By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
KriptotekaKriptoteka
  • Home
  • News
    • Web3
    • Crypto News
    • Market Analysis
  • Market
    • AI
    • Altcoins
    • Bitcoin
    • Blockchain
    • CEX
    • Defi
    • DePIN
    • DEX
    • ETFs
    • Ethereum
    • Gaming
    • ICO/IDO
    • Institutions
    • L1&L2
    • Meme
    • NFT tech
    • RWA
    • Stable coins
  • Data
  • Events
  • Learn
  • Reports
  • Podcasts
  • Pro membership
Reading: Staying Safe Amidst Browser-based Cryptocurrency Mining Threats
Share
Notification Show More
Font ResizerAa
Font ResizerAa
KriptotekaKriptoteka
  • Home
  • News
  • Market
  • Data
  • Events
  • Learn
  • Reports
  • Podcasts
  • Pro membership
  • Home
  • News
    • Web3
    • Crypto News
    • Market Analysis
  • Market
    • AI
    • Altcoins
    • Bitcoin
    • Blockchain
    • CEX
    • Defi
    • DePIN
    • DEX
    • ETFs
    • Ethereum
    • Gaming
    • ICO/IDO
    • Institutions
    • L1&L2
    • Meme
    • NFT tech
    • RWA
    • Stable coins
  • Data
  • Events
  • Learn
  • Reports
  • Podcasts
  • Pro membership
Have an existing account? Sign In
Follow US
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Kriptoteka > Market > Blockchain > Staying Safe Amidst Browser-based Cryptocurrency Mining Threats
Blockchain

Staying Safe Amidst Browser-based Cryptocurrency Mining Threats

marcel.mihalic@gmail.com
Last updated: September 13, 2024 3:17 pm
By marcel.mihalic@gmail.com 5 Min Read
Share
SHARE

Qualys Malware Research Labs is excited to introduce the new Qualys BrowserCheck CoinBlocker extension for Chrome, designed to identify and prevent browser-driven cryptocurrency mining, often referred to as cryptojacking.

Understanding Cryptojacking

Cryptojacking incidents utilize the resources of infected devices through malicious JavaScript for mining specific cryptocurrencies. Attackers execute these attacks by embedding scripts onto popular websites, leading unsuspecting visitors to download the JavaScript and unintentionally allocate their system’s resources for mining cryptocurrency that benefits the attackers. This resource-heavy mining process generally uses over 70% CPU, causing a decline in system performance, heightened energy consumption, and potentially irreversible damage.

As cryptojacking allows attackers to generate cryptocurrency without investing in mining hardware, it proves to be extremely lucrative. By July 2018, the overall market capitalization for cryptocurrency had surpassed $270 billion, with more than 1700 projects active. The potential profits for attackers exploiting these projects have made cryptomining an increasingly prominent threat, often overshadowing recent ransomware tactics.

Cryptojacking has also gained traction since it is a less risky endeavor for cybercriminals compared to ransomware, which demands interaction with victims for payment. Moreover, its browser-based nature facilitates the infection of targets more easily than traditional server hacks. As the requirements for resource-intensive cryptomining evolve, the lure for attackers to seize resources has become even stronger.

Cryptojacking and Monero

Monero (XMR), a newer cryptocurrency, is increasingly targeted by cryptojacking attackers due to its mining algorithm (CryptoNight), which is designed for easy integration and offers privacy features that appeal to hackers. Monero’s proof-of-work algorithm can operate using standard desktop or server CPUs, as opposed to the specialized ASIC or GPU setups necessary for traditional mining methods. This characteristic is crucial for newer cryptocurrencies to maintain decentralization and prevent a few users with access to specialized equipment from gaining control over mining. For attackers, this means they can profit significantly from using ordinary CPUs while enjoying added privacy.

WebAssembly (WASM), a technology widely used in browser-based crypto mining, provides a binary executable format for the web, which enhances JavaScript performance in browsers.

Fig. 1 Market capitalization of CryptoNight-based cryptocurrencies, June 2018. Source: https://coinmarketcap.com

Prevalence of Infections

The security research site Bad Packet Reports recently published an article highlighting over 100,000 websites currently infected with cryptojacking malware. The majority of these instances appear to involve exploits for Drupalgeddon 2. This exploit capitalizes on the vulnerability CVE-2018-7600, despite the existence of a patch that has been available for several months. [Reminder: Regular patching is crucial!] Reports indicate that malware campaigns are utilizing this recently publicized exploit to compromise systems and insert mining scripts. When users access these infected sites, their systems unwittingly assist in solving cryptographic puzzles for the attackers.

To safeguard users against unauthorized resource utilization due to rogue coin mining scripts on their devices, it is advised to block access to the following prominent mining services:

  • coinhive[.]com
  • load[.]jsecoin[.]com
  • crypto-loot[.]com
  • coin-have[.]com
  • ppoi[.]org
  • cryptoloot[.]pro
  • papoto[.]com
  • coinlab[.]biz

Introducing Qualys BrowserCheck CoinBlocker Extension for Google Chrome

Drawing upon thorough research conducted by Qualys Malware Research Labs, we are pleased to unveil Qualys BrowserCheck CoinBlocker, a Google Chrome extension aimed at shielding users from browser-based mining attacks.

Here are several screenshots showcasing Qualys BrowserCheck CoinBlocker in action:

Fig. 2 Qualys BrowserCheck CoinBlocker

Fig. 3 Logs of detections from Qualys BrowserCheck CoinBlocker

The Qualys BrowserCheck CoinBlocker extension not only utilizes a domain blacklist but also employs heuristics to identify cryptomining algorithms such as CryptoNight (the algorithm for mining Monero) and its various manifestations.

Identifying Traditional Cryptomining Threats

Moreover, cryptomining extends beyond just browser scripts. Certain attackers infect devices with persistent malware that operates outside of browsers to conduct cryptomining. Security professionals can leverage Qualys Indication of Compromise (IOC) solution to obtain rapid insights into coin mining and additional malware across their organization. The Qualys IOC includes behavior-oriented detection for the following coin mining threats:

  • CryptoMinerA
  • CryptoMinerB
  • CryptoMinerC
  • CryptoMinerD
  • CryptoMinerE
  • Neksminer

As the adaptation and adoption of digital currencies and blockchain technologies broaden, cryptomining continues to represent an escalating online threat. Attackers are using various methods to exploit the systems of unsuspecting users for malicious ends. We recommend that our users routinely scan their systems for vulnerabilities using tools like Qualys BrowserCheck. Maintain robust defenses against cryptomining threats with the Qualys BrowserCheck CoinBlocker extension for Chrome.

Related

You Might Also Like

Coinbase CEO Proposes Crypto Wallet for AI Behind GOAT Meme Coin

Honduras & Colombia Local Grants Overview and Highlights

Rhinestone ERC-7579 Adapter Audit Summary and Findings Report

Victims file $235M class-action suit against WazirX for hack

Tether and Lugano Reveal Satoshi Nakamoto Statue at Forum

Share This Article
Facebook Twitter Email Print
Previous Article RWA Market Hits $12B; Traditional Firms Drive Growth
Next Article XRP ETF Hype Fuels FOMO: Is a Price Rally on the Horizon?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

FacebookLike
TwitterFollow
YoutubeSubscribe
TelegramFollow
- Advertisement -
Ad image

Latest News

4 Cryptos to Challenge Solana: Potential Growth for Investors
Defi
Bitcoin ETF Inflows Exceed $3B, Demand Reaches 6-Month Peak
ETFs
Japan’s Push for Bitcoin and Ethereum ETFs Gains Momentum
Institutions
Ripple Appeals Court Ruling on XRP’s Institutional Sales
Meme
//

We influence millions of users and is the number one Crypto and Web3 news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Lost your password?