Digging virtual money when accessing net wotsite [.] Page
Based on DNS Lookup numbers for domains associated with the Monero digging campaign, ESET believes that the malicious ad domain receives a lot of DNS Lookup traffic like GitHub's Gist service.
Ad blocking tools can prevent JavaScript digging
The good news is that users can protect themselves from the JavaScript-based digging tools hidden in the code with ad blocking tools. The mining will stop when the user leaves the site and does not need any other cleaning tools to remove the malware from the computer.
How to block ads when surfing the web
9 effective ad blocking tools for faster browsing
The ad blocking tool will not help if the code digs with JavaScript loaded from outside the selected domain or ad slot - the case of the website host and download the script from their own domain.
This is not the first time
The mining tool on the browser is nothing new. Services like Bitp.it have tested it since 2011 but eventually collapsed. In 2015, the company called Tidbit provided website owners with a way to dig virtual money on visitors' machines. Authorities think that this is illegal, no different from hacking because Tidbit or website owner does not ask the user to perform that action.
Digging virtual money is an attractive business for malware owners. According to a recent report, at least 1.65 million computers are infected with malware digging virtual money this year.
bkav has issued a warning about the emergence of a new variant of the virtual money code spread via facebook, w32.fbcoinminer that is threatening users in vietnam.
opera 50 web browser the new release candidate has been announced by opera software not only to improve integrated vpn service, but also to prevent pre-coding, can prevent virtual money digging machines from invading your cpu. to dig coding money while browsing the web.
cryptojacking is a new way of using criminals to make money with your hardware. when opening a website in your browser, cryptojacking malware can use the cpu to the maximum to exploit cryptocurrency and it is becoming increasingly popular.
the 'blackmail' malicious code called petya, which appeared under the new version of petrraprap, is similar in effect to the wannacry malicious code, causing the computer system of many multinational companies to be shattered. according to the initial record, these first countries infected with malicious code include ukraine, russia, britain and india.
chances are, websites are using your computer's cpu to dig virtual money without you knowing. if you want to avoid this situation, here is a guide to block the website of virtual money digging through the browser by cpu.
according to windows latest, after installing archive poster, an extension (extension) to support tumblr social network on google chrome browser, it will run in the background and secretly use computer resources to dig up monero causing the computer to run slowly.
a whole 'farm' digs virtual money just on a circuit board. this board is capable of supporting up to 20 graphics cards with the same connection when allowing usb cable to plug directly into the printed circuit board (pcb) via the pcle port.
when mining cryptocurrency becomes popular, website owners use cryptocurrency mining scripts to use the visitor's cpu power to make a profit. so this article will introduce you to some methods of preventing cryptocurrency exploitation in web browsers.