com/resources/cyberglossary/what-is-bitcoin-mining)
[Request a quote](https://www.fortinet.com/corporate/about-us/request-a-quote)
[Contact Us](https://www.fortinet.com/corporate/about-us/contact-us)
[Free Demo](https://www.fortinet.com/demo-center)
Also of Interest:
- [Fortinet CVE Analysis](https://www.fortinet.com/blog/psirt-blogs)
- [A Mobile Bitcoin Miner? Really?](https://www.fortinet.com/blog/threat-research/a-mobile-bitcoin-miner--really-)
- [Cryptojacking](https://www.fortinet.com/resources/cyberglossary/cryptojacking)
- [Analyzing Malware Code that Cryptojacks System...](https://www.fortinet.com/blog/threat-research/malicious-code-cryptojacks-device-to-mine-for-monero-crypto) |
| Readable Markdown | Bitcoin mining, in and of itself, is not harmful and involves using a computer to solve difficult mathematical equations for the user to earn bitcoin. The user earns bitcoin by verifying transactions on the blockchain, which is a digital ledger—similar to a bankbook—that keeps track of all the transactions of a given cryptocurrency. Each time a hash is solved, the user who solves it earns [bitcoin](https://www.fortinet.com/content/dam/fortinet/assets/solution-guides/sb-protecting-nextgen-911-systems.pdf).
However, to solve the math problems, a computer has to run nonstop, expending a lot of central processing unit (CPU) power. This takes a lot of electricity. [Hackers](https://www.fortinet.com/resources/cyberglossary/what-is-hacking) have begun hijacking other people’s computers to use them, their resources, and the user’s electricity to mine bitcoin, which the hacker can then cash in on.
Bitcoin mining uses [malware](https://www.fortinet.com/resources/cyberglossary/malware). Hackers have written malware with the ability to access your computer and use its resources to mine bitcoin and other cryptocurrencies. For the hacker to earn cryptocurrencies, they have to verify transactions on a blockchain. Cryptocurrencies depend on this to maintain solvency.
Each transaction generates an ID labeled with a hash. On the bitcoin blockchain, a hash is a 256-bit encryption, which is essentially a password. Each computer on the network tries to figure out the 256-bit password, and if it gets even one character wrong, the hash is not solved. Other computers work to verify the authenticity of the solutions the “winning” computer came up with. All of this work is rewarded with cryptocurrencies—in this case, bitcoin.
In some cryptocurrency ecosystems, users also get voting rights in the system’s governance structure. This means they get to cast a vote regarding the decisions the development team makes about the future of the currency, its token, and how they will be used.
Although it is not hard for a computer to solve a hash, to do it fast enough so that the problem is solved before other users' computers solve it, the computer has to be fast. But a fast computer is not enough. As the CPU tries to churn out an answer as quickly as possible, it has to fire billions of electrical impulses in a short period of time. To keep the computer from burning up, powerful fans are run constantly. This takes a lot of electricity. This is why hackers come after your computer—to bring it into one of their hijacked bitcoin mining pools.
A hacker installs bitcoin mining malware on hundreds of computers to divide the work among them. All of the computers become bitcoin miners verifying bitcoin transactions. Bitcoin mining calculators have calculated the electric draw of these operations, and they are enough to cause electric bills to spike, CPUs to burn up, and computers to completely fail. |
| Shard | 170 (laksa) |
| Root Hash | 13007420219075834370 |
| Unparsed URL | com,fortinet!www,/resources/cyberglossary/what-is-bitcoin-mining s443 |