Have your Shit on Lock.. Browser-Based Cryptocurrency Mining has flooded the Internet (Update!!)

fonzerrillii

BGOL Elite Poster
Platinum Member
Now even YouTube serves ads with CPU-draining cryptocurrency miners
Ad campaign lets attackers profit while unwitting users watch videos.
DAN GOODIN - 1/26/2018, 1:27 PM


YouTube was recently caught displaying ads that covertly leach off visitors' CPUs and electricity to generate digital currency on behalf of anonymous attackers, it was widely reported.

Word of the abusive ads started no later than Tuesday, as people took to social media sites to complain their antivirus programs were detecting cryptocurrency mining code when they visited YouTube. The warnings came even when people changed the browser they were using, and the warnings seemed to be limited to times when users were on YouTube.



On Friday, researchers with antivirus provider Trend Micro said the ads helped drive a more than three-fold spike in Web miner detections. They said the attackers behind the ads were abusing Google's DoubleClick ad platform to display them to YouTube visitors in select countries, including Japan, France, Taiwan, Italy, and Spain.

The ads contain JavaScript that mines the digital coin known as Monero. In nine out of 10 cases, the ads will use publicly available JavaScript provided by Coinhive, a cryptocurrency-mining service that's controversial because it allows subscribers to profit by surreptitiously using other people's computers. The remaining 10 percent of the time, the YouTube ads use private mining JavaScript that saves the attackers the 30 percent cut Coinhive takes. Both scripts are programmed to consume 80 percent of a visitor's CPU, leaving just barely enough resources for it to function.

"YouTube was likely targeted because users are typically on the site for an extended period of time," independent security researcher Troy Mursch told Ars. "This is a prime target for cryptojacking malware, because the longer the users are mining for cryptocurrency the more money is made." Mursch said a campaign from September that used the Showtime website to deliver cryptocurrency-mining ads is another example of attackers targeting a video site.

To add insult to injury, the malicious JavaScript in at least some cases was accompanied by graphics that displayed ads for fake AV programs, which scam people out of money and often install malware when they are run.

The above ad was posted on Tuesday. Like the ads analyzed by Trend Micro and posted on social media, it mined Monero coins on behalf of someone with the Coinhive site key of "h7axC8ytzLJhIxxvIHMeC0Iw0SPoDwCK." It's not possible to know how many coins the user has generated so far. Trend Micro said the campaign started January 18. In an e-mail sent as this post was going live, a Google representative wrote:

Mining cryptocurrency through ads is a relatively new form of abuse that violates our policies and one that we’ve been monitoring actively. We enforce our policies through a multi-layered detection system across our platforms which we update as new threats emerge. In this case, the ads were blocked in less than two hours and the malicious actors were quickly removed from our platforms.

It wasn't clear what the representative meant when saying the ads were blocked in less than two hours. Evidence supplied by Trend Micro and on social media showed various ads containing substantially the same JavaScript ran for as long as a week. The representative didn't respond to follow-up questions seeking a timeline of when the abusive ads started and ended.


As the problem of Web-based cryptomining has surged to almost epidemic proportions, a variety of AV programs have started warning of cryptocurrency-mining scripts hosted on websites and giving users the option of blocking the activity. While drive-by cryptocurrency mining is an abuse that drains visitors' electricity and computing resources, there's no indication that it installs ransomware or other types of malware, as long as people don't click on malicious downloads.


This post was updated to add comment from Google.


https://arstechnica.com/information...-ads-with-cpu-draining-cryptocurrency-miners/




Cryptojacking craze that drains your CPU now done by 2,500 sites
Android apps with millions of Google Play downloads also crash the party



A researcher has documented almost 2,500 sites that are actively running cryptocurrency mining code in the browsers of unsuspecting visitors, a finding that suggests the unethical and possibly illegal practice has only picked up steam since it came to light a few weeks ago.

Willem de Groot, an independent security researcher who reported the findings Tuesday, told Ars that he believes all of the 2,496 sites he tracked are running out-of-date software with known security vulnerabilities that have been exploited to give attackers control. Attackers, he said, then used their access to add code that surreptitiously harnesses the CPUs and electricity of visitors to generate the digital currency known as Monero. About 80 percent of those sites, he added, also contain other types of malware that can steal visitors' payment card details.

"Apparently, cyberthieves are squeezing every penny out of their confiscated assets," he said.

One of the affected sites is shop.subaru.com.au. When I visited the site on Tuesday, the fan on my MacBook Pro, which I hadn't heard in months, soon started whirring. The activity monitor showed that about 95 percent of the CPU load was being consumed. As soon as I closed the site, the load dropped to about 9 percent. Besides putting a noticeable strain on my computer, the site also draws additional electricity from my office. The arrangement allows the attackers to reap the benefit of my hardware and electricity without providing anything to me in return. A recent report from security firm Trustwave's SpiderLabs estimated that the electricity cost for a single computer could range from about $2.90 to $5 per month, presumably if the cryptomining page was left open and running continuously over that time. The figure doesn't include the wear and tear on hardware as it performs complex mathematical problems required to generate the digital coins.


A surge of sites and apps are exhausting your CPU to mine cryptocurrencyThe site that makes all of this possible is Coinhive.com, which Ars covered last week. It offers an easy-to-use programming interface that any website can use to turn visitors' computers into vehicles for generating—or in the parlance of cryptocurrency people, mining—Monero. Coinhive gives participating sites a tiny cut of the proceeds and pockets the rest. Coinhive doesn't require that sites provide any notice to users.


de Groot said that about 85 percent of the 2,496 sites he tracked are generating currency on behalf of just two Coinhive accounts. Depending on the total number of visitors, the amount of time they stay on an affected site, and the power of their computers, the revenue collected by those accounts could be considerable, as would be the total amount of additional charges those accounts made to visitors' electric bills. The remaining 15 percent were spread over additional Coinhive accounts, but de Groot has evidence suggesting those accounts are controlled by a single individual or group. Most of the affected sites concealed the connection to Coinhive by adding a link to the domain siteverification.online or one masquerading as a Sucuri firewall. Those disguised sites, in turn, hosted the crypto-mining JavaScript that interacted with Coinhive.

de Groot's findings suggest that drive-by cryptomining has grown more widespread in the week since Ars first covered it or at least that the phenomenon shows no signs of abating. The earlier Ars article cited research from security firm Sucuri that found 500 sites running hacked versions of the WordPress content management system that were participating in the Coinhive mining. Ars also reported that two Android apps with as many as 50,000 downloads from Google Play had recently been caught putting cryptominers inside hidden browser windows. On Wednesday, researchers from Ixia reported finding two additional such apps with as many as 15 million downloads combined. (In fairness, one of the apps informed users it would use their phone's idle time to generate coins and provided a way for that default setting to be turned off. The apps have since been modified to curtail the practice.)

There are other indications that the in-browser cryptomining racket is getting worse. In a report published Tuesday, endpoint security provider Malwarebytes said that on average it performs about 8 million blocks per day to unauthorized mining pages.

People who want to avoid these cryptojacking scams can use Malwarebytes or another antivirus program that blocks abusive pages, install this Chrome extension, or update their computer host file to block coinhive.com and other sites known to facilitate unauthorized mining. As the phenomenon continues to grow and attract copycat services, blocklists will likely have to be updated, requiring regular updates to blocklists as well

https://arstechnica.com/information...s-cpus-picks-up-steam-with-aid-of-2500-sites/
 
yea that shit happend to me a few months back when my

when I got a windows update notice and my laptop restarded on its on..

that fuckin fan noise wouldnt stop...

I removed it by system restore....

havent had a problem since...

they gettin real sneaky with this mining..
 
How does mining affect your own CPU.


Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU
By
The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent.

The additional code drives CPU usage through the roof, making users computers sluggish and hard to use.

SafeBrowse uses same technology tested by The Pirate Bay
The intrusive and highly damaging behavior was noticed almost immediately, as the extension's Web Store page has filled up in the past few hours with negative reviews decrying the surge in CPU resource usage.

SafeBrowse-reviews.png


Looking at the SafeBrowse extension's source code, anyone can easily spot that its authors embedded the Coinhive JavaScript Miner, an in-browser implementation of the CryptoNight mining algorithm used by CryptoNote-based currencies, such as Monero, Dashcoin, DarkNetCoin, and others.

At the time of writing, the Coinhive JavaScript Miner, as described on its website, only supports Monero mining.

SafeBrowse-code.png


The above code starts a process that runs at all times in the browser's background and mines for Moner using the user's resources, but for the profits of the SafeBrowse authors.

Affected users include anyone who installed the SafeBrowse extension. The version featuring the Coinhive miner is 3.2.25. Chrome extensions use an auto-update system, so most SafeBrowse users will be updated to this version in the coming hours and days.

The addition of the Coinhive JavaScript Miner to SafeBrowse comes after The Pirate Bay experimented with the same technology as an alternative to showing ads on its site. Users who visited The Pirate Bay last Saturday did not see ads on the site, but the portal loaded a JavaScript file in their browsers that mined Monero for the torrent portal's owners.

SafeBrowse extension ruins your PC's performance
Bleeping Computer tested the extension, and the Monero mining operation is clearly visible in the Windows Task Manager and Resource Monitor applications, immediately driving up CPU resource usage shortly after installation.

SafeBrowse-TaskManager.png




SafeBrowse-ResourceMonitor.png




The same spike in CPU usage can be seen in Chrome's built-in Task Manager, showing the extension's process taking up over 60% of CPU resources.

SafeBrowse-Chrome-TaskManager.png


The impact on our test computer was felt immediately. Task Manager itself froze and entered a Not Responding state seconds after installing the extension. The computer became sluggish, and the SafeBrowse Chrome extension continued to mine Monero at all times when the Chrome browser was up and running.

It is no wonder that users reacted with vitriol on the extension's review section. A Reddit user is currently trying to convince other users to report SafeBrowse as malware to the Chrome Web Store admins [1, 2].

Not the first time doing something shady
At the time of writing, the SafeBrowse extension was still available for download through the Web Store, and neither its privacy policy or official website mention anything about the recent update and the addition of the Coinhive code.

This is not the first time the extension was caught doing something shady. Back in November 2015, researchers from Detectify Labs found that SafeBrowse, along with many popular Chrome extensions, where loading analytics code without consent in order to track users across the web.

Bleeping Computer has reached out for comment to SafeBrowse. We will update the article with any statement the authors wish to make.

UPDATE [September 19, 15:30 ET]: The SafeBrowse team has provided Bleeping Computer the following statement regarding the extension's recent Monero mining capabilities.

Unfortunately we have no knowledge, apparently has been a hack. I'm currently researching, I have already contacted the Google team. The extension has not received an update for months, so I do not know what it's all about.

While most users know how to remove a Chrome extensions, users who lack the technical skills and need help with removing the SafeBrowse extension can consult a guide we put together here.

https://www.bleepingcomputer.com/ne...in-browser-monero-miner-that-drains-your-cpu/





Every wonder..... Why your new CPU sounds like it's trying to calculate the meaning of life when all you are trying to do is watch a video on Youtube.
 
yea that shit happend to me a few months back when my

when I got a windows update notice and my laptop restarded on its on..

that fuckin fan noise wouldnt stop...

I removed it by system restore....

havent had a problem since...

they gettin real sneaky with this mining..

Yeah I'm posting this thread because I've noticed that alot and I mean alot of sites are adding cyptominers in place of Pop-up adds. And they are ultra slick with it....

I've got my office and home computer's triple locked up and I get notice of that shit...daily.


Here is that new shit that is tripping up people... especially those that like to download shit.

Coin Miner Virus – How to Detect and Remove Them

This article has been made in order to help you in detecting and removing the new Coin Miner malware viruses from your computer and protect it against future infections as well.

Coin Miner viruses are shaping up to be the next big trend that is not likely to dissapear anytime soon. One such malware is the latest discovered BitCoinminer.sx which was very similar to the Adylkuzz Trojan horse based on the code it uses. In addition to this, many new Coin Miner viruses have also appeared, using JavaScript code that is embedded on suspcious websites or in programs and this code filelessly begins to mine for cryptocurrencies, the most often targeted of which are BitCoin and Monero as well as other altcoins. The end goal is to use your GPU and CPU power to generate tokens for the cryptocurrency wallet of the cyber-criminals and the outcome of this is not good, since your PC slows down, freezes and may even crash at some point.

https://sensorstechforum.com/coin-miner-virus-detect-remove/
 
Folks need to leave Chrome alone and don't fuck with any browser that doesn't allow you to install NoScript. https://noscript.net/ On my phone I use Adclear.

LOAPI CRYPTOCURRENCY MINING MALWARE IS SO POWERFUL IT CAN MELT YOUR PHONE

Security researchers have discovered a new form of powerful malware that secretly mines cryptocurrency on a person’s smartphone, which can physically damage the device if it is not detected.

Researchers from the Russia-based cybersecurity firm Kaspersky investigated the malware, dubbed Loapi, which they found hiding in applications in the Android mobile operating system.

The malware works by hijacking a smartphone’s processor and using the computing power to mine cryptocurrency—the process of confirming cryptocurrency transactions by completing complex algorithms that generate new units of the currency.

Keep Up With This Story And More By Subscribing Now

Loapi physically broke a test phone used to study the malware after just two days of the device being infected with it.

“Because of the constant load caused by the mining module and generated traffic, the battery bulged and deformed the phone cover,” the Kaspersky blog states.

The new malware is noted for its versatility, capable of generating money from a user's device by showing them adverts, subscribing them to paid services and using the smartphone’s computing power to mine cryptocurrency.

“Samples of the Loapi family are distributed via advertising campaigns,” the blog states. “Malicious files are downloaded after the user is redirected to the attackers’ malicious web resource. We found more than 20 such resources, whose domains refer to popular antivirus solutions and even a famous porn site.”

"It’s [sic] creators have implemented almost the entire spectrum of techniques for attacking devices...The only thing missing is user espionage, but the modular architecture of this Trojan means it’s possible to add this sort of functionality at any time."

Loapi is part of a growing trend among cyber criminals to leverage the processing power of computers, smartphones and other devices in order to generate revenue from mining cryptocurrency.

In October, research by ad blocking firm AdGuard found that over 500 million people are inadvertently mining cryptocurrencies through their devices after visiting websites that run mining software in the background.

Separate research from earlier this year found that cryptocurrency mining software was present in popular websites, including Showtime and the torrenting site ThePirateBay.

In the future, industry experts have suggested that browser mining could become a legitimate and ethical way of making money for websites, so long as permission from the visitor is requested first.

http://www.newsweek.com/loapi-crypt...are-so-powerful-it-can-melt-your-phone-752517
 
Now even YouTube serves ads with CPU-draining cryptocurrency miners
Ad campaign lets attackers profit while unwitting users watch videos.
DAN GOODIN - 1/26/2018, 1:27 PM


YouTube was recently caught displaying ads that covertly leach off visitors' CPUs and electricity to generate digital currency on behalf of anonymous attackers, it was widely reported.

Word of the abusive ads started no later than Tuesday, as people took to social media sites to complain their antivirus programs were detecting cryptocurrency mining code when they visited YouTube. The warnings came even when people changed the browser they were using, and the warnings seemed to be limited to times when users were on YouTube.



On Friday, researchers with antivirus provider Trend Micro said the ads helped drive a more than three-fold spike in Web miner detections. They said the attackers behind the ads were abusing Google's DoubleClick ad platform to display them to YouTube visitors in select countries, including Japan, France, Taiwan, Italy, and Spain.

The ads contain JavaScript that mines the digital coin known as Monero. In nine out of 10 cases, the ads will use publicly available JavaScript provided by Coinhive, a cryptocurrency-mining service that's controversial because it allows subscribers to profit by surreptitiously using other people's computers. The remaining 10 percent of the time, the YouTube ads use private mining JavaScript that saves the attackers the 30 percent cut Coinhive takes. Both scripts are programmed to consume 80 percent of a visitor's CPU, leaving just barely enough resources for it to function.

"YouTube was likely targeted because users are typically on the site for an extended period of time," independent security researcher Troy Mursch told Ars. "This is a prime target for cryptojacking malware, because the longer the users are mining for cryptocurrency the more money is made." Mursch said a campaign from September that used the Showtime website to deliver cryptocurrency-mining ads is another example of attackers targeting a video site.

To add insult to injury, the malicious JavaScript in at least some cases was accompanied by graphics that displayed ads for fake AV programs, which scam people out of money and often install malware when they are run.

The above ad was posted on Tuesday. Like the ads analyzed by Trend Micro and posted on social media, it mined Monero coins on behalf of someone with the Coinhive site key of "h7axC8ytzLJhIxxvIHMeC0Iw0SPoDwCK." It's not possible to know how many coins the user has generated so far. Trend Micro said the campaign started January 18. In an e-mail sent as this post was going live, a Google representative wrote:

Mining cryptocurrency through ads is a relatively new form of abuse that violates our policies and one that we’ve been monitoring actively. We enforce our policies through a multi-layered detection system across our platforms which we update as new threats emerge. In this case, the ads were blocked in less than two hours and the malicious actors were quickly removed from our platforms.

It wasn't clear what the representative meant when saying the ads were blocked in less than two hours. Evidence supplied by Trend Micro and on social media showed various ads containing substantially the same JavaScript ran for as long as a week. The representative didn't respond to follow-up questions seeking a timeline of when the abusive ads started and ended.


As the problem of Web-based cryptomining has surged to almost epidemic proportions, a variety of AV programs have started warning of cryptocurrency-mining scripts hosted on websites and giving users the option of blocking the activity. While drive-by cryptocurrency mining is an abuse that drains visitors' electricity and computing resources, there's no indication that it installs ransomware or other types of malware, as long as people don't click on malicious downloads.


This post was updated to add comment from Google.


https://arstechnica.com/information...-ads-with-cpu-draining-cryptocurrency-miners/




Cryptojacking craze that drains your CPU now done by 2,500 sites
Android apps with millions of Google Play downloads also crash the party



A researcher has documented almost 2,500 sites that are actively running cryptocurrency mining code in the browsers of unsuspecting visitors, a finding that suggests the unethical and possibly illegal practice has only picked up steam since it came to light a few weeks ago.

Willem de Groot, an independent security researcher who reported the findings Tuesday, told Ars that he believes all of the 2,496 sites he tracked are running out-of-date software with known security vulnerabilities that have been exploited to give attackers control. Attackers, he said, then used their access to add code that surreptitiously harnesses the CPUs and electricity of visitors to generate the digital currency known as Monero. About 80 percent of those sites, he added, also contain other types of malware that can steal visitors' payment card details.

"Apparently, cyberthieves are squeezing every penny out of their confiscated assets," he said.

One of the affected sites is shop.subaru.com.au. When I visited the site on Tuesday, the fan on my MacBook Pro, which I hadn't heard in months, soon started whirring. The activity monitor showed that about 95 percent of the CPU load was being consumed. As soon as I closed the site, the load dropped to about 9 percent. Besides putting a noticeable strain on my computer, the site also draws additional electricity from my office. The arrangement allows the attackers to reap the benefit of my hardware and electricity without providing anything to me in return. A recent report from security firm Trustwave's SpiderLabs estimated that the electricity cost for a single computer could range from about $2.90 to $5 per month, presumably if the cryptomining page was left open and running continuously over that time. The figure doesn't include the wear and tear on hardware as it performs complex mathematical problems required to generate the digital coins.


A surge of sites and apps are exhausting your CPU to mine cryptocurrencyThe site that makes all of this possible is Coinhive.com, which Ars covered last week. It offers an easy-to-use programming interface that any website can use to turn visitors' computers into vehicles for generating—or in the parlance of cryptocurrency people, mining—Monero. Coinhive gives participating sites a tiny cut of the proceeds and pockets the rest. Coinhive doesn't require that sites provide any notice to users.


de Groot said that about 85 percent of the 2,496 sites he tracked are generating currency on behalf of just two Coinhive accounts. Depending on the total number of visitors, the amount of time they stay on an affected site, and the power of their computers, the revenue collected by those accounts could be considerable, as would be the total amount of additional charges those accounts made to visitors' electric bills. The remaining 15 percent were spread over additional Coinhive accounts, but de Groot has evidence suggesting those accounts are controlled by a single individual or group. Most of the affected sites concealed the connection to Coinhive by adding a link to the domain siteverification.online or one masquerading as a Sucuri firewall. Those disguised sites, in turn, hosted the crypto-mining JavaScript that interacted with Coinhive.

de Groot's findings suggest that drive-by cryptomining has grown more widespread in the week since Ars first covered it or at least that the phenomenon shows no signs of abating. The earlier Ars article cited research from security firm Sucuri that found 500 sites running hacked versions of the WordPress content management system that were participating in the Coinhive mining. Ars also reported that two Android apps with as many as 50,000 downloads from Google Play had recently been caught putting cryptominers inside hidden browser windows. On Wednesday, researchers from Ixia reported finding two additional such apps with as many as 15 million downloads combined. (In fairness, one of the apps informed users it would use their phone's idle time to generate coins and provided a way for that default setting to be turned off. The apps have since been modified to curtail the practice.)

There are other indications that the in-browser cryptomining racket is getting worse. In a report published Tuesday, endpoint security provider Malwarebytes said that on average it performs about 8 million blocks per day to unauthorized mining pages.

People who want to avoid these cryptojacking scams can use Malwarebytes or another antivirus program that blocks abusive pages, install this Chrome extension, or update their computer host file to block coinhive.com and other sites known to facilitate unauthorized mining. As the phenomenon continues to grow and attract copycat services, blocklists will likely have to be updated, requiring regular updates to blocklists as well

https://arstechnica.com/information...s-cpus-picks-up-steam-with-aid-of-2500-sites/


Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU
By
The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent.

The additional code drives CPU usage through the roof, making users computers sluggish and hard to use.

SafeBrowse uses same technology tested by The Pirate Bay
The intrusive and highly damaging behavior was noticed almost immediately, as the extension's Web Store page has filled up in the past few hours with negative reviews decrying the surge in CPU resource usage.

SafeBrowse-reviews.png


Looking at the SafeBrowse extension's source code, anyone can easily spot that its authors embedded the Coinhive JavaScript Miner, an in-browser implementation of the CryptoNight mining algorithm used by CryptoNote-based currencies, such as Monero, Dashcoin, DarkNetCoin, and others.

At the time of writing, the Coinhive JavaScript Miner, as described on its website, only supports Monero mining.

SafeBrowse-code.png


The above code starts a process that runs at all times in the browser's background and mines for Moner using the user's resources, but for the profits of the SafeBrowse authors.

Affected users include anyone who installed the SafeBrowse extension. The version featuring the Coinhive miner is 3.2.25. Chrome extensions use an auto-update system, so most SafeBrowse users will be updated to this version in the coming hours and days.

The addition of the Coinhive JavaScript Miner to SafeBrowse comes after The Pirate Bay experimented with the same technology as an alternative to showing ads on its site. Users who visited The Pirate Bay last Saturday did not see ads on the site, but the portal loaded a JavaScript file in their browsers that mined Monero for the torrent portal's owners.

SafeBrowse extension ruins your PC's performance
Bleeping Computer tested the extension, and the Monero mining operation is clearly visible in the Windows Task Manager and Resource Monitor applications, immediately driving up CPU resource usage shortly after installation.

SafeBrowse-TaskManager.png




SafeBrowse-ResourceMonitor.png




The same spike in CPU usage can be seen in Chrome's built-in Task Manager, showing the extension's process taking up over 60% of CPU resources.

SafeBrowse-Chrome-TaskManager.png


The impact on our test computer was felt immediately. Task Manager itself froze and entered a Not Responding state seconds after installing the extension. The computer became sluggish, and the SafeBrowse Chrome extension continued to mine Monero at all times when the Chrome browser was up and running.

It is no wonder that users reacted with vitriol on the extension's review section. A Reddit user is currently trying to convince other users to report SafeBrowse as malware to the Chrome Web Store admins [1, 2].

Not the first time doing something shady
At the time of writing, the SafeBrowse extension was still available for download through the Web Store, and neither its privacy policy or official website mention anything about the recent update and the addition of the Coinhive code.

This is not the first time the extension was caught doing something shady. Back in November 2015, researchers from Detectify Labs found that SafeBrowse, along with many popular Chrome extensions, where loading analytics code without consent in order to track users across the web.

Bleeping Computer has reached out for comment to SafeBrowse. We will update the article with any statement the authors wish to make.

UPDATE [September 19, 15:30 ET]: The SafeBrowse team has provided Bleeping Computer the following statement regarding the extension's recent Monero mining capabilities.

Unfortunately we have no knowledge, apparently has been a hack. I'm currently researching, I have already contacted the Google team. The extension has not received an update for months, so I do not know what it's all about.

While most users know how to remove a Chrome extensions, users who lack the technical skills and need help with removing the SafeBrowse extension can consult a guide we put together here.

https://www.bleepingcomputer.com/ne...in-browser-monero-miner-that-drains-your-cpu/





Every wonder..... Why your new CPU sounds like it's trying to calculate the meaning of life when all you are trying to do is watch a video on Youtube.

Yeah I'm posting this thread because I've noticed that alot and I mean alot of sites are adding cyptominers in place of Pop-up adds. And they are ultra slick with it....

I've got my office and home computer's triple locked up and I get notice of that shit...daily.


Here is that new shit that is tripping up people... especially those that like to download shit.

Coin Miner Virus – How to Detect and Remove Them

This article has been made in order to help you in detecting and removing the new Coin Miner malware viruses from your computer and protect it against future infections as well.

Coin Miner viruses are shaping up to be the next big trend that is not likely to dissapear anytime soon. One such malware is the latest discovered BitCoinminer.sx which was very similar to the Adylkuzz Trojan horse based on the code it uses. In addition to this, many new Coin Miner viruses have also appeared, using JavaScript code that is embedded on suspcious websites or in programs and this code filelessly begins to mine for cryptocurrencies, the most often targeted of which are BitCoin and Monero as well as other altcoins. The end goal is to use your GPU and CPU power to generate tokens for the cryptocurrency wallet of the cyber-criminals and the outcome of this is not good, since your PC slows down, freezes and may even crash at some point.

https://sensorstechforum.com/coin-miner-virus-detect-remove/

LOAPI CRYPTOCURRENCY MINING MALWARE IS SO POWERFUL IT CAN MELT YOUR PHONE

Security researchers have discovered a new form of powerful malware that secretly mines cryptocurrency on a person’s smartphone, which can physically damage the device if it is not detected.

Researchers from the Russia-based cybersecurity firm Kaspersky investigated the malware, dubbed Loapi, which they found hiding in applications in the Android mobile operating system.

The malware works by hijacking a smartphone’s processor and using the computing power to mine cryptocurrency—the process of confirming cryptocurrency transactions by completing complex algorithms that generate new units of the currency.

Keep Up With This Story And More By Subscribing Now

Loapi physically broke a test phone used to study the malware after just two days of the device being infected with it.

“Because of the constant load caused by the mining module and generated traffic, the battery bulged and deformed the phone cover,” the Kaspersky blog states.

The new malware is noted for its versatility, capable of generating money from a user's device by showing them adverts, subscribing them to paid services and using the smartphone’s computing power to mine cryptocurrency.

“Samples of the Loapi family are distributed via advertising campaigns,” the blog states. “Malicious files are downloaded after the user is redirected to the attackers’ malicious web resource. We found more than 20 such resources, whose domains refer to popular antivirus solutions and even a famous porn site.”

"It’s [sic] creators have implemented almost the entire spectrum of techniques for attacking devices...The only thing missing is user espionage, but the modular architecture of this Trojan means it’s possible to add this sort of functionality at any time."

Loapi is part of a growing trend among cyber criminals to leverage the processing power of computers, smartphones and other devices in order to generate revenue from mining cryptocurrency.

In October, research by ad blocking firm AdGuard found that over 500 million people are inadvertently mining cryptocurrencies through their devices after visiting websites that run mining software in the background.

Separate research from earlier this year found that cryptocurrency mining software was present in popular websites, including Showtime and the torrenting site ThePirateBay.

In the future, industry experts have suggested that browser mining could become a legitimate and ethical way of making money for websites, so long as permission from the visitor is requested first.

http://www.newsweek.com/loapi-crypt...are-so-powerful-it-can-melt-your-phone-752517


EXTREMELY INFORMATIVE !!!!!!!!!!!!
GOOD SHIT TO KNOW !!!!!!!!



:thumbsup::thumbsup::thumbsup:



.
 
good looking out, famo!

spyhunter 4 was a kick ass program.

it found all sorts of evil shit. :smh:
 
Folks need to leave Chrome alone and don't fuck with any browser that doesn't allow you to install NoScript. https://noscript.net/ On my phone I use Adclear.

I actually use a combination of Adguard, Adblock, Popup Blocker, and JTeam Security (link is below).
https://junookyo.blogspot.com/


And then my computer runs multiple intrusion protections programs. Norton, CC Cleaner and Spybot have proven to be a winning combination.
 
I actually use a combination of Adguard, Adblock, Popup Blocker, and JTeam Security (link is below).
https://junookyo.blogspot.com/


And then my computer runs multiple intrusion protections programs. Norton, CC Cleaner and Spybot have proven to be a winning combination.

I used Adblock Plus for years and my browsers ran OK. I switched to Ublock Origin and they run great. Props to the member that put me on to Ublock Origin not to be confused with Ublock and props to @Rocky Miavia for putting me on to NoScript in 2006. I also use Ghostery and HTTPS Everywhere. I have those add ons running on 6 of my 7 browsers. On IE I have Adblock Plus because raggedy ass IE doesn't take all the good stuff. I only use IE to view gifs so it's not a problem. Try out Ublock Origin and see for yourself.
 
I used Adblock Plus for years and my browsers ran OK. I switched to Ublock Origin and they run great. Props to the member that put me on to Ublock Origin not to be confused with Ublock and props to @Rocky Miavia for putting me on to NoScript in 2006. I also use Ghostery and HTTPS Everywhere. I have those add ons running on 6 of my 7 browsers. On IE I have Adblock Plus because raggedy ass IE doesn't take all the good stuff. I only use IE to view gifs so it's not a problem. Try out Ublock Origin and see for yourself.
Do any of them cost money?

Got a link for UBlock Origin? Or all of em?
 
Fucking shit is unreal...

Just got two JVCryptominer Attack hits from a Tumblr and an Instagram page... This is the first time I've seen attempted intrusions from regular tumblr and instagram pages. Fam have your shit on lock and be careful on these streets.
 
I used Adblock Plus for years and my browsers ran OK. I switched to Ublock Origin and they run great. Props to the member that put me on to Ublock Origin not to be confused with Ublock and props to @Rocky Miavia for putting me on to NoScript in 2006. I also use Ghostery and HTTPS Everywhere. I have those add ons running on 6 of my 7 browsers. On IE I have Adblock Plus because raggedy ass IE doesn't take all the good stuff. I only use IE to view gifs so it's not a problem. Try out Ublock Origin and see for yourself.

Good looking out... I need to work on getting similar addon's for IE. I hardly use it... but right now it's the only browser that can access Caselink, the Chapter 13 Trustee's network and my internet Fax. With all these cyrpto hits... I need to get that shit on lock. Right now all I have is Adblock Plus.


But on the real be careful with these Tumblr sites... I'm still shocked I got an attempted attack from this one site.
 
BIG Update.... Reverse Image Search is Compromised

Be careful with Google Reverse image search on CSI cases... I've noticed a recent trend of Google showing Picture links that when you click them go directly to a Cryptomining attack site. The picture is nothing more then a placeholder for an attack.... Right now I've only seen this with Porn pictures... So be sure to really look at the links when you are working on a CSI case. DO NOT JUST RANDOMLY CLICK... Reverse image search has been compromised.


For Example.... If you reverse Image Search this picture...

2.jpg


You will See a link for

celebrity-leaks(.)net/big-brother-star-louise-cliffe-nude-leaked/ -- THIS SITE IS A STRAIGHT UP CRYPTOMINING TRAP.

The only way you would know is if you have good Virus protection up that notifies of Crypto attacks. I use Norton. I mention this because the embed that this site uses somehow bypasses the Browser addons. I just clicked this page with UBlock Orgin's up and Norton still had to block the attempted intrusion...



Here is another example of how they have gotten smart.


Searching this Photo... Will Show you this photo as a similar photo........

196981176d1b138d8fd74430fd24ba11--beautiful-body-beautiful-females.jpg




Most would have the natural reaction of clicking the link to the photo... to see who this is.
Well the link to this photo is kanonitv(.)net ------ This shit is nothing. There is nothing on the site. The is nothing more then a place holder for a Cryptomining trap. It is straight up like a venus fly trap.


These are just two of the examples that I've seen this month.
 
Do any of them cost money?

Got a link for UBlock Origin? Or all of em?

They're free. You can Google them or go into the add ons/extensions option of your browser and add them.

Good looking out... I need to work on getting similar addon's for IE. I hardly use it... but right now it's the only browser that can access Caselink, the Chapter 13 Trustee's network and my internet Fax. With all these cyrpto hits... I need to get that shit on lock. Right now all I have is Adblock Plus.


But on the real be careful with these Tumblr sites... I'm still shocked I got an attempted attack from this one site.

Pinterest is another one. Pretty much any popular site featuring media. IE is still OK for trusted and secure sites. It's the wild west out here on these interwebs to the point the deep web doesn't seem as dangerous anymore.
 
Ok switched over to Firefox, All Chrome bookmarks and data moved over.

I have zenmate, ghostery and icloud as add-ons.
 
Back
Top