{"id":10317,"date":"2017-11-07T06:10:05","date_gmt":"2017-11-07T14:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/07\/news-4090\/"},"modified":"2017-11-07T06:10:05","modified_gmt":"2017-11-07T14:10:05","slug":"news-4090","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/07\/news-4090\/","title":{"rendered":"A look into the global drive-by cryptocurrency mining phenomenon"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 07 Nov 2017 13:00:12 +0000<\/strong><\/p>\n<p>An important milestone in the history of <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/cryptocurrency-works-cybercriminals-love\/\" target=\"_blank\" rel=\"noopener\">cryptomining<\/a> happened around mid-September when a company called <a href=\"https:\/\/coinhive.com\/\">Coinhive<\/a> launched a service that could mine for a digital currency known as Monero directly within a web browser.<\/p>\n<p>JavaScript-based mining is cross-platform compatible and works on all modern browsers. Indeed, just about anybody visiting a particular website can start mining for digital currency with eventual profits going to the owner&#8217;s wallet (in the best case scenario). In itself, browser-based cryptomining is not illegal and could be seen as a viable business model to replace traditional ad banners.<\/p>\n<p>To differentiate browser-based mining from other forms of mining, many started to label these instances as JavaScript miners or browser miners. The simplicity of the Coinhive API integration was one of the reasons for its immediate success, but due to several oversights, the technology was almost instantly abused.<\/p>\n<p>However, many web portals started to run the Coinhive API in non-throttled mode, resulting in cases of\u00a0<a href=\"https:\/\/badpackets.net\/coinhive-miner-found-on-official-showtime-network-websites-in-latest-case-of-cryptojacking\/\" target=\"_blank\" rel=\"noopener\"><em>cryptojacking<\/em><\/a>\u2014utilizing 100 percent of the victims&#8217; CPU to mine for cryptocurrency with no knowledge or consent given by the user.<\/p>\n<p>We decided to call this new phenomenon <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/drive-by-mining-and-ads-the-wild-wild-west\/\" target=\"_blank\" rel=\"noopener\"><em>drive-by mining<\/em><\/a>, due to the way the code is delivered onto unsuspecting users, very much like drive-by downloads. There&#8217;s one important caveat, though: There is no malware infection at the end of the chain.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Drive-by_concepts.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-20390 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Drive-by_concepts.png\" alt=\"\" width=\"560\" height=\"503\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Drive-by_concepts.png 1087w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Drive-by_concepts-300x270.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Drive-by_concepts-600x539.png 600w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p>While the harm may seem minimal, this is not the kind of web experience most people would sign up for. To make matters worse, one does not always know if they are mining for the website owner or for criminal gangs that have found a new monetization tool for the <a href=\"https:\/\/blog.sucuri.net\/2017\/09\/hacked-websites-mine-crypocurrencies.html\" target=\"_blank\" rel=\"noopener\">hacked sites<\/a> they control.<\/p>\n<p>In <a href=\"https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/Drive-by_Mining_FINAL.pdf\" target=\"_blank\" rel=\"noopener\">our full report<\/a>,\u00a0<em>A look into the global drive-by cryptocurrency mining phenomenon<\/em>, we review the events that led to this new technology being abused and explore where users involved in cryptomining against their will are located.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/World_map.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-20391 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/World_map.png\" alt=\"\" width=\"624\" height=\"386\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/World_map.png 1658w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/World_map-300x185.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/World_map-600x371.png 600w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p>To give you an idea of the scope of drive-by mining, Malwarebytes has been <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/why-is-malwarebytes-blocking-coinhive\/\" target=\"_blank\" rel=\"noopener\">blocking the original Coinhive API<\/a> and related proxies an average of 8 million times per day, which added up to approximately 248 million blocks in a single month.<\/p>\n<p>With their new mandatory opt-in API, Coinhive hopes to restore some legitimacy to the technology and, more importantly, push it as a legal means for site owners to earn revenues without having to worry about ad blockers or blacklists. This could also benefit users who might not mind trading some CPU resources for an ad-free online experience.<\/p>\n<p>Time will tell how criminals react, but in the meantime, drive-by mining continues unabated.<\/p>\n<p>For more information on this latest trend in the cryptocurrency world, please <strong><a href=\"https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/Drive-by_Mining_FINAL.pdf\" target=\"_blank\" rel=\"noopener\">download our report<\/a>.<\/strong><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon\/\">A look into the global drive-by cryptocurrency mining phenomenon<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 07 Nov 2017 13:00:12 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon\/' title='A look into the global drive-by cryptocurrency mining phenomenon'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Banner.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>As drive-by downloads slow down, drive-by cryptocurrency mining emerges as the latest annoyance that hijacks our PCs&#8217; CPU.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/exploits\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/privacy\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/coinhive\/\" rel=\"tag\">coinhive<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptocurrencies\/\" rel=\"tag\">cryptocurrencies<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptojacking\/\" rel=\"tag\">Cryptojacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/drive-by-mining\/\" rel=\"tag\">Drive-by mining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/jsminer\/\" rel=\"tag\">JsMiner<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/monero\/\" rel=\"tag\">monero<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon\/' title='A look into the global drive-by cryptocurrency mining phenomenon'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon\/\">A look into the global drive-by cryptocurrency mining phenomenon<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[15078,14147,16415,4503,16416,10987,16417,10538,5897],"class_list":["post-10317","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-coinhive","tag-cryptocurrencies","tag-cryptojacking","tag-cybercrime","tag-drive-by-mining","tag-exploits","tag-jsminer","tag-monero","tag-privacy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10317"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10317\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10317"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}