New Warnings About Cryptojacking Being The Latest Cryptocurrency Threat

October 20, 2017 10:55 pm Published by
Featured Video Play Icon

Wired wrote an article about the new threat of “cryptojacking” that is when hackers can secretly use your own laptop or mobile device to mine cryptocurrency when you visit an infected site on Friday.

Cryptojacking has reportedly widely spread over the past few weeks since the hackers don’t need software on your computer to activate it, which is usually a much more resource-demanding hack.

Instead the hackers can use Javascript to run instantly after a user visits a compromised web page, but there’s no immediate way to detect if a page has a hidden mining component, and the user may not even notice an impact on performance, that someone is using your devices and electric bill for a digital profit.

Cryptojacking had its largest exposure in September when a company called Coinhive debuted a script that could start mining the cryptocurrency Monero when a webpage loaded.

The Pirate Boy torrenting site quickly incorporated it to raise funds, and within weeks Coinhive copies started popping up while hackers have found ways to embed the scripts into popular websites like Showtime and Politifact.com.

So far these attacks were discovered in compromises sites’ source code by users that noticed their own processors load wildly increasing after navigating to cryptojacked pages, including security research Troy Mursch.

Mursch suggested users adding sites that you are worried about or know to practice in-browser mining to your browser’s ad blocking tool.

Users can also get the Chrome extension called No Coin that blocks Coinhive mining and adds another layer of protection against other miners.

“We’ve seen malicious websites use embedded scripting to deliver malware, force ads, and force browsing to specific websites,” says Karl Sigler, threat intelligence research manager at SpiderLabs, which does malware research for the scanner Trustwave. “We’ve also seen malware that focuses on either stealing cryptocurrency wallets or mining in the background. Combine the two together and you have a match made in hell.”

WN.com, Maureen Foody



Have your say:

Your email address will not be published. Required fields are marked *

*