Cryptojacking

Cryptojacking is the act of exploiting a computer to mine cryptocurrencies, often through websites,[1][2][3] against the user's will or while the user is unaware.[4] One notable piece of software used for cryptojacking was Coinhive, which was used in over two-thirds of cryptojacks before its March 2019 shutdown.[5] The cryptocurrencies mined the most often are privacy coins—coins with hidden transaction histories—such as Monero and Zcash.[2][6]

Like most malicious attacks on the computing public, the motive is profit, but unlike other threats, it is designed to remain completely hidden from the user. Cryptojacking malware can lead to slowdowns and crashes due to straining of computational resources.[7]

Bitcoin mining by personal computers infected with malware is being challenged by dedicated hardware, such as FPGA and ASIC platforms, which are more efficient in terms of power consumption and thus may have lower costs than theft of computing resources.[8]

Notable events

In June 2011, Symantec warned about the possibility that botnets could mine covertly for bitcoins.[9] Malware used the parallel processing capabilities of GPUs built into many modern video cards.[10] Although the average PC with an integrated graphics processor is virtually useless for bitcoin mining, tens of thousands of PCs laden with mining malware could produce some results.[11]

In mid-August 2011, bitcoin mining botnets were detected,[12][13][14] and less than three months later, bitcoin mining trojans had infected Mac OS X.[15]

In April 2013, electronic sports organization E-Sports Entertainment was accused of hijacking 14,000 computers to mine bitcoins; the company later settled the case with the State of New Jersey.[16]

German police arrested two people in December 2013 who customized existing botnet software to perform bitcoin mining, which police said had been used to mine at least $950,000 worth of bitcoins.[17]

For four days in December 2013 and January 2014, Yahoo! Europe hosted an ad containing bitcoin mining malware that infected an estimated two million computers using a Java vulnerability.[18][19]

Another software, called Sefnit, was first detected in mid-2013 and has been bundled with many software packages. Microsoft has been removing the malware through its Microsoft Security Essentials and other security software.[20]

Several reports of employees or students using university or research computers to mine bitcoins have been published.[21] On February 20, 2014, a member of the Harvard community was stripped of his or her access to the university's research computing facilities after setting up a Dogecoin mining operation using a Harvard research network, according to an internal email circulated by Faculty of Arts and Sciences Research Computing officials.[22]

Ars Technica reported in January 2018 that YouTube advertisements contained JavaScript code that mined the cryptocurrency Monero.[23]

In 2021, multiple zero-day vulnerabilities were found on Microsoft Exchange servers, allowing remote code execution. These vulnerabilities were exploited to mine cryptocurrency.[24]

Detection

Traditional countermeasures of cryptojacking are host-based and not suitable for corporate networks. A potential solution is a network-based approach called Crypto-Aegis, which uses machine learning to detect cryptocurrency activities in network traffic, even when encrypted or mixed with non-malicious data.[25]

References

  1. ^ Larson, Selena (2018-02-22). "Cryptojackers are hacking websites to mine cryptocurrencies". CNNMoney. Archived from the original on 2022-12-09. Retrieved 2021-04-17.
  2. ^ a b Hatmaker, Taylor (8 May 2018). "Cryptojacking malware was secretly mining Monero on many government and university websites". TechCrunch. Archived from the original on 2023-07-09. Retrieved 2023-07-09.
  3. ^ Lachtar, Nada; Elkhail, Abdulrahman Abu; Bacha, Anys; Malik, Hafiz (2020-07-01). "A Cross-Stack Approach Towards Defending Against Cryptojacking". IEEE Computer Architecture Letters. 19 (2): 126–129. doi:10.1109/LCA.2020.3017457. ISSN 1556-6056. S2CID 222070383.
  4. ^ Caprolu, Maurantonio; Raponi, Simone; Oligeri, Gabriele; Di Pietro, Roberto (2021-04-01). "Cryptomining makes noise: Detecting cryptojacking via Machine Learning". Computer Communications. 171: 126–139. arXiv:1910.09272. doi:10.1016/j.comcom.2021.02.016. S2CID 233402711.
  5. ^ "Coinhive domain repurposed to warn visitors of hacked sites, routers". BleepingComputer. Archived from the original on 2022-12-09. Retrieved 2021-04-17.
  6. ^ Hwang, Inyoung (7 May 2021). "What is cryptojacking? How to detect mining malware - MediaFeed". mediafeed.org. Archived from the original on 2022-12-09. Retrieved 2021-05-11.
  7. ^ "Brutal cryptocurrency mining malware crashes your PC when discovered". ZDNet. Archived from the original on 2022-12-09.
  8. ^ "Bitcoin's Computing Crisis". 31 October 2013. Archived from the original on 14 May 2021. Retrieved 8 July 2023.
  9. ^ Peter Coogan (17 June 2011). "Bitcoin Botnet Mining". Symantec.com. Archived from the original on 7 August 2019. Retrieved 24 January 2012.
  10. ^ Goodin, Dan (16 August 2011). "Malware mints virtual currency using victim's GPU". The Register. Archived from the original on 6 April 2023. Retrieved 31 October 2014.
  11. ^ Ryder, Greg (9 June 2013). "All About Bitcoin Mining: Road To Riches Or Fool's Gold?". Tom's hardware. Archived from the original on 14 April 2023. Retrieved 18 September 2015.
  12. ^ "Infosecurity - Researcher discovers distributed bitcoin cracking trojan malware". Infosecurity-magazine.com. 19 August 2011. Archived from the original on 3 July 2014. Retrieved 24 January 2012.
  13. ^ Lee, Timothy B. (2011-08-18). "More Bitcoin malware: this one uses your GPU for mining". Ars Technica. Archived from the original on 2017-08-22. Retrieved 2023-07-08.
  14. ^ "Trojan.Badminer". Symantec. Archived from the original on 2014-11-29. Retrieved 2014-11-16.
  15. ^ Lucian Constantin (1 November 2011). "Mac OS X Trojan steals processing power to produce Bitcoins: Security researchers warn that DevilRobber malware could slow down infected Mac computers". TechWorld. IDG communications. Archived from the original on 18 November 2016. Retrieved 24 January 2012.
  16. ^ "E-Sports Entertainment settles Bitcoin botnet allegations". BBC News. 20 November 2013. Archived from the original on 7 November 2022. Retrieved 24 November 2013.
  17. ^ Mohit Kumar (9 December 2013). "The Hacker News The Hacker News +1,440,833 ThAlleged Skynet Botnet creator arrested in Germany". Archived from the original on 30 May 2019. Retrieved 8 January 2015.
  18. ^ McGlaun, Shane (9 January 2014). "Yahoo malware turned Euro PCs into bitcoin miners". SlashGear. Archived from the original on 30 May 2019. Retrieved 8 January 2015.
  19. ^ Hern, Alex (2014-01-08). "Yahoo malware turned European computers into bitcoin slaves". The Guardian. ISSN 0261-3077. Archived from the original on 2016-12-09. Retrieved 2023-07-08.
  20. ^ Liat Clark (20 January 2014). "Microsoft stopped Tor running automatically on botnet-infected systems". Archived from the original on 18 October 2022. Retrieved 8 January 2015.
  21. ^ Hornyack, Tim (6 June 2014). "US researcher banned for mining Bitcoin using university supercomputers". PC world.com. IDG Consumer & SMB. Archived from the original on 7 March 2019. Retrieved 13 June 2014.
  22. ^ Delwiche, Theodore R. (February 20, 2014). "Harvard Research Computing Resources Misused for 'Dogecoin' Mining Operation". The Harvard Crimson. Archived from the original on December 25, 2022. Retrieved December 9, 2022.
  23. ^ "Now even YouTube serves ads with CPU-draining cryptocurrency miners". ArsTechnica. January 26, 2018. Archived from the original on January 27, 2023. Retrieved December 9, 2022.
  24. ^ Palmer, Danny. "Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers". ZDNet. Archived from the original on 2023-01-12. Retrieved 2021-04-17.
  25. ^ Caprolu, Maurantonio (2021). "Cryptomining makes noise: Detecting cryptojacking via Machine Learning". Computer Communications. 171: 126–139. arXiv:1910.09272. doi:10.1016/j.comcom.2021.02.016.

Read other articles:

Cel

Melukis dengan cat akrilik di bagian atas dari sebuah cel bertinta. Cel, kependekan dari celluloid, adalah sebuah lembar transparan dimana objek digambar atau dilukis untuk animasi tradisional gambaran tangan. Celluloid sebenarnya (terdiri dari nitrat selulosa dan kapur barus) dipakai pada paruh pertama abad ke-20, namun karena mudah terbakar dan tak stabil secara dimensional, ini kebanyakan diganti dengan asetat selulosa. Dengan kemajuan produksi animasi yang dibantu komputer, pemakaian cel ...

 

Untuk tempat lain yang bernama sama, lihat Chełmek. Chełmek Lambang kebesaranChełmekKoordinat: 50°7′N 19°15′E / 50.117°N 19.250°E / 50.117; 19.250Negara PolandiaVoivodeshipPolandia KecilPowiatOświęcimGminaChełmekPemerintahan • Wali kotaAndrzej SaternusLuas • Total8,31 km2 (321 sq mi)Populasi (2006) • Total9.065 • Kepadatan11/km2 (28/sq mi)Zona waktuUTC+1 (CET) • Musi...

 

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Oktober 2022. Masa Depan Kita The Road Ahead Perancang sampulLaurie Rippon (desain jaket); Annie Leibovitz (foto)NegaraAmerika SerikatBahasaInggrisSubjekTeknologi informasi, information superhighway, jaringan komputer, telekomunikasi[1]GenreNonfiksiPene...

John RawlsJohn Rawls pada tahun 1971Lahir(1921-02-21)21 Februari 1921Baltimore, Maryland, Amerika SerikatMeninggal24 November 2002(2002-11-24) (umur 81)Lexington, Massachusetts, Amerika SerikatPendidikanUniversitas Princeton (BA, PhD)EraFilsuf abad ke-20AliranFilsafat analitikInstitusiUniversitas Cornell, Universitas Harvard, MIT, Universitas PrincetonMinat utamaFilsafat politik, Liberalisme, Keadilan, Politik, teori kontrak sosialGagasan pentingJustice as FairnessPosisi asali...

 

Yustinus Agus Peristiwanto Asisten Logistik Panglima TNIMasa jabatan29 Maret 2023 – 24 Agustus 2023 PendahuluNissa YaniPenggantiBudi SulistyoKepala Pusat Pengadaan TNI ke-2Masa jabatan16 Januari 2023 – 29 Maret 2023 PendahuluDeki Santoso PattinayaPenggantiAgus SudarmantoInspektur Pusat Peralatan Angkatan Darat ke-3Masa jabatan25 Februari 2022 – 16 Januari 2023 PendahuluDwi Angga SuwonoPenggantiJoko Priyanto Informasi pribadiLahir0 September 1965 (umur&...

 

Pour les articles homonymes, voir Bouchardeau. Huguette Bouchardeau Huguette Bouchardeau en 1985. Fonctions Députée française 23 juin 1988 – 1er avril 1993(4 ans, 9 mois et 9 jours) Élection 12 juin 1988 Circonscription 4e du Doubs Législature IXe (Cinquième République) Groupe politique app. SOC Prédécesseur Circonscription créée Successeur Jean Geney 2 avril 1986 – 14 mai 1988(2 ans, 1 mois et 12 jours) Élection 16 mars 1986 Circonscription Doub...

JealousSingel oleh Nick Jonasdari album Nick JonasDirilis8 September 2014 (2014-09-08)FormatCDunduhan digitalDirekam2014GenreSynth-popR&BDurasi3:43LabelIslandRepublicSafehouse Records[1]PenciptaNick JonasNolan LambrozaSimon WilcoxProduserSir NolanKronologi singel Nick Jonas Chains (2014) Jealous (2014) Good Thing (2015) Video musikJealous di YouTube Jealous adalah lagu yang dibawakan oleh penyanyi asal Amerika Serikat, Nick Jonas untuk album studio keduanya,Nick Jonas. Lagu i...

 

CarmencitaCuplikan layar dari film pendek CarmencitaSutradaraWilliam K.L. DicksonProduserWilliam K.L. DicksonPemeranCarmencitaSinematograferWilliam HeiseTanggal rilis 1894 (1894) Durasi0:21 detik pada 30 fpsNegaraAmerika SerikatBahasaBisu Carmencita adalah film dokumenter bisu hitam putih pendek Amerika tahun 1894 yang disutradarai dan diproduksi oleh William K.L. Dickson, penemu asal Skotlandia yang berjasa atas penemuan kamera film di bawah pimpinan Thomas Edison. Film ini diberi judu...

 

1108 Klender Halte TransjakartaHalte Klender pada Januari 2024LetakKotaJakarta TimurDesa/kelurahanKlender, Duren SawitKodepos13470AlamatJalan I Gusti Ngurah RaiKoordinat6°12′49″S 106°54′11″E / 6.21361°S 106.903034°E / -6.21361; 106.903034Koordinat: 6°12′49″S 106°54′11″E / 6.21361°S 106.903034°E / -6.21361; 106.903034Desain HalteStruktur BRT, median jalan bebas 1 tengah Pintu masukMelalui jembatan penyeberangan di Ja...

كأس إسكتلندا 1926–27 تفاصيل الموسم كأس إسكتلندا  البلد المملكة المتحدة  التاريخ بداية:1926  البطل نادي سلتيك  كأس إسكتلندا 1925–26  كأس إسكتلندا 1927–28  تعديل مصدري - تعديل   كأس اسكتلندا 1926–27 (بالإنجليزية: 1926–27 Scottish Cup)‏ هو موسم من كأس اسكتلندا. فاز فيه نادي سلتيك...

 

Fictional character For other people named Richard Webber, see Richard Webber (disambiguation). This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article consists almost entirely of a plot summary. Please help improve the article by adding more real-world context. (October 2011) (Learn how and when to remove this template message) This article needs additional citations for verificatio...

 

Liga Leumit 1981-1982 Competizione Liga Leumit Sport Calcio Edizione 41ª Organizzatore IFA Date dal 12 settembre 1981al 15 maggio 1982 Luogo  Israele Partecipanti 16 Risultati Vincitore Hapoel Kfar Saba(1º titolo) Retrocessioni H. Rishon LeZionBeitar Tel AvivHapoel Petah Tiqwa Statistiche Miglior marcatore Oded Mahnes (26) Incontri disputati 240 Gol segnati 508 (2,12 per incontro) Un incontro della stagione 1981-1982 tra l'Hapoel Kfar Saba, vincitore del torneo, e lo...

Role of Christianity in European colonialism Christianity and colonialism are often closely associated with each other due to the service of Christianity, in its various sects (namely Protestantism, Catholicism and Orthodoxy), as the state religion of the historical European colonial powers, in which Christians likewise made up the majority.[1] Through a variety of methods, Christian missionaries acted as the religious arms of the imperialist powers of Europe.[2] According to ...

 

Forest fragments of varying sizes Ancient monoliths in Mawphlang sacred grove, India The Sacred Hindoo Grove near Chandod on the Banks of the Nerbudda by James Forbes, 1782. Sacred groves of India are forest fragments of varying sizes, which are communally protected, and which usually have a significant religious connotation for the protecting community. Hunting and logging are usually strictly prohibited within these patches.[1] Other forms of forest usage like honey collection and d...

 

Егесиппдр.-греч. Ἡγήσιππος Дата рождения 110[1] Место рождения Палестина Дата смерти 180[2][1][…] Место смерти Иерусалим Род деятельности писатель Язык произведений древнегреческий язык Произведения в Викитеке Егеси́пп, Гегеси́пп, Эгеси́пп (др.-греч. Ἡγήσιππος; у...

Bản đồ Nam Mỹ; kinh tuyến bên phải được vạch ra bởi Inter caetera, còn kinh tuyến bên trái là theo Hiệp ước Tordesillas. Bản đồ vẽ biên giới các quốc gia và đánh dấu các thành phố hiện nay nhằm mục đích minh hoạ. Inter caetera (tiếng La-tinh nghĩa là Giữa các việc khác) là một tông sắc được Giáo hoàng Alexander VI ban hành vào ngày 4 tháng 5 (quarto nonas maii) năm 1493, ban cho hai vị Quân chủ Côn...

 

Stade de France Informazioni generaliStato Francia UbicazioneZAC du Cornillon Nord, F-93210 Saint-Denis Inizio lavori2 maggio 1995 Inaugurazione28 gennaio 1998 Costo290000000 € ProprietarioStato francese ProgettoMichel RegembalMichel MacaryAymeric Zublena Intitolato aFrancia Informazioni tecnichePosti a sedere81 338 Classificazionecategoria 4 UEFA Pista d’atleticaapprontabile se necessario Mat. del terrenoGrassMaster Uso e beneficiariCalcio Francia Rugby a 15 Francia S...

 

2013 song by Magic! RudeSingle by Magic!from the album Don't Kill the Magic B-sideMama Didn't Raise No FoolReleasedOctober 11, 2013 (2013-10-11)RecordedDecember 2012 (2012-12)[1]StudioThe Ox North Hollywood, CaliforniaGenreReggae fusionLength3:44LabelLatiumRCASonySongwriter(s)Nasri AtwehAdam MessingerMark PellizzerBen SpivakAlex TanasProducer(s)Adam MessingerMagic! singles chronology Rude (2013) Don't Kill the Magic (2014) Music videoRude on YouTube Rude is th...

Railway station in village of Swineshead, Lincolnshire, England SwinesheadGeneral informationLocationSwineshead, BostonEnglandCoordinates52°58′11″N 0°11′14″W / 52.96969°N 0.18725°W / 52.96969; -0.18725Grid referenceTF218429Managed byEast Midlands RailwayPlatforms2Other informationStation codeSWEClassificationDfT category F2HistoryOpened1859Passengers2018/19 3,5082019/20 2,6482020/21 7482021/22 1,3002022/23 1,226 NotesPassenger statistics from the Office of ...

 

Disambiguazione – Se stai cercando altri significati, vedi Ponte coperto (disambigua). Antico ponte sul Reno che collega Vaduz e SevelenVista interna che mostra la struttura a travature Un ponte coperto è, in genere, un ponte a travature in legno dotato di un tetto e di due pareti che, nella maggior parte dei ponti di questo genere, creano una chiusura quasi completa.[1] Lo scopo di questa copertura è quello di proteggere le parti strutturali in legno del ponte dalle intemperie. ...