Not just the phone browser, your TV and smart fridge might be mining bitcoin for criminals too
LONDON: Is the web browser on your phone slower than usual? It could be mining bitcoin for criminals.
As the popularity of virtual currencies has grown, hackers are focusing on a new type of heist: putting malicious software on peoples' handsets, TVs and smart fridges that makes them mine for digital money.
So-called "crypto-jacking" attacks have become a growing problem in the cybersecurity industry, affecting both consumers and organisations. Depending on the severity of the ..
Some websites, including Salon.com, have tried to do it legitimately and been transparent about it. For three months this year, Salon.com removed ads from its sites in exchange for users allowing them to mine virtual currencies.
Industry experts first noted crypto-jacking as a threat in 2017, when virtual currency prices were skyrocketing to record highs.
The price of bitcoin, the most widely known virtual currency, jumped six-fold from September to almost USD 20,000 in December before falling back down to under USD 10,000.
The number of crypto-jacking cases soared from 146,704 worldwide in September to 22.4 million in December, according to anti-virus developer Avast. It has only continued to increase, to 93 million in May, it says.
The first big case emerged in September and centred on Coinhive, a legitimate business that let website owners make money by allowing customers to mine virtual currency instead of relying on advertising revenue.
Hackers quickly began to use the service to infect vulnerable sites with miners, most notably YouTube and nearly 50,000 Wordpress websites, according to research conducted by Troy Mursch, a researcher on crypto-jacking.
Mursch says Monero is the most popular virtual currency among cyber-criminals.
A report by cybersecurity company Palo Alto Networks estimates that over 5 per cent of Monero was mined through crypto-jacking. That is worth almost USD 150 million dollars and doesn't count mining that occurs through browsers.
In the majority of attacks, hackers infect as many devices as possible, a method experts calls "spray and pray."
"Basically, everyone with a (computer processing unit) can be targeted by crypto-jacking," said Ismail Belkacim, a developer of an application that prevents websites from mining virtual currencies.
As a result, some hackers target organisations with large computing power. In what they believe might be the biggest crypto-jacking attack so far, Checkpoint discovered in February that a hacker had been exploiting a vulnerability in a server that over several months generated over USD 3 million in Monero.
Crypto-jackers have also recently targeted organizations that use cloud-based services, in which a network of servers is used to process and store data, providing more computing power to companies who haven't invested in extra hardware.
Abusing this service, crypto-jackers use as much power as the cloud will allow them to, maximizing their gains. For businesses, this results in slower performance and higher energy bills.
Martin Hron, a security researcher at Avast, says that besides the rise in interest in virtual currencies, there are two main reasons for the rise in attacks.
First, crypto-jacking scripts require little skill to implement. Ready-made computer code that automates crypto-mining is easy to find with a Google search, along with tips on the vulnerabilities of devices.
Second, crypto-jacking is harder to detect and is more anonymous than other hacks. Unlike ransomware, in which victims have to transfer money to regain access to their computers blocked by hackers, a victim of crypto-jacking might never know their computer is being used to mine currency. And as currency generated by crypto-jacking goes straight into a hacker's encrypted wallet, the cyber-criminal leaves less of a trail.
Both Apple and Google have started to ban applications that mine virtual currencies on their devices. But Hron, the Avast researcher, warns that the risk is growing as more everyday devices are connected to the internet - from ovens to home lighting systems - and that these are often the least secure. Hron said that cheaply made Chinese devices were particularly easy to hack. Some experts say new techniques like artificial intelligence can help get a faster response to suspicious software.
This information is very useful and important for me.but how can we upload a script in our website?
@ananttomar007 the content of ur article is very informative. But beware of cheetah bot and even sharing of ur blog link in comments of other will eventually affect your reputation. Keep up the good work.
i am new so i don't know how they affected my post ?? pls little explain sir..
means
@ananttomar007 Great post brother i do believe criminals are using #Monero as it is privacy coin
yeah it can possible for monero.simple algorithm mining.
Congratulations @ananttomar007! You have completed some achievement on Steemit and have been rewarded with new badge(s) :
Award for the number of comments
Click on the badge to view your Board of Honor.
If you no longer want to receive notifications, reply to this comment with the word
STOP
Do not miss the last post from @steemitboard!
Participate in the SteemitBoard World Cup Contest!
Collect World Cup badges and win free SBD
Support the Gold Sponsors of the contest: @good-karma and @lukestokes
Don’t copy content from other websites. Plagiarism will get you Downvoted very quickly.
Create your own content.
such a nice post...
please upvote for me.
@ananttomar007 you were flagged by a worthless gang of trolls, so, I gave you an upvote to counteract it! Enjoy!!
Congratulations @ananttomar007! You received a personal award!
Click here to view your Board
Do not miss the last post from @steemitboard:
Vote for @Steemitboard as a witness and get one more award and increased upvotes!