You are on United States + Canada website. Select another region to view location-specific content
United States
English
Select another region
Choose region and language
Americas
  • BrasilPortuguês
  • CanadaEnglish
  • CanadaFrançais
  • LATAMEspañol
  • United StatesEnglish
Asia-Pacific
  • AustraliaEnglish
  • Chinese Simplified简体中文
  • Chinese Traditional繁體中文
  • IndiaEnglish
  • Japan日本語
  • Korea한국어
  • SingaporeEnglish
Europe, Middle East and Africa
  • BulgariaБългарски
  • CzechČeština
  • EuropeEnglish
  • FranceFrançais
  • GermanyDeutsch
  • HungaryMagyar
  • Israelעברית
  • ItalyItaliano
  • NetherlandsDutch
  • PolandPolski
  • RomaniaRomână
  • SpainEspañol
  • SwedenSvenska
  • SwitzerlandDeutsch
  • TürkiyeTürkçe
  • United KingdomEnglish
Worldwide
  • GlobalEnglish
  • Americas
    • BrasilPortuguês
    • CanadaEnglish
    • CanadaFrançais
    • LATAMEspañol
    • United StatesEnglish
  • Asia-Pacific
    • AustraliaEnglish
    • Chinese Simplified简体中文
    • Chinese Traditional繁體中文
    • IndiaEnglish
    • Japan日本語
    • Korea한국어
    • SingaporeEnglish
  • Europe, Middle East and Africa
    • BulgariaБългарски
    • CzechČeština
    • EuropeEnglish
    • FranceFrançais
    • GermanyDeutsch
    • HungaryMagyar
    • Israelעברית
    • ItalyItaliano
    • NetherlandsDutch
    • PolandPolski
    • RomaniaRomână
    • SpainEspañol
    • SwedenSvenska
    • SwitzerlandDeutsch
    • TürkiyeTürkçe
    • United KingdomEnglish
  • Worldwide
    • GlobalEnglish
  • Login for service providersAcronis Cyber Protect Cloud
  • Login for business customersAcronis Cyber Protect, Acronis Snap Deploy
  • Login for home usersAcronis True Image
  • Login to Partner PortalAcronis Partner Portal
  • Login to ConnectAcronis Cyber Protect Connect
  • Products
    For service providers
    Acronis Cyber Protect Cloud
    Empowering service providers with backup, DR, cybersecurity, and endpoint management in one integrated solution.
    Cybersecurity
    XDREDRMDRDLP
    Data protection
    Advanced BackupDisaster RecoveryNotarization & eSignature
    Microsoft 365 protection
    Ultimate 365Backup for Microsoft 365Security Posture ManagementEmail SecurityEmail Archiving for Microsoft 365Collaboration SecuritySecurity Awareness Training (SAT)
    MSP operations
    RMMPSA
    • Try it free
    For service providers, telco's and ISPs
    Acronis Cyber Protect Home & Business
    Secure backup and anti-malware solution for small offices and home users.
    For businesses
    Acronis Cyber Protect
    -20%
    The most secure backup and rapid recovery with natively integrated security and endpoint management for reliable business continuity.

    Backup | Security | Endpoint Management
    • Try it free
    For enterprise
    Acronis Cyber Protect Enterprise
    The most secure backup and fastest recovery for Enterprise, designed specifically for multi-site, multi-generational and industrial IT.

    Backup | Security | Endpoint Management
    • Book a call
    For businesses
    Acronis Snap Deploy
    A user-friendly solution that lets you provision all your workstations and servers like you are provisioning just one.
    • Try it free
    For operational technology
    Acronis Cyber Protect OT
    New
    Leading solution for resilience, continuity and compliance across operational technology (OT) infrastructure.
    • Book a call
    For home
    Acronis True Image
    -50%
    The only personal cyber protection solution that delivers easy-to-use, integrated backup and anti-malware in one.
    • Buy now
    For everyone
    Acronis Cyber Protect Connect
    A remote desktop and monitoring solution that enables you to easily access and manage remote workloads and fix any issues – anytime, anywhere.
    • All products
    Looking to update or renew your product or contact us for help?
  • Solutions
    Solutions
    For service providers
    For business
    • Microsoft 365 backup and recovery
    • Cyber resilience
    • Protected workspace
    • Endpoint protection
    • Hybrid disaster recovery
    • Disaster recovery to Azure
    • Prevention
    • Solutions for service providers
    • Ultimate 365 protection
    • Managed server backup
    • Ransomware protection
    • Managed anti-malware protection
    • Hosting service providers
    • MSP patch management
    • Recovery
    • Management
    • Automation
    • Security
    • Data Protection
    • All integrations
  • Pricing
    • For Service Providers
    • For Businesses & Enterprise
    • For Home
  • Partners
    Partner with Acronis
    • Acronis Partner Program
      Meet customer demand with one partner program for MSPs, VARs, OEMs and Hybrid Partners
    • Join the partner program
    • Acronis Technology Alliances Program (TAP)
      Integrate with Acronis to build powerful solutions for the MSP ecosystem
    Partner success kit
    • MSP Academy
      Training and resources to grow your MSP business
    • Active promotions
      Explore current deals and limited-time offers
    • Partner Certification
      Partners now have access to all sales and technical training — a $999 annual value per partner
    Locators
    • Find an IT provider
      Browse verified Acronis IT service providers worldwide by region and specialization
    • Find a distributor
      Browse verified Acronis distributors worldwide by type and location
  • Support & Resources
    Support
    • Customer service and support
      Get help, find answers, and contact our support team
    • Product documentation
      Everything you need to understand and use the product
    • Support knowledge base
      Self-service support with guides and solutions
    Resources
    • Resource center
      All-in-one hub for expert insights and resources
    • Acronis blog
      Explore articles on security, backup, and innovation
    • Acronis Threat Research unit
      Insights on cyber protection, tech trends, and news
    Webinars
    • Upcoming events and webinars
      Register for live demos and webinars led by Acronis experts
    • On-Demand webinars
      Watch on-demand webinars at your convenience and learn from Acronis' top experts
  • Why Acronis
    • About Acronis
      Learn about our mission, vision, and team
    • Industry recognitions
      Recognized by industry leaders for innovation and excellence
    • Compliance and certification
      See how we meet global compliance and regulatory requirements
    • Customer stories
      Real-world success stories from our global clients
    • Acronis vs competition
      Why businesses choose Acronis over the competition
  • Trials
    • For Service Providers
    • For business and enterprise
    • For Home
  • Buy online
    • For business and enterprise
    • For Home
  • Contact us
    • Contact sales
    • Contact renewals
    • Contact support
    • Professional services
Choose region and language
Americas
  • BrasilPortuguês
  • CanadaEnglish
  • CanadaFrançais
  • LATAMEspañol
  • United StatesEnglish
Asia-Pacific
  • AustraliaEnglish
  • Chinese Simplified简体中文
  • Chinese Traditional繁體中文
  • IndiaEnglish
  • Japan日本語
  • Korea한국어
  • SingaporeEnglish
Europe, Middle East and Africa
  • BulgariaБългарски
  • CzechČeština
  • EuropeEnglish
  • FranceFrançais
  • GermanyDeutsch
  • HungaryMagyar
  • Israelעברית
  • ItalyItaliano
  • NetherlandsDutch
  • PolandPolski
  • RomaniaRomână
  • SpainEspañol
  • SwedenSvenska
  • SwitzerlandDeutsch
  • TürkiyeTürkçe
  • United KingdomEnglish
Worldwide
  • GlobalEnglish
  • Americas
    • BrasilPortuguês
    • CanadaEnglish
    • CanadaFrançais
    • LATAMEspañol
    • United StatesEnglish
  • Asia-Pacific
    • AustraliaEnglish
    • Chinese Simplified简体中文
    • Chinese Traditional繁體中文
    • IndiaEnglish
    • Japan日本語
    • Korea한국어
    • SingaporeEnglish
  • Europe, Middle East and Africa
    • BulgariaБългарски
    • CzechČeština
    • EuropeEnglish
    • FranceFrançais
    • GermanyDeutsch
    • HungaryMagyar
    • Israelעברית
    • ItalyItaliano
    • NetherlandsDutch
    • PolandPolski
    • RomaniaRomână
    • SpainEspañol
    • SwedenSvenska
    • SwitzerlandDeutsch
    • TürkiyeTürkçe
    • United KingdomEnglish
  • Worldwide
    • GlobalEnglish
Acronis True Image
FOR HOME
MenuMenu
Acronis True Image
Overview
Backup
Cloning
Security
  • Backup features
    Easy BackupEmail BackupAutomatic BackupCloud BackupMobile BackupBackup ReplicationImaging SoftwareData MigrationData RecoverySurvival Kit
  • Security features
    Anti-Malware SoftwareIdentity ProtectionAntivirus SoftwareActive ProtectionReliable CybersecurityCryptojacking BlockerSecurity for MacData Protection
  • Solutions
    Gaming SecurityCloud Photo StorageElectronic SignatureMobile App
All features
Compare
Backup
Cloning
Security
Product features
Backup features
Easy BackupEmail BackupAutomatic BackupCloud BackupMobile BackupBackup ReplicationImaging SoftwareData MigrationData RecoverySurvival Kit
Security features
Anti-Malware SoftwareIdentity ProtectionAntivirus SoftwareActive ProtectionReliable CybersecurityCryptojacking BlockerSecurity for MacData Protection
Solutions
Gaming SecurityCloud Photo StorageElectronic SignatureMobile App
All features
Compare
Acronis

Protect your personal devices from cryptojacking and cryptomining malware

Save up to 50%

From $49.99 $34.99 per year

New name, same reliable cyber protection
@925df98ee5345a25331e84ef58490bbcAcronis True Image is now Acronis Cyber Protect Home Office  

Defend your computer resources against unauthorized cryptocurrency mining

Attacks by cryptocurrency mining malware soared by 450%. While it might not steal your data, cryptojacking will make your system suffer — stealing computer resources to solve the complex computational problems needed to mine cryptocurrencies. Attacks do more than slow your computer’s performance; they often introduce ransomware and other malware while they have access to your system.

Acronis Cyber Protect Home Office, formely True Image, blocks and stops cryptomining automatically by detecting and stopping cryptominers in real time.

Defend your computer resources against unauthorized cryptocurrency mining with Acronis

Key features of Acronis illicit cryptomining protection

Anti-cryptojacking protection

The illicit cryptomining protection engine works by employing advance detection algorithms and behavior analysis to identify and block malicious activities associated with unauthorized cryptocurrency mining. It detects and blocks malicious processes in real time, ensuring your peace of mind.
Acronis

Cryptomining malware blocker

Be protected against the installation and operating cryptomining malware. This malware uses the power of your computer by performing complex mathematical calculations. This means that that your system is being used by somebody else and will affect the performance of your computer. With the built-in malware blocker against malware, it will help ensure your system and network can only be used by you and not by somebody else.
Acronis

Stopping illicit miners

The boom in cryptocurrencies and their promise of easy money led to an explosion of cryptomining tools last year. The good news is that Acronis Active Protection, our machine-intelligence-powered defense, keeps your system from being compromised.

  • Terminates cryptominers
    Terminates cryptominers
    Stops standalone cryptomining malware that is often packaged with ransomware and other threats.
  • Alerts you to threats
    Alerts you to threats
    Notifies you immediately when an attack is detected on your Windows PC so you can block it.
  • Blocks future attacks
    Blocks future attacks
    Updates the behavioral heuristics used to detect attacks so it recognizes new malicious miners.

How it works

  • Detection
    Cryptocurrency mining is a way to create new units of digital currencies, like Bitcoin. It involves solving complex math problems using computer power. The miners are rewarded with newly created coins for their efforts. However, mining is not so easy, it requires considerable computer power. Malicious parties and hackers secretly install mining software on computers without the owner's knowledge. This is known as cryptojacking, and it can lead to a significant drain on system resources, slowing down performance and increasing electricity costs. Hackers can install other malware along with mining software, compromising a user’s device and privacy.
  • Alert
    Upon detecting a third-party process engaged in cryptocurrency mining, the service promptly issues an alert, seeking your confirmation to either trust and allow the process to continue, or block it. If you trust the process, you can opt to let the process run. However, if you are unsure of the process’s legitimacy, the service moves to a secure, quarantined folder, where it’s blocked from any further execution, ensuring no further damage is caused to your device. With the increase in your digital presence and simultaneous rise in cyberthreats, safeguarding your personal devices and data is of utmost importance. To ensure your all-around protection, Acronis Cyber Protect Home Office comes with secure backup and protection against illicit cryptomining and ransomware protection.
  • Protection
    Acronis Cyber Protect Home Office, with its built-in, illicit cryptomining protection, helps you by detecting illicit cryptomining processes in real time. It uses advanced algorithms and behavior analysis to detect and block suspicious processes, and notify you about the detected malware.

Choose the Acronis True Image plan that meets your needs

Limited time offer valid until October 21, 2025

Essentials

Local backup and anti-ransomware protection

One-year subscription

49.99Save 30%

$34.99per year

  • For 1 computer
  • For 3 computers
  • For 5 computers
  • No data
  • Cloud is not available
  • No data
  • Flexible backups: full image to file level
  • Active disk cloning
  • Quick recovery / Universal restore
  • Ransomware protection
  • FREE UPGRADES to the most recent product version
  • Phone, email and chat support
  • Available for Windows and macOS

Advanced

Local and cloud backup and security

Most popular

One-year subscription

72.99Save 40%

$43.79per year

  • For 1 computer
  • For 3 computers
  • For 5 computers
  • No data
  • 50GB for free
  • 250GB
  • 500GB
  • No data
  • Flexible backups: full image to file level
  • Active disk cloning
  • Quick recovery / Universal restore
  • Ransomware protection
  • +
  • Identity Protection
  • Block viruses and malware
  • Cloud backup and features
  • Automatic replication of data in the cloud
  • Microsoft 365 backups
  • FREE UPGRADES to the most recent product version
  • Phone, email and chat support
  • Available for Windows and macOS

Premium

Up to 5TB of cloud and local backup and security

One-year subscription

124.99Save 50%

$62.49per year

  • For 1 computer
  • For 3 computers
  • For 5 computers
  • No data
  • 1TB for free
  • 2TB
  • 3TB
  • 4TB
  • 5TB
  • No data
  • Flexible backups: full image to file level
  • Active disk cloning
  • Quick recovery / Universal restore
  • Ransomware protection
  • +
  • Identity Protection
  • Block viruses and malware
  • Cloud backup and features
  • Automatic replication of data in the cloud
  • Microsoft 365 backups
  • +
  • Blockchain certification of files
  • Electronic signatures on files
  • Ability to add up to 5TB of cloud storage
  • FREE UPGRADES to the most recent product version
  • Priority phone, email and chat support
  • Available for Windows and macOS

Give the gift of cyber protection

Get Acronis True Image as a gift

Students save 50% off regular price

Get Acronis True Image for students

(Proof of enrollment required)

Need more details?

Compare our products in depth

Please wait, this may take

a few seconds...

Award-winning cyber protection solution

Over 5.5 million users rely on Acronis True Image every day

Best Windows backup software, PCWorld
Best Windows backup software, PCWorld
Cybersecurity Excellence Awards Winner
Cybersecurity Excellence Awards Winner
Editors' Choice, PCWorld
Editors' Choice, PCWorld
OPSWAT Anti-malware Platinum certification
OPSWAT Anti-malware Platinum certification
100% Detection Rate and 0 False Alarms in independent tests
100% Detection Rate and 0 False Alarms in independent tests
All Awards

Works On Multiple Platforms

Microsoft Windows

  • Windows 11 (all editions)
  • Windows 10 (all editions)

Mobile operating systems

  • iOS 15 or later
  • Android 10 or later

Windows file systems

  • NTFS
  • Ext2/Ext3/Ext4
  • ReiserFS(3)
  • Linux SWAP
  • HFS+/HFSX
  • FAT16/32/exFAT

Apple macOS

  • macOS Tahoe 26
  • macOS Sequoia 15
  • macOS Sonoma 14
  • macOS Ventura 13
  • macOS Monterey 12

macOS file systems

  • APFS
  • HFS+
  • FAT32
  • NTFS (including Boot Camp)
Acronis

Acronis Mobile: Easy, secure and portable

Never worry about losing your photos, videos, contacts or important files again. With the Acronis Mobile app, you can easily back up everything that matters on your phone and keep it safe in the cloud. Access your files anytime, anywhere from the Acronis Cloud, whether you're switching devices or just want peace of mind. It’s fast and always ready to protect your digital life.

  • How to back up your mobile device via Wi-Fi to a PC or Mac

Looking for help?

Frequently Asked Questions

  • What is cryptojacking?

    With cryptojacking, online criminals use malware to secretly use the computing resources of your system to mine cryptocurrency — which requires tremendous processing power to calculate exceptionally complex digital equations, called hashes. While the malware does not steal your data, it robs you of considerable system resources, slowing your computer’s performance and significantly increasing your energy use.
    Sometimes, cryptocurrency mining malware is injected into your system, piggybacking on apps or running in the background hoping to go unnoticed. Other times, the malware attacks via your web browser when you go to an infected website and runs as long as you are connected to that site.

  • What is cryptomining malware?

    Cryptomining malware is secretely using people’s devices, like computers, smartphones, tablets and even servers, to perform complex mathematical calculations to mine cryptocurrencies. It is basically stealing computing resources to mine a specific cryptocurrency.

  • How does cryptojacking malware work?

    Hackers are mining cryptocurrencies with your computers resources. This can happen after clicking on a malicious link which you received though an email or a malicious website.

  • How to detect cryptomining viruses on my computer?

    Cryptomining demands a lot of processing power, and your CPU will be asked to work overtime. If you want to test a PC for mining malware, open your system’s resource monitor (Task Manager for Windows, Activity Monitor for Macs) to see if the CPU use is unusually high. If you’ve closed all the apps on your system and the CPU is still in overdrive, or if CPU use spikes when you visit a specific website, then you may have a cryptominer at work.

  • What are the risks of cryptomining malware?

    Your device is being used to mine cryptocurrency. You can identify if you are a victim of this cryptomining malware by checking to see if the following is occurring:

    • High usage of your computer’s CPU.
    • Your device is slower then normal.
    • You’re experiencing a slower network.
    • Power drains from your battery more quickly.

  • How does Acronis Cyber Protect Home Office detect cryptojacking attacks?

    It automatically protects you against cryptojacking with its built-in anti-malware solution that protects your computer and your personal data from harm.

  • Can Acronis Cyber Protect Home Office prevent the installation of cryptomining malware?

    Yes, as it provides real-time protection against malware and protects your device and

  • Can any cryptocurrency mining cause malware or is it only Bitcoin-miner malware?

    It can be any cryptocurrency; therefore, you need protection to keep your device and your personal data protected.

Product help
If you need product assistance, you can find helpful materials in the Knowledge Base. Or, post questions on our discussion boards.
Technical support
For subscription owners, there is free, 24-hour technical support. Refer to the Technical Support Site to find the appropriate support contact.
  • Company
    Press Releases
    Careers
    Contacts
    Cloud Data Centers
    Forum
  • Service Providers
    Resellers
    Developers and ISVs
    Affiliates
    OEMs
  • Active Protection
    AnyData Engine
    Acronis Notary
    Universal Restore
    Anti-malware
    View all
  • Management
    Automation
    Security
    Data Protection
    View all
  • Acronis #CyberFit Sports
    Acronis Cyber Foundation
    TRU security
    Professional Services
  • ConnectWise
    Microsoft CSPs
  • Veeam
    Sophos
    Trend Micro
    ESET
    SentinelOne
    View all
  • Physical
    Virtual
    Cloud
    Endpoints
    Applications
    Mobile
  • About Acronis
  • Company
  • Press Releases
  • Careers
  • Contacts
  • Cloud Data Centers
  • Forum
  • For partners
  • Service Providers
  • Resellers
  • Developers and ISVs
  • Affiliates
  • OEMs
  • Technologies
  • Active Protection
  • AnyData Engine
  • Acronis Notary
  • Universal Restore
  • Anti-malware
  • View all
  • Integrations
  • Management
  • Automation
  • Security
  • Data Protection
  • View all
  • Programs & Services
  • Acronis #CyberFit Sports
  • Acronis Cyber Foundation
  • TRU security
  • Professional Services
  • Vendor Alliance
  • ConnectWise
  • Microsoft CSPs
  • Compare to
  • Veeam
  • Sophos
  • Trend Micro
  • ESET
  • SentinelOne
  • View all
  • Environments
  • Physical
  • Virtual
  • Cloud
  • Endpoints
  • Applications
  • Mobile
Engage with Acronis

Tips, news and promo offers

  • Legal information
  • Privacy policy
  • Cookie Notice
  • Notice of collection
  • Sustainability & governance
© 2003–2025 Acronis International GmbH.

Sorry, your browser is not supported.

It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.

© 2003–2025 Acronis International GmbH. All rights reserved.
Legal information