Bitcoin virus. Main types, distribution techniques and removal explained

removal by Jake Doevan - - | Type: Trojans

Bitcoin virus Removal Guide

What is Bitcoin virus?

Bitcoin virus is a type of malware which is capable of abusing victims' resources to mine Bitcoin for criminals

Bitcoin mining malwareBitcoin mining malware can put the CPU and GPU under a tremendous amount of stress.

Bitcoin virus is a type of malicious program that seeks to mine Bitcoin cryptocurrency illegally while using victims' CPU power. In some cases, graphics processing unit (GPU) can be utilized as well. The virus typically enters machines via a trojan horse – a backdoor virus that clears the path for coin-mining malware. The extensive usage of computer hardware diminishes overall performance of the device (eventually it can lead to its destruction), as well as increases the amount of electricity consumed, leading to raised electric bills. Users can detect the malware in the Task Manager as a questionable process running in the background, such as XMRig. The Miner.Bitcoinminer or similarly named infection can infiltrate Windows, Mac, and Android devices.

Name Bitcoin virus
Type Trojan
Sub-type Cryptojacker[1]
Detected as Miner.Bitcoinminer; Risckwar.Bitcoinminer, Trojan.BitcoinMiner; PUA.CoinMiner, etc.
Versions CPU Miner, Vnlgp Miner, etc.
Currencies mined Bitcoin, Monero, Electroneum and others
Distribution Spam emails, fraudulent messages on Skype, EternalBlue exploit, etc.
Symptoms Increased CPU and GPU usage (making the PC hot), software crashes or freezes, slow overall performance of the device
Susceptible systems Windows, Mac, Android
Elimination Download and install an anti-malware tool to remove Bitcoin virus fully

Bitcoin virus is capable of harvesting various crypto, including Monero, Electroneum, Litecoin, Ethereum, although the most prominent one is Bitcoin. It is a virtual currency which was first introduced in 2008. However, the usage of this digital currency increased only in 2011. At the time of the writing, Bitcoins have already reached the circulation rate of more than 17 million as of late May 2018.[2]

There is no surprise that even the most reputable companies accept this currency. However, it is created not through a central monetary agency, but through the computers that perform CPU-intensive crypto calculations. Therefore, cybercriminals are always looking for new ways to take advantage of this feature by creating new versions of Bitcoin miner.

Bitcoin virus is detected under various names, including:

  • Riskware.Miner
  • Trojan.BitMine
  • W32/CoinMiner
  • Trojan.BitMine
  • Trojan.BitCoinMiner
  • PUA.CoinMiner, etc.

There are several variants of BitcoinMiner, as well. The most known of them are called CPU Miner and Vnlgp Miner. Unfortunately, you can hardly notice when your computer gets infected by it. According to experts, this malware attempts to hide by trying to work only when the victim is not using his/her device.

However, you can notice the Bitcoin virus by monitoring your PC’s speed. According to research, the use of the machine’s CPU grows up rapidly when this virus infiltrates it, so don’t ignore such changes. What is more, the Trojan horse might also be capable of opening the back door or download other malicious programs.

Riskware.MinerRiskware.Miner is a form of Bitcoin virus that uses stealth methods to reach the targeted system and perform malicious actions.

If the GPU of your device is used instead of CPU, you will not be able to spot it in the Task Manager. However, you will be able to see stuttering and freezing frames when performing graphics intensive tasks, such as gaming or full HD video processing.

Some users may naturally come to the conclusion that their graphics card is about to break. Nevertheless, if you experience such symptoms, you should download software that can measure temperature and workload on your GPU, and check if Bitcoin Miner infection causes the malfunction.

There are many reasons[3] why your computer might be working slowly – incompatible software or hardware, corrupt system or software files, outdated registry entries and similar issues. However, it is always worth scanning your machine with reputable anti-virus software first. This security software will immediately detect and remove BitcoinMiner from Mac OS X or Windows.

The evolution of Bitcoin miner virus: ransomware variant hit the surface

Bitcoin ransomware is a specific version of Bitcoin malware, which can infiltrate a computer without user’s approval and then encrypt each of his/her files. This threat has been noticed after encrypting the entire network of one medical center in the USA. However, it can also affect regular home users leaving them without the access to their files.

Bitcoin Miner virusBitcoin virus - any type of malware that is used by cybercriminals to illegally mine cryptocurrency on the infected PC.

Once it finishes the encryption of victim’s files, Bitcoin ransomware displays a warning message asking him or her to pay the ransom of 1.5 bitcoin. Please, do NOT pay it as you may end up with nothing! Keep in mind that you are dealing with scammers who can take money from you and leave you without a special code needed to decrypt your locked files.

In this case, you should perform Bitcoin miner virus removal with ReimageIntego and try to encrypt your files with the help of these tools: Photorec and R-studio. Keep in mind that dealing with cybercriminals is never an option!

Bitcoin mining malware has been noticed spreading in Russia

At the end of July 2017, it was reported that cryptocurrency mining malware infected 25% of computer users in Russia. [4] However, some sources state that this cyber infection may have infiltrated 30% of Russian computers.[5]

According to the official data, the majority of affected devices run in Windows OS. Meanwhile, Mac computers and iPhones haven’t suffered a lot from the virus.

Authorities published the information about Bitcoin mining virus[6]. However, security specialists and antivirus vendors claim that the scope of the attack is exaggerated.[7] Experts agree that in the past there were few issues with this malware, but not as vast as it is has been stated recently.

Trojan.BitcoinMinerIt might be difficult to detect the infection; however, high CPU and/or CPU usage is the first indicator which should not be missed.

A representative from Kaspersky Labs, which is one of the leading Russian antivirus vendors, claims that if such a massive attack were held, they would have noticed it. However, since the beginning of the year, only 6% of their customers have suffered from BitcoinMiner.[8]

Ways to get infected with malware

According to security experts, this virus is mostly spread via Skype network, but it has also been noticed on other social networks, so beware about that. Typically, this virus relies on a spam message, which claims something like „this my favorite picture of you” and includes a malicious file. Of course, virus seeks to convince its victims to download the file onto their computers. Certain versions of malware were also seen being spread using the EternalBlue exploit.

If you want to avoid it, stay away from such messages. Once victim downloads the “photo,” he not only lets malicious pieces inside the machine but allows the virus to connect PC to its command-and-control server.

Once inside and active, the virus turns the infected machine to the Bitcoin generator. However, it can also be designed to the virus, which steals banking details, records the keystrokes or downloads more malware on its target PC.

Bitcoin virus removal guide

If you think that your computer is infected with malware, you should scan it with updated security software, such as ReimageIntego or Malwarebytes. If your device is affected, your chosen security tool will remove Bitcoin virus immediately.

Make sure you check the system immediately after noticing changes in your computer’s speed because it is the only way to get rid of this threat without additional problems. The appearance of other viruses and the loss of your sensitive information can be expected when having Bitcoin malware on a computer.

Bitcoin miner trojanCybercriminals seek to gain monetary benefit by using victims' systems. Do not allow hackers to earn money while compromising your device.

These programs should also help you perform Bitcoin virus removal from the system. However, sometimes viruses that are categorized as ransomware block anti-virus software to prevent their removal. If you are dealing with such problem right now, follow a guide below.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of Bitcoin virus. Follow these steps

Manual removal using Safe Mode

If you cannot access security software necessary for Bitcoin ransomware removal, you should follow these steps:

Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.

Step 1. Access Safe Mode with Networking

Manual malware removal should be best performed in the Safe Mode environment. 

Windows 7 / Vista / XP
  1. Click Start > Shutdown > Restart > OK.
  2. When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
  3. Select Safe Mode with Networking from the list. Windows 7/XP
Windows 10 / Windows 8
  1. Right-click on Start button and select Settings.
  2. Scroll down to pick Update & Security.
    Update and security
  3. On the left side of the window, pick Recovery.
  4. Now scroll down to find Advanced Startup section.
  5. Click Restart now.
  6. Select Troubleshoot. Choose an option
  7. Go to Advanced options. Advanced options
  8. Select Startup Settings. Startup settings
  9. Press Restart.
  10. Now press 5 or click 5) Enable Safe Mode with Networking. Enable safe mode

Step 2. Shut down suspicious processes

Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Click on More details.
    Open task manager
  3. Scroll down to Background processes section, and look for anything suspicious.
  4. Right-click and select Open file location.
    Open file location
  5. Go back to the process, right-click and pick End Task.
    End task
  6. Delete the contents of the malicious folder.

Step 3. Check program Startup

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Go to Startup tab.
  3. Right-click on the suspicious program and pick Disable.

Step 4. Delete virus files

Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:

  1. Type in Disk Cleanup in Windows search and press Enter.
    Disk cleanup
  2. Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
  3. Scroll through the Files to delete list and select the following:

    Temporary Internet Files
    Recycle Bin
    Temporary files

  4. Pick Clean up system files.
    Delete temp files
  5. You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):


After you are finished, reboot the PC in normal mode.

Remove Bitcoin using System Restore

This method helps to disable the virus in order to run its automatic removal.

  • Step 1: Reboot your computer to Safe Mode with Command Prompt
    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Bitcoin. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with ReimageIntego and make sure that Bitcoin removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Bitcoin from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by Bitcoin, you can use several methods to restore them:

Data Recovery Pro helps to recover missing files

If you a ransomware variant of the Bitcoin virus encrypted your files, this tool might help to recover at least some of them.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Bitcoin ransomware;
  • Restore them.

Take advantage of Windows Previous Versions feature

This method helps to copy previously saved versions of files. However, System Restore has been enabled before ransomware attack.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

ShadowExplorer might help to restore files encrypted by Bitcoin ransomware

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Bitcoin and other ransomwares, use a reputable anti-spyware, such as ReimageIntego, SpyHunter 5Combo Cleaner or Malwarebytes

How to prevent from getting trojans

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. The best solution for creating a tighter network could be a dedicated/fixed IP address.

If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for the server or network manager that needs to monitor connections and activities. VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world.


Recover files after data-affecting malware attacks

While much of the data can be accidentally deleted due to various reasons, malware is one of the main culprits that can cause loss of pictures, documents, videos, and other important files. More serious malware infections lead to significant data loss when your documents, system files, and images get encrypted. In particular, ransomware is is a type of malware that focuses on such functions, so your files become useless without an ability to access them.

Even though there is little to no possibility to recover after file-locking threats, some applications have features for data recovery in the system. In some cases, Data Recovery Pro can also help to recover at least some portion of your data after data-locking virus infection or general cyber infection. 


About the author
Jake Doevan
Jake Doevan - Computer technology expert

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Jake Doevan
About the company Esolutions

Removal guides in other languages