Your computer is helping hackers mine Bitcoin! 3,500 websites have been implanted with "mining scripts," invisibly hijacking users without their notice.

robot
Abstract generation in progress

Security research organization c/side disclosed that up to 3,500 websites have been hacked and implanted with "in-browser mining" programs, with attack traffic spread globally. Users, unaware, are actually helping hackers mine Crypto Assets! (Background: Cold Wallet Trezor warns: Hackers impersonate official emails for phishing attacks, do not share your Wallet Private Key) (Additional context: Brazil's Central Bank's $140 million reserve was hacked! The stolen funds were exchanged for Bitcoin, with hacker costs only $2,760, and service providers as the weak link) The moment you open a shopping page or news website, you think your computer is only working for you, but little do you realize that the CPU behind the scenes is quietly working for strangers. According to security research organization c/side, earlier this month, up to 3,500 websites have been hacked and implanted with "in-browser mining" programs, with attack traffic spread globally, but users are almost oblivious. Hacker attack methods revealed c/side researchers uncovered mining scripts hidden in obfuscated JavaScript, which evaluate the device's computing power and generate backend Web Workers to run mining tasks in parallel without raising any alarms. More importantly, this activity was also found to use WebSockets to obtain mining tasks from external servers, allowing dynamic adjustments of mining intensity based on device capabilities, and correspondingly limiting resource consumption to maintain stealth. The end result of this method is that users mine Crypto Assets while browsing compromised websites, turning their computers into hidden Crypto Assets mining rigs without the user's knowledge or consent. Security researcher Himanshu Anand stated: This is an invisible mining program designed to evade detection by users and security tools. Personal cost: The quiet loss of network resources, electricity, and privacy For the average user, the immediate loss may not be the deposits in their bank account, but it can lead to serious computer sluggishness, prolonged fan activity, and accelerated battery drain of mobile devices. Long-term computational load may shorten hardware lifespan and increase electricity bills. More seriously, websites implanted with mining scripts often spread other malicious programs simultaneously, such as credit card data theft scripts, ultimately exposing personal data and payment information to risk. Corporate impact: Brand trust and compliance costs surge For website operators, being hacked not only damages their brand image but may also trigger regulatory investigations and even lawsuits. Additionally, to combat hacker hijacking, operational teams need to fix servers, update plugins, and trace the sources of malicious scripts, all of which require manpower and time. Once user data is leaked, companies also face additional fines. Defense path: Tools, processes, and education are all essential On a personal level, one can block known mining scripts through antivirus software and browser plugins while being mindful of abnormal heat and power consumption of devices. Regularly updating operating systems and applications also helps to close exploited vulnerabilities. Companies should conduct a comprehensive inventory of this issue and establish rapid patching mechanisms, possibly introducing behavioral analysis or AI detection systems to instantly flag abnormal network traffic. Finally, continuous education and learning are key to combating online threats. Cybersecurity issues resemble a marathon; only by upgrading the "digital immune system" together can users and businesses effectively safeguard computing resources and maintain trust systems. Related reports Microsoft collaborates with FBI to combat North Korean hacker fraud! Freezing 3,000 accounts, capturing US "accomplices" Iran announces "ban on Crypto Assets at night," Israeli hackers destroy Nobitex’s $100 million, triggering on-chain warfare MicroStrategy releases Proof of Reserve on-chain, Michael Saylor: Public addresses are too foolish, making it easy for hackers to target "Your computer is helping hackers mine Bitcoin! 3,500 websites implanted with mining scripts, invisible hijacking leaves users unaware" This article was first published in BlockTempo, the most influential Blockchain news media.

POR0.24%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)