COINHIVE – NEW CASH COW FOR MALWARE CREATORS by sajjad711

View this thread on steempeak.com
· @sajjad711 ·
COINHIVE – NEW CASH COW FOR MALWARE CREATORS
<html>
<p><br></p>
<p>&nbsp;<strong>Coinhive is a technology that is just</strong> <a href="https://coin-hive.com/blog/status-report"><strong>several weeks old</strong></a><strong>, it was formally introduced&nbsp;on September 14.&nbsp;Coinhive is&nbsp;rapidly turning into the cash cow of the world wide web,&nbsp;progressing&nbsp;from&nbsp;a revolutionary crypto-currency mining instrument&nbsp;to a technology&nbsp;heavily exploited by myriads of cyber-criminals.</strong></p>
<h3>NEW ADVERTISING ALTERNATIVE OR JUST PLAIN MALWARE?</h3>
<p>Coinhive is a JavaScript library that&nbsp;webmasters can use on their&nbsp;websites.&nbsp;Whenever people visit&nbsp;the&nbsp;website, the Coinhive JavaScript code runs&nbsp;and mines Monero for the&nbsp;webmaster making use of&nbsp;the visitor’s CPU.It is a unique and creative idea. Bravo! Coinhive creators promote&nbsp;it&nbsp;as a substitute to traditional advertisements.&nbsp;Coinhive&nbsp;states&nbsp;that&nbsp;website owners may&nbsp;get rid of all ads on their site, load the Coinhive and mine Monero&nbsp;using a tiny portion&nbsp;the user’s CPU&nbsp;during the time he/she is&nbsp;visiting the website.&nbsp;Website owners will earn money&nbsp;without annoying their audience with&nbsp;irritating advertisements.Just a couple days&nbsp;after it&nbsp;was introduced,&nbsp;<a href="https://thepiratebay.org/blog/242"><em>The Pirate Bay</em> tested</a> it for short time. <em>The Pirate Bay</em> abandoned&nbsp;it after&nbsp;numerous unfavorable&nbsp;user&nbsp;comments. But the&nbsp;concept got its momentum.Later a pair of&nbsp;Showtime&nbsp;websites&nbsp;(showtimeanytime.com and showtime.com) started to play with&nbsp;Coinhive too. It is possible that hackers&nbsp;breached the Showtime websites&nbsp;and integrated&nbsp;the mining&nbsp;code&nbsp;without the company’s&nbsp;awareness. Another theory says that Showtime is&nbsp;adding&nbsp;the script intentionally,&nbsp;as a test.&nbsp;This explanation looks more probable, as <a href="https://coin-hive.com/documentation/miner#miner-set-throttle">the setThrottle</a> value is 0.97, indicating&nbsp;the mining script&nbsp;will stay&nbsp;inactive&nbsp;for 97% of the time. A cyber intruder understanding&nbsp;that he may be noticed at any time,&nbsp;would certainly&nbsp;set&nbsp;a smaller&nbsp;throttle value&nbsp;and try to mine the maximum amount of&nbsp;Monero before&nbsp;being detected.A newly released report has&nbsp;determined&nbsp;that&nbsp;a website such as&nbsp;<em>The Pirate Bay</em>&nbsp;is likely to make about&nbsp;<a href="https://torrentfreak.com/how-much-money-can-pirate-bay-make-from-a-cryptocoin-miner-170924/">12,000 USD per month</a>. Considering the fact that&nbsp;<em>The Pirate Bay</em>is&nbsp;positioned 87 in the Alexa traffic ranking,&nbsp;and Showtime is&nbsp;only 9,500, Showtime’s&nbsp;earnings&nbsp;would be much smaller.Sadly, and in spite of&nbsp;the&nbsp;good&nbsp;use of a cryptocurrency miner, Coinhive is in the&nbsp;position&nbsp;of many other&nbsp;helpful instruments&nbsp;that have been&nbsp;misused&nbsp;by criminals. In the&nbsp;couple of days&nbsp;that have passed since its&nbsp;release, Coinhive has&nbsp;stretched&nbsp;to&nbsp;most corners of the&nbsp;hacker community.</p>
<h3><img src="http://bitcoinist.com/wp-content/uploads/2017/10/pix-malware-spreading-e1508480862421.jpg" width="640" height="419"/></h3>
<h3>COINHIVE IS SPREADING</h3>
<p>Initially, we&nbsp;spotted&nbsp;it&nbsp;inserted&nbsp;inside&nbsp;a well-known&nbsp;Chrome extension&nbsp;<a href="https://www.bleepingcomputer.com/news/security/chrome-extension-embeds-in-browser-monero-miner-that-drains-your-cpu/">called&nbsp;SafeBrowse</a>,&nbsp;in which&nbsp;the Coinhive&nbsp;script was&nbsp;placed to&nbsp;mine Monero in&nbsp;Chrome’s background every time&nbsp;the browser was&nbsp;opened and working.After that, we&nbsp;noticed&nbsp;Coinhive&nbsp;inserted&nbsp;in typo-squatted&nbsp;domain names.&nbsp;Somebody launched&nbsp;the twitter.com.com&nbsp;site&nbsp;and was installing&nbsp;the Coinhive JS library on that&nbsp;web page.&nbsp;Individuals who&nbsp;mistyped the Twitter&nbsp;domain URL found themselves&nbsp;on the page&nbsp;mining Monero for the crook. Of course, it&nbsp;would last only for several seconds until the&nbsp;person understood&nbsp;he was on the&nbsp;wrong website, but&nbsp;that is enough&nbsp;for web-entrepreneur to make a profit. Eventually&nbsp;and&nbsp;having plenty of such domains in place, their operator can make a big&nbsp;sum of money.Later, malware experts found&nbsp;several hacked&nbsp;websites&nbsp;where&nbsp;criminals&nbsp;changed&nbsp;the source code and&nbsp;quietly uploaded&nbsp;the Coinhive miner. Infosec <a href="https://blog.sucuri.net/2017/09/hacked-websites-mine-crypocurrencies.html">experts discovered</a>numerous&nbsp;hacked Magento and WordPress websites tweaked in this manner.Security&nbsp;specialists&nbsp;also&nbsp;noticed that one prominent and <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/eitest-campaign-uses-tech-support-scams-deliver-coinhives-monero-miner/">big malvertising group</a> made use of Coinhive too. Hazardous&nbsp;advertisements redirected users to&nbsp;fake tech support sites where&nbsp;in addition to traditional false&nbsp;virus&nbsp;notifications, criminals put&nbsp;Coinhive and mined for Monero.The&nbsp;latest instance of Coinhive&nbsp;getting integrated together with&nbsp;malware&nbsp;has been revealed this week&nbsp;when a researcher&nbsp;discovered&nbsp;a website&nbsp;peddling&nbsp;a phony Java update&nbsp;which was simultaneously&nbsp;mining for Monero.It becomes obvious&nbsp;from the above cases that&nbsp;virus creators&nbsp;have found their next cash cow&nbsp;in Coinhive.Another&nbsp;place we&nbsp;anticipate to&nbsp;see Coinhive&nbsp;implemented is adware and especially browser hijackers. Statistics say there are millions of users who don’t care about intrusive ads and live with adware for many months. There may be no reason for adware writers not to load the Coinhive in the background and mine a few extra Monero before the&nbsp;victim tries to remove their adware or notice high CPU usage caused by mining.Although&nbsp;the Coinhive&nbsp;crew has clearly stated that&nbsp;accountability&nbsp;for how their library&nbsp;is used falls&nbsp;completely on the&nbsp;individual&nbsp;running the miner,&nbsp;malware creators do not care and never abide any rules.</p>
<p><img src="http://bitcoinist.com/wp-content/uploads/2016/06/shutterstock_306049034.jpg" width="800" height="600"/></p>
<h3>PROTECTING YOURSELF FROM THE COINHIVE JS MINER</h3>
<p>At the moment,&nbsp;the Coinhive phenomenon has been called crypto-jacking for the fact of hijacking browsers for crypto-currency mining.Many experts predict a massive wave of crypto-jacking disasters. Already now two ad-blockers,&nbsp; <a href="https://blog.adguard.com/en/adguard_vs_mining/">AdGuard</a> and <a href="https://adblockplus.org/blog/kicking-out-cryptojack">AdBlock Plus</a>, have started to block Coinhive’s JS library.Furthermore,&nbsp;web-developers have launched new Chrome extensions like&nbsp;<a href="https://chrome.google.com/webstore/detail/antiminer-block-coin-mine/abgnbkcdbiafipllamhhmikhgjolhdaf">AntiMiner</a> and <a href="https://chrome.google.com/webstore/detail/minerblock/emikbbbebcdfohonlaifafnoanocnebl">minerBlock</a>&nbsp;that are able to scan Chrome and terminate all mining scripts.Even though this&nbsp;year&nbsp;could be&nbsp;remembered for the <a href="http://bitcoinist.com/microsoft-wanacry-blame-game-ends-nsa-consumers-door/">WannaCry</a> and other <a href="http://myspybot.com/arena-ransomware/">ransomware</a> breakouts, the Equifax and CCleaner breaches,&nbsp;quietly, crypto-currency miners&nbsp;might also become&nbsp;the prevalent threat especially if combined with existing adware.Kaspersky&nbsp;lab claimed to observe&nbsp;about <a href="https://securelist.com/miners-on-the-rise/81706/">1.65 million&nbsp;PC’s</a> affected&nbsp;with mining malware this year. IBM also reported an increase&nbsp;in cryptocurrency&nbsp;malicious software placed on&nbsp;enterprise networks.Based on the Coinhive&nbsp;group messages, the library’s&nbsp;release&nbsp;has shown to have exceeded all expectations.&nbsp;Regardless if created&nbsp;with good&nbsp;motives, Coinhive’s reputation&nbsp;will surely&nbsp;be smeared in the&nbsp;dust in the event that&nbsp;malware&nbsp;writers keep on using it the way they do it now.</p>
<p><em><strong>What do you think of background miners like Coinhive as an alternative to traditional banner and pop-up advertising? Let us know in the comments below.</strong></em></p>
<p><br></p>
</html>
👍  , , ,
properties (23)
post_id15,695,578
authorsajjad711
permlinkcoinhive-new-cash-cow-for-malware-creators
categorysteemit
json_metadata"{"app": "steemit/0.1", "format": "html", "links": ["https://coin-hive.com/blog/status-report", "https://thepiratebay.org/blog/242", "https://coin-hive.com/documentation/miner#miner-set-throttle", "https://torrentfreak.com/how-much-money-can-pirate-bay-make-from-a-cryptocoin-miner-170924/", "https://www.bleepingcomputer.com/news/security/chrome-extension-embeds-in-browser-monero-miner-that-drains-your-cpu/", "https://blog.sucuri.net/2017/09/hacked-websites-mine-crypocurrencies.html", "http://blog.trendmicro.com/trendlabs-security-intelligence/eitest-campaign-uses-tech-support-scams-deliver-coinhives-monero-miner/", "https://blog.adguard.com/en/adguard_vs_mining/", "https://adblockplus.org/blog/kicking-out-cryptojack", "https://chrome.google.com/webstore/detail/antiminer-block-coin-mine/abgnbkcdbiafipllamhhmikhgjolhdaf", "https://chrome.google.com/webstore/detail/minerblock/emikbbbebcdfohonlaifafnoanocnebl", "http://bitcoinist.com/microsoft-wanacry-blame-game-ends-nsa-consumers-door/", "http://myspybot.com/arena-ransomware/", "https://securelist.com/miners-on-the-rise/81706/"], "image": ["http://bitcoinist.com/wp-content/uploads/2017/10/pix-malware-spreading-e1508480862421.jpg"], "tags": ["steemit", "bitcoin", "cryptocurrency", "news", "malware"]}"
created2017-10-20 07:44:30
last_update2017-10-20 07:44:30
depth0
children3
net_rshares3,582,801,558
last_payout2017-10-27 07:44:30
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length8,663
author_reputation-43,987,910,559
root_title"COINHIVE – NEW CASH COW FOR MALWARE CREATORS"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (4)
@cheetah ·
Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://bitcoinist.com/author/dbalaban/
properties (22)
post_id15,695,592
authorcheetah
permlinkcheetah-re-sajjad711coinhive-new-cash-cow-for-malware-creators
categorysteemit
json_metadata{}
created2017-10-20 07:44:51
last_update2017-10-20 07:44:51
depth1
children0
net_rshares0
last_payout2017-10-27 07:44:51
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length138
author_reputation750,854,098,279,735
root_title"COINHIVE – NEW CASH COW FOR MALWARE CREATORS"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@minnowpond ·
@cmtzco has voted on behalf of @minnowpond. If you would like to recieve upvotes from minnowponds team on all your posts, simply FOLLOW @minnowpond. 

To receive an upvote send 0.25 SBD to @minnowpond with your posts url as the memo
To receive an reSteem send 0.75 SBD to @minnowpond with your posts url as the memo
To receive an upvote and a reSteem send 1.00SBD to @minnowpond with your posts url as the memo
properties (22)
post_id15,696,211
authorminnowpond
permlinkre-coinhive-new-cash-cow-for-malware-creators-20171020t075537
categorysteemit
json_metadata"{"app": "pysteem/0.5.4"}"
created2017-10-20 07:55:36
last_update2017-10-20 07:55:36
depth1
children0
net_rshares0
last_payout2017-10-27 07:55:36
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length410
author_reputation13,216,337,213,922
root_title"COINHIVE – NEW CASH COW FOR MALWARE CREATORS"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@schemeshot ·
i think this is a malware that benefits crypto
properties (22)
post_id15,886,966
authorschemeshot
permlinkre-sajjad711-coinhive-new-cash-cow-for-malware-creators-20171022t223056891z
categorysteemit
json_metadata"{"app": "steemit/0.1", "tags": ["steemit"]}"
created2017-10-22 22:31:33
last_update2017-10-22 22:31:33
depth1
children0
net_rshares0
last_payout2017-10-29 22:31:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length46
author_reputation43,096,742,452
root_title"COINHIVE – NEW CASH COW FOR MALWARE CREATORS"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000