Beware - that Nvidia RTX LHR Mining Unlocker is actually malware

A white padlock on a dark digital background.
(Image credit: Shutterstock.com)

Malicious actors are preying on greedy Ethereum miners by trying to distribute malware through places where it hurts them the most - their precious GPU devices.

As reported by Tom’s Hardware, the Nvidia GeForce RTX 30- and RTX A-series graphics cards come with a limiter of sorts in an attempt to make them less attractive to the cryptocurrency miners. 

However, it wasn’t long before someone pushed something called the "Nvidia RTX LHR v2 Unlocker to the web". It is being advertised as a tweak to the card’s BIOS, a modification to the firmware, which removes the performance cap for miners.

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time, and entrants from the UK and US will have the chance to enter a draw for a £100 Amazon gift card (or equivalent in USD). Thank you for taking part.

>> Click here to start the survey in a new window <<

Distributing malware

In reality, this firmware update is nothing more than malware. The YouTube channel Red Panda Mining Live! tested the firmware, and streamed the whole ordeal. Among the numerous red flags that the researchers spotted, was the fact that the program was timestamped as created in 2009, and not in 2022. 

Taking to Twitter, news editor at Wccftech, Hassan Mujtaba, said all links to the Github asset download page have been removed “since this tool is apparently infused with malware”, and asked the miners to avoid downloading, or using it, in any capacity, on their endpoints.

Cryptocurrency miners are polarizing not just the crypto community, but also GPU makers, politicians, environmental activists, lawmakers, and others. On one end, mining is the essential element to the elimination of third parties in financial transactions, while miners are deemed pivotal for the security of the Ethereum network. At the other end, the rising popularity of mining is making it almost impossible to obtain a new, strong graphics card, as all demand is eaten up in an instant, hiking the prices into the stratosphere.

Furthermore, miners are often criticized for wasting enormous amounts of energy, thus leaving a major carbon footprint. Crypto advocates, on the other hand, are saying that the energy spent on mining is negligible, as it takes up only a fraction of the excess energy that is wasted around the world. 

  • You might also want to check out our list of the best firewalls right now
TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
An AMD Radeon RX 7900 XTX on a table against a white backdrop
Best mining GPU for mining crypto in 2025
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
The RTX 4070 FE graphics card being held aloft by a grizzled hand in the pits of hell.
Buyer beware: Asus' Q-Release Slim feature is reportedly damaging GPUs like the RTX 5090
The Nvidia GeForce RTX 5090&#039;s power connection port
Nvidia RTX 5090 seemingly has a spanner thrown in the works by new graphics driver, but we should be very careful around reports of ‘bricked’ GPUs
A white padlock on a dark digital background.
Developers targeted by malicious Microsoft VSCode extensions
A closeup of the Nvidia GeForce RTX branding on the 5070 Ti
Nvidia's RTX 5000 GPUs continue to face severe supply issues, with RTX 5070 Ti reportedly being even worse for launch stock than the RTX 5080
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over