The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    How to Block Cryptocurrency Miners in Your Web Browser

    Discussion in 'Security and Anti-Virus Software' started by Tinderbox (UK), Nov 28, 2017.

  1. Tinderbox (UK)

    Tinderbox (UK) BAKED BEAN KING

    Reputations:
    4,745
    Messages:
    8,513
    Likes Received:
    3,823
    Trophy Points:
    431
    https://www.howtogeek.com/334018/how-to-block-cryptocurrency-miners-in-your-web-browser/

    Option: Install the “No Coin” Browser Extension

    John.
     
    hmscott and Dr. AMK like this.
  2. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    I've started using ScriptSafe v1.0.9.3 instead of NoScript, and ScriptSafe is supposed to catch and block the coin miner's already, but for fun I loaded MinerBlock 1.1.4 to see if it catches anything :)

    And, I still use ublock Origin and Privacy Badger. Training ScriptSafe is easier(?) than NoScript, at least I like the ScriptSafe interface better.

    There are two new extensions I haven't had a chance to play with much, uBlock Origin Extra - just loaded it - only applies to certain sites, and uMatrix a next generation NoScript/ScriptSafe, which I haven't tried yet.

    How to stop sites from ‘borrowing’ your CPU to mine cryptocurrency
    https://thenextweb.com/apps/2017/09/19/cpu-cryptocurrency-miner-blocker/
     
    Last edited: Jan 26, 2018
    Dr. AMK and cfe like this.
  3. Tinderbox (UK)

    Tinderbox (UK) BAKED BEAN KING

    Reputations:
    4,745
    Messages:
    8,513
    Likes Received:
    3,823
    Trophy Points:
    431
  4. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    scriptsafe only seems to include these coin mining domains in their filters:

    coinhive.com
    coin-hive.com
    coinhive.com
    coin-hive.com
    *.coinhive.com
    *.coin-hive.com
    jsecoin.com
    *.jsecoin.com
    server.jsecoin.com
    *.server.jsecoin.com
    load.jsecoin.com
    *.load.jsecoin.com

    There may be more included, but these are the ones I got a warning from the app when I tried to add them to the user blacklist:

    Some Domains Not Imported
    The following domains were not imported as they are invalid (the others were successfully imported):
    • coinhive.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • coin-hive.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • coinhive.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • coin-hive.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • *.coinhive.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • *.coin-hive.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • jsecoin.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • *.jsecoin.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • server.jsecoin.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • *.server.jsecoin.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • load.jsecoin.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    • *.load.jsecoin.com (provider of unwanted content (see "Block Unwanted Content" and/or "Antisocial Mode")
    I was able to add these coin mining domains without conflict to the user blacklist:

    static.reasedoper.pw
    mataharirama.xyz
    listat.biz
    lmodr.biz
    minecrunch.co
    minemytraffic.com
    crypto-loot.com
    *.crypto-loot.com
    *.2giga.link
    ppoi.org
    *.ppoi.org
    coinerra.com
    coin-have.com
    kisshentai.net
    miner.pr0gramm.com
    kiwifarms.net
    anime.reactor.cc
    joyreactor.cc
    kissdoujin.com
    ppoi.org
    minero.pw
    coinnebula.com
    *.coinnebula.com
    *.afminer.com
    *.coinblind.com
    webmine.cz
    monerominer.rocks
    cdn.cloudcoins.co
    coinlab.biz
    papoto.com
    cookiescript.info
    *.cookiescript.info
    cookiescriptcdn.pro
    rocks.io
    *.rocks.io
    ad-miner.com
    *.ad-miner.com
    party-nngvitbizn.now.sh
    cryptoloot.pro
    *.host.d-ns.ga
    *.host.d-ns.ga
    *.host.d-ns.ga
    baiduccdn1.com
    jsccnn.com
    jscdndel.com
    mine.nahnoji.cz
    *.goredirect.party
    miner.pr0gramm.com
    miner.cryptobara.com
    digger.cryptobara.com
    kickass.cd
    *.morningdigit.com

    And... another 3600 domains to block from coin-hive block:
    https://github.com/Marfjeh/coinhive-block/blob/master/domains

    If anyone has any additional domains to be blocked to avoid getting hit by browser mining please post them. :)
     
    Last edited: Jan 26, 2018
    Dr. AMK likes this.
  5. saturnotaku

    saturnotaku Notebook Nobel Laureate

    Reputations:
    4,879
    Messages:
    8,926
    Likes Received:
    4,705
    Trophy Points:
    431
    Dr. AMK and hmscott like this.
  6. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,604
    Messages:
    23,561
    Likes Received:
    36,864
    Trophy Points:
    931
    Say no to extensions bro...

    Here is my Ad Block Plus filters list...

    [​IMG]

    Where to add them from?

    1) https://adblockplus.org/en/features#malware (to disable Tracking and Malware Domains)

    2) https://facebook.adblockplus.me/en/ (to disable Facebook Ads and nuisances)

    3) https://adblockplus.org/en/subscriptions (go there then use CTRL + F and type coin to find the No Coin Filter)

    Be Smart....be like Phoenix... :eek: [​IMG]
     
    Dr. AMK, Raiderman and hmscott like this.
  7. Mobius 1

    Mobius 1 Notebook Nobel Laureate

    Reputations:
    3,447
    Messages:
    9,069
    Likes Received:
    6,376
    Trophy Points:
    681
    I think it's better to use ublock instead... Just my 2cents
     
    Dr. AMK and hmscott like this.
  8. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,604
    Messages:
    23,561
    Likes Received:
    36,864
    Trophy Points:
    931
    Tried it, what I don't like about it is this:

    1) a bit confusing to choose the filters vs the above links that I posted. I have to sit and choose from a long list of filters although you can save the settings so it's not that big of a deal

    2) what IS a big of a deal to me is, I have added the Facebook Annoyances Filters posted above in the custom filters but they would never work on uBlock and I cannot stand the Facebook Suggested page, friends, ads, bla bla bla on the right hand side of the screen so that was the show stopper for me.
     
    Dr. AMK and Raiderman like this.
  9. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    The SafeScript app has "Privacy" blocking as well as lists, and enabling "Anti Social Mode" gets rid of all the "fluff" like Facebook, Twitter, etc etc etc etc.

    Antisocial Mode: (Default: disabled; always remove social widgets/buttons, even if whitelisted)
    For more comprehensive blocking, check out Privacy Badger, Disconnect, Blur, and/or uBlock Origin with all of the subscription lists on the Fanboy site)

    And, that brings up how to block social stuff using uBlock Origin - use the Fanboy site lists.

    Script Safe has a few settings pages, but in essence I enabled all the blocking available, and start by "Allow"ing new sites + Allow servers in that domain (1 at a time as they appear) + Clipboard + img / vid / functional as required for the site to work, and I am blocking a lot more stuff than before.

    I also have Adblocker for Youtube (Chrome), catches stuff on YT best, and also blocked FB (until SafeScript took over FB / social widget blocking):
    Adblocker for Youtube.JPG

    Adblock Plus is great, used it for a looong time, but uBlock and then uBlock Origin (original author) seems more efficient + it's easier to manage (barely, but better with log), ScriptSafe is way better to manage than NoScript and I am catching / blocking a lot more stuff with minimal tuning.

    This site has the Fanboy lists Complete, broken up individual lists + Fanboy's Social Blocking List:
    https://filterlists.com/
     
    Last edited: Jan 26, 2018
    Dr. AMK likes this.
  10. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    The list of sites I posted to blacklist uses NoCoin blacklist.txt as a source - I added them to the SafeScript user blacklist; it already had some of the NoCoin domains blocked but not all of them.
     
    Last edited: Jan 26, 2018
    Dr. AMK likes this.
  11. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Now even YouTube serves ads with CPU-draining cryptocurrency miners
    Ad campaign lets attackers profit while unwitting users watch videos.
    DAN GOODIN - 1/26/2018, 11:27 AM
    https://arstechnica.com/information...-ads-with-cpu-draining-cryptocurrency-miners/
    youtube-cryptocurrency-mining-800x425.jpg
    "YouTube was recently caught displaying ads that covertly leach off visitors' CPUs and electricity to generate digital currency on behalf of anonymous attackers, it was widely reported.

    Word of the abusive ads started no later than Tuesday, as people took to social media sites to complain their antivirus programs were detecting cryptocurrency mining code when they visited YouTube.

    The warnings came even when people changed the browser they were using, and the warnings seemed to be limited to times when users were on YouTube.
    Great now my browser everytime I watch youtube... my anti virus always blocking coinhive because malware . Idk much about it but this is getting annoying and I need a solution please T n T

    — Arung (@ArungLaksmana) January 23, 2018

    Hey @avast_antivirus seems that you are blocking crypto miners ( #coinhive) in @YouTube #ads
    Thank you :) https://t.co/p2JjwnQyxz

    — Diego Betto (@diegobetto) January 25, 2018

    Por lo visto @YouTube es muy gracioso y no le bastaba con bajarnos la audiencia, ahora van y nos meten el JavaScript de Coinhive para utilizar nuestros dispositivos para minar Monero! De verdad, @Google! Que leeches estáis haciendo con YouTube?? pic.twitter.com/NzMUMlArJs

    — Ervo (@Mystic_Ervo) January 24, 2018

    On Friday, researchers with antivirus provider Trend Micro said the ads helped drive a more than three-fold spike in Web miner detections. They said the attackers behind the ads were abusing Google's DoubleClick ad platform to display them to YouTube visitors in select countries, including Japan, France, Taiwan, Italy, and Spain.

    The ads contain JavaScript that mines the digital coin known as Monero. In nine out of 10 cases, the ads will use publicly available JavaScript provided by Coinhive, a cryptocurrency-mining service that's controversial because it allows subscribers to profit by surreptitiously using other people's computers. The remaining 10 percent of the time, the YouTube ads use private mining JavaScript that saves the attackers the 30 percent cut Coinhive takes. Both scripts are programmed to consume 80 percent of a visitor's CPU, leaving just barely enough resources for it to function.

    "YouTube was likely targeted because users are typically on the site for an extended period of time," independent security researcher Troy Mursch told Ars. "This is a prime target for cryptojacking malware, because the longer the users are mining for cryptocurrency the more money is made." Mursch said a campaign from September that used the Showtime website to deliver cryptocurrency-mining ads is another example of attackers targeting a video site.

    To add insult to injury, the malicious JavaScript in at least some cases was accompanied by graphics that displayed ads for fake AV programs, which scam people out of money and often install malware when they are run.

    The above ad was posted on Tuesday. Like the ads analyzed by Trend Micro and posted on social media, it mined Monero coins on behalf of someone with the Coinhive site key of "h7axC8ytzLJhIxxvIHMeC0Iw0SPoDwCK." It's not possible to know how many coins the user has generated so far. Trend Micro said the campaign started January 18. In an e-mail sent as this post was going live, a Google representative wrote:

    Mining cryptocurrency through ads is a relatively new form of abuse that violates our policies and one that we’ve been monitoring actively. We enforce our policies through a multi-layered detection system across our platforms which we update as new threats emerge. In this case, the ads were blocked in less than two hours and the malicious actors were quickly removed from our platforms.

    It wasn't clear what the representative meant when saying the ads were blocked in less than two hours. Evidence supplied by Trend Micro and on social media showed various ads containing substantially the same JavaScript ran for as long as a week. The representative didn't respond to follow-up questions seeking a timeline of when the abusive ads started and ended.

    As the problem of Web-based cryptomining has surged to almost epidemic proportions, a variety of AV programs have started warning of cryptocurrency-mining scripts hosted on websites and giving users the option of blocking the activity. While drive-by cryptocurrency mining is an abuse that drains visitors' electricity and computing resources, there's no indication that it installs ransomware or other types of malware, as long as people don't click on malicious downloads.
    This post was updated to add comment from Google."

    Cryptojacking craze that drains your CPU now done by 2,500 sites
    Android apps with millions of Google Play downloads also crash the party.
    DAN GOODIN - 11/8/2017, 10:45 AM
    https://arstechnica.com/information...s-cpus-picks-up-steam-with-aid-of-2500-sites/
    maxed-out-cpu-800x558.jpg
    Enlarge / A music streaming site that participated in Coinhive crypto mining maxes out the visitor's CPU.

    "A researcher has documented almost 2,500 sites that are actively running cryptocurrency mining code in the browsers of unsuspecting visitors, a finding that suggests the unethical and possibly illegal practice has only picked up steam since it came to light a few weeks ago.
    Willem de Groot, an independent security researcher who reported the findings Tuesday, told Ars that he believes all of the 2,496 sites he tracked are running out-of-date software with known security vulnerabilities that have been exploited to give attackers control. Attackers, he said, then used their access to add code that surreptitiously harnesses the CPUs and electricity of visitors to generate the digital currency known as Monero. About 80 percent of those sites, he added, also contain other types of malware that can steal visitors' payment card details.

    "Apparently, cyberthieves are squeezing every penny out of their confiscated assets," he said.

    One of the affected sites is shop.subaru.com.au. When I visited the site on Tuesday, the fan on my MacBook Pro, which I hadn't heard in months, soon started whirring. The activity monitor showed that about 95 percent of the CPU load was being consumed.

    As soon as I closed the site, the load dropped to about 9 percent. Besides putting a noticeable strain on my computer, the site also draws additional electricity from my office. The arrangement allows the attackers to reap the benefit of my hardware and electricity without providing anything to me in return. A recent report from security firm Trustwave's SpiderLabs estimated that the electricity cost for a single computer could range from about $2.90 to $5 per month, presumably if the cryptomining page was left open and running continuously over that time. The figure doesn't include the wear and tear on hardware as it performs complex mathematical problems required to generate the digital coins.

    [​IMG]
    Activity monitor showing CPU load when visiting http://shop.subaru.com.au.

    Thanks, Coinhive

    The site that makes all of this possible is Coinhive.com, which Ars covered last week. It offers an easy-to-use programming interface that any website can use to turn visitors' computers into vehicles for generating—or in the parlance of cryptocurrency people, mining—Monero. Coinhive gives participating sites a tiny cut of the proceeds and pockets the rest. Coinhive doesn't require that sites provide any notice to users.

    de Groot said that about 85 percent of the 2,496 sites he tracked are generating currency on behalf of just two Coinhive accounts. Depending on the total number of visitors, the amount of time they stay on an affected site, and the power of their computers, the revenue collected by those accounts could be considerable, as would be the total amount of additional charges those accounts made to visitors' electric bills.

    The remaining 15 percent were spread over additional Coinhive accounts, but de Groot has evidence suggesting those accounts are controlled by a single individual or group. Most of the affected sites concealed the connection to Coinhive by adding a link to the domain siteverification.online or one masquerading as a Sucuri firewall. Those disguised sites, in turn, hosted the crypto-mining JavaScript that interacted with Coinhive.

    de Groot's findings suggest that drive-by cryptomining has grown more widespread in the week since Ars first covered it or at least that the phenomenon shows no signs of abating. The earlier Ars article cited research from security firm Sucuri that found 500 sites running hacked versions of the WordPress content management system that were participating in the Coinhive mining. Ars also reported that two Android apps with as many as 50,000 downloads from Google Play had recently been caught putting cryptominers inside hidden browser windows. On Wednesday, researchers from Ixia reported finding two additional such apps with as many as 15 million downloadscombined. (In fairness, one of the apps informed users it would use their phone's idle time to generate coins and provided a way for that default setting to be turned off. The apps have since been modified to curtail the practice.)

    There are other indications that the in-browser cryptomining racket is getting worse. In a report published Tuesday, endpoint security provider Malwarebytes said that on average it performs about 8 million blocks per day to unauthorized mining pages.

    People who want to avoid these cryptojacking scams can use Malwarebytes or another antivirus program that blocks abusive pages, install this Chrome extension, or update their computer host file to block coinhive.com and other sites known to facilitate unauthorized mining. As the phenomenon continues to grow and attract copycat services, blocklists will likely have to be updated, requiring regular updates to blocklists as well.

    YouTube Ads Infected by Cryptocurrency Malware
    by PAUL WAGENSEIL Jan 29, 2018, 8:58 AM
    https://www.tomsguide.com/us/youtube-mining-malware,news-26530.html
     
    Last edited: Jan 30, 2018
  12. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    FYI - been seeing this on Youtube, time to employ miner blocking lists in uBlock / SafeScript and/or extensions that are keeping the lists of offending domains up to date. I've actually had Chrome warn me of excessive CPU use in Youtube tabs until I updated lists again - added a few coin mining extensions, and those tabs were taking 50% of CPU (2 tabs)!

    All about Blockchain, Cryptocurrency, Digital Transformation
    http://forum.notebookreview.com/thr...l-transformation.812591/page-16#post-10673064

    Youtube Caught Mining Monero on Viewers PCs


    Stop coin mining in the browser with No Coin
    https://ker.af/stop-coin-mining-in-the-browser-with-no-coin/

    No Coin - Block miners on the web!
    https://chrome.google.com/webstore/...s-on-t/gojamcfopckidlocpkbelmpjcgmbgjcl?hl=en

    5 Easy Ways To Block Cryptocurrency Mining In Your Web Browser
    https://fossbytes.com/block-cryptocurrency-mining-in-browser/

    minerBlock
    https://chrome.google.com/webstore/detail/minerblock/emikbbbebcdfohonlaifafnoanocnebl?hl=en

    No Mining - Block coin mining websites
    https://chrome.google.com/webstore/...n-mini/hoafonbifbfcbhdconhnmcphpnplaekb?hl=en
     
    Vasudev, Dr. AMK and Raiderman like this.
  13. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Turns out, the malvertising that has miner code as payload is delivered through Google AdSense, among others, and has become automated to the point where Google is getting behind in catching them. That's why we are getting hit with coin mining now in Youtube, but it's happening anywhere that uses Google Adsense and other ad aggregators...

    Crooks Created 28 Fake Ad Agencies to Disguise Massive Malvertising Campaign

    By Catalin Cimpanu, January 26, 2018 12:10 PM
    https://www.bleepingcomputer.com/ne...es-to-disguise-massive-malvertising-campaign/

    "A group of cyber-criminals created 28 fake ad agencies and bought over 1 billion ad views in 2017, which they used to deliver malicious ads that redirected unsuspecting users to tech support scams or sneaky pages peddling malware-laden software updates or software installers.

    The entire operation —codenamed Zirconium— appears to have started in February 2017, when the group started creating the fake ad agencies which later bought ad views from larger ad platforms.

    These fake ad agencies each had individual websites and even LinkedIn profiles for their fake CEOs. Their sole purpose was to interface with larger advertising platforms, appearing as legitimate businesses.

    How the operation worked
    The image below describes how the group operated. The fake ad agencies would buy ads displayed on legitimate sites via these ad platforms.

    These ads would allow the Zirconium group to run JavaScript code that executed a "forced redirect," effectively hijacking visitors off the original site to an intermediary domain. This intermediary domain would fingerprint and classify incoming traffic, then redirect the user to another domain, also operated by Zirconium.

    Crooks would use this third domain as an affiliate traffic jump-off point, allowing others to buy the traffic they hijacked from legitimate sites.

    In many cases, users were redirected to pages offering fake (malware-laced) Flash updates, websites offering (malware-infested) software installers, tech support scams, or other scareware pages.
    Zirconium.png
    Ad security company Confiant, the one who discovered this entire operation, says ads bought by this group reached 62% of ad-monetized websites on a weekly basis.

    All in all, Confiant believes that about 2.5 million users who've encountered Zirconium's malicious ads were redirected to a malicious site, with 95% of the victims being based in the US.

    Eight fake ad agencies still dormant
    The entire operation flew under the radar for most of the time but became harder to ignore as it grew and researchers started to detect more and more aggressive user fingerprinting scripts.

    Dangu says the group exclusively targeted desktop browsers, ignoring mobile traffic. The user's operating system did not count, the group going after Windows, Linux, Mac, or ChromeOS users alike.

    The Confiant CTO also says Zirconium used only 20 of its 28 fake ad agency identities for this operation, and eight remained dormant earlier this week when Confiant published its Zirconium exposé.
    Zirconium-ad-agencies.png
    Malvertising crews using fake ad companies may be a new concept for the casual infosec-passionate reader, but conversations this Bleeping Computer reporter had with industry experts last year revealed that most experts knew this was happening, but they hadn't managed to get all the details together to expose this growing trend.

    Besides blowing the lid on this new tactic, Dangu also pointed out another interesting fact; that this malvertising campaign was nothing like previous operations, which mostly sent traffic to exploit kits.

    Dangu believes that improved browser security features now make most exploit kits ineffective. In addition, the decision from most browser makers to change Flash into a disabled state or click-to-run policy have also contributed to the demise of classic malvertising+exploit kit campaigns.

    Chrome 64, released earlier this week, blocks the forced redirect technique (also known as tab-under) used by the Zirconium group."
     
    Vasudev and Dr. AMK like this.
  14. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Google Removes YouTube Ads Doing Crypto Mining
    By Shahid Rajput - February 1, 2018
    https://phonesmart.pk/google-removes-youtube-ads-crypto-mining/

    "Widespread use and intense popularity among masses has made cryptocurrency a ‘dream come true’ like wonder. In the meantime, crypto mining has become an art and some culprits have discovered numerous fraudulent ways to do the job. This leads to a relatively new term “cryptojacking”.

    We have shared with our readers how people use porn sites to mine cryptocurrency. in fact cryptojackers insert a JavaScript malicious code into websites and advertisements that uses victim’s CPU’s power to mine cryptocurrency for them. There are reports that hackers have found the way to insert malicious script into YouTube ads as well.

    Ars Technica, a YouTube user, reported earlier that suspected script from a service called ‘CoinHive’ causes triggering of users’ anti-virus software while YouTube ads are being played on their PC. It was presumed that a cryptojacking site might have inserted a special script that uses CPU’s power of people watching those ads on YouTube.

    Hey @avast_antivirus seems that you are blocking crypto miners ( #coinhive) in @YouTube #ads
    Thank you https://t.co/p2JjwnQyxz
    — Diego Betto (@diegobetto) January 25, 2018

    The Telegraph reported that the CBS Showtime, UFC live-streams and even official websites for the governments of Moldova and Bangladesh have also fallen victim. In some instances, websites that offer free services – such as sites that help people download films, TV series and music for free like The Pirate Bay, explicitly use miners to offset running costs.

    Google Fixes YouTube Ads Doing Crypto Mining
    Google, the owner of YouTube, has come up with an immediate fix of the issue faced by millions of users worldwide. A Google spokesman responds:

    Mining cryptocurrency through ads is a relatively new form of abuse that violates our policies and one that we’ve been monitoring actively. We enforce our policies through a multi-layered detection system across our platforms which we update as new threats emerge. In this case, the ads were blocked in less than two hours and the malicious actors were quickly removed from our platforms.

    Most of the users came up with one common thing in these hacks and that is CoinHive – a crypto mining service. Since September last year, CoinHive has been offering a Javascript Monero miner that anyone can register to use and slip into a website. In return, CoinHive takes a 30 percent cut.

    It seems that cryptojackers have decided to target the most widely used video platform on the web to get their evil job done. However, Google says it typically removes mining adverts down within minutes of their appearance, but are up against hackers who continuously change tactics to try and get around their systems."

    How to Block Cryptojackers to Mine Cryptocurrency in Your Browser
    By Shahid Rajput - January 28, 2018
    https://phonesmart.pk/block-cryptojackers-mine-cryptocurrency-browser/

    Crypto-jackers slip Coinhive mining code into YouTube site ads
    Trend Micro suggests disabling JavaScript in browsers

    By Thomas Claburn in San Francisco 27 Jan 2018 at 01:14
    https://www.theregister.co.uk/2018/...ip_coinhive_mining_code_into_doubleclick_ads/
     
    Vasudev and Dr. AMK like this.
  15. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Check Your CPU Usage all the time.
    The simplest way to determine if your PC is being used to mine cryptocurrency is to assess its CPU usage. By opening the resource monitor of your computer (EDIT: or any other monitoring software like HW64), it’s possible to view a list of applications and processes that are currently using processing power.

    Observing a noticeable spike in CPU usage when viewing specific sites that don’t show any outward signs of CPU-intensive media is a key indicator that there may be Javascript running that is taxing or hijacking your processing power. If you’re still observing high CPU usage after closing your browser, it’s possible you may have a crypto mining malware issue.
     
  16. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
  17. inm8#2

    inm8#2 Notebook Deity

    Reputations:
    310
    Messages:
    743
    Likes Received:
    340
    Trophy Points:
    76
    Salon to ad blockers: Can we use your browser to mine cryptocurrency?

    I don't like where all of this is heading. People started blocking ads because of how intrusive and dangerous they became. Now this war of escalation for ad revenue has evolved into cryptomining. "Hey we served some nasty ads in the past that cost us revenue due to ad blockers. Now you should definitely trust us with these mining scripts."

    What happens after people block the cryptominers? How many systems will be brought to their knees by websites maxing out their hardware for mining, because those less tech savvy users have never heard of cryptomining, scripts, or ad blockers?
     
    Dr. AMK and hmscott like this.
  18. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
  19. Vaeron

    Vaeron Notebook Evangelist

    Reputations:
    185
    Messages:
    368
    Likes Received:
    204
    Trophy Points:
    56
    Is it enough to just have the NoCoin Filter List with uBlock Origin, or is it better to have a separate Firefox addon for it?

    OT: Does anyone have a guide for a definitive/must-have filters list? I just rolled with the default settings of uBlock Origin then added the NoCoin and Anti-Adblock Killer Filter lists.
     
    Vasudev and Dr. AMK like this.
  20. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    IDK, if you get CPU usage showing miners with just the filter list + ublock, then yes run what you need to - and/or get more lists.

    I haven't had any more incursions using ScriptSafe (with everything enabled) + ublock Origin (all filters enabled) + Privacy Badger + AdBlocker for Youtube + NoCoin + No Mining + Miner Block, but none of the mining extensions have indicated any hits... so I think maybe I will disable them soon.

    I think the other tools have bolstered their lists and are catching everything I might run across. YMMV.

    FYI - ran across this hosts based method, for which I've used various sources over many years, but stopped using due to the noscript / adblock tools, now using scriptsafe + ublock Origin.

    But, it's got lots of lists of interest, and I may put some time into checking it out at some point:

    StevenBlack/hosts
    https://github.com/StevenBlack/hosts
    List of all hosts file variants
    The Non GitHub mirror is the link to use for some hosts file managers like Hostsman for Windows that don't work with Github download links.

    Host file recipe Readme Raw hosts Unique domains Non Github mirror
    Unified hosts = (adware + malware) Readme link 55,023 link
    Unified hosts + fakenews Readme link 55,696 link
    Unified hosts + gambling Readme link 56,535 link
    Unified hosts + porn Readme link 64,555 link
    Unified hosts + social Readme link 56,170 link
    Unified hosts + fakenews + gambling Readme link 57,208 link
    Unified hosts + fakenews + porn Readme link 65,228 link
    Unified hosts + fakenews + social Readme link 56,843 link
    Unified hosts + gambling + porn Readme link 66,067 link
    Unified hosts + gambling + social Readme link 57,682 link
    Unified hosts + porn + social Readme link 65,702 link
    Unified hosts + fakenews + gambling + porn Readme link 66,740 link
    Unified hosts + fakenews + gambling + social Readme link 58,355 link
    Unified hosts + fakenews + porn + social Readme link 66,375 link
    Unified hosts + gambling + porn + social Readme link 67,214 link
    Unified hosts + fakenews + gambling + porn + social Readme link 67,887 link
     
    Vasudev and Dr. AMK like this.
  21. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Crypto-jacking - Computerphile
    Computerphile
    Published on Jun 26, 2018
    Crypto-jacking or Drive-By Mining is the process of embedding cryptocurrency mining code in a website. Dr Mike Pound tries it out.
     
    inm8#2 likes this.
  22. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Google Bans Cryptocurrency Mining Apps From the Play Store
    By Catalin Cimpanu, July 26, 2018
    https://www.bleepingcomputer.com/ne...yptocurrency-mining-apps-from-the-play-store/

    "Google has updated the Play Store policy page this week to ban apps that mine cryptocurrencies on users' devices.

    "We don't allow apps that mine cryptocurrency on devices," the newly added policy entry reads.

    This change means Google will start to remove any app from the official Play Store that uses a device's CPU or GPU for cryptocurrency mining operations.

    Google will still allow mining apps on the Play Store, but only those that are used to control cryptocurrency mining operations on remote devices —such as servers or desktops.

    Untethered cryptocurrency mining can destroy devices
    Preventing cryptocurrency mining on Android is crucial because untethered mining operations can easily overheat or destroy batteries —or even devices if the battery case deforms, leaks, or catches fire.

    Such scenarios have already happened. Android malware strains like Loapi and HiddenMalware have been known to cause physical damage to infected smartphones.

    Google didn't publicly announce the policy change, but developers who had apps removed complained on Reddit. Other policy changes were also made, such as the decision to ban apps with repetitive content. You can read the new "Restricted Content" section of the Play Store Policy Center here, and compare it to an earlier version here.

    Apple banned mining apps last month
    The company's decision to ban cryptocurrency mining apps on the Play Store comes after Apple banned mining apps from the App Store at the start of June.

    Google previously banned Chrome extensions that mine cryptocurrencies from the official Chrome Web Store back in April.

    Google and Facebook have recently banned cryptocurrency-related ads from their ad platforms because they have been regularly abused to promote scams and phishing sites."
     
    Woodking likes this.