Bitcoin Boom Prompts Growth Of Coin-mining Malware

Mining hardwareImage copyright Vichai
Image caption Generating crypto-currencies involves lots of computer hardware

The booming price of Bitcoin and other crypto-coins has kicked off a gold rush among malicious hackers keen to cash in, warn security firms.

Many sites are now harbouring code that secretly uses a visitors' computer to mine the valuable e-cash coins.

The code is inserted by hackers who exploit poor site security or web software bugs.

The problem has led Google engineers to consider putting protections against mining in the Chrome browser.

Freshly minted

Earlier this month, hundreds of websites were found to be running code created by the Coin-Hive project. This let the web domains generate coins for the Monero crypto-currency by using the processing power of visitors' computers.

While some sites had put the Coin-Hive code on their site themselves, many others had been hacked to host the short script.

Bitcoin, and almost every other crypto-coin, works by using lots of different computers to log and verify who has done what with the electronic coins. In return for carrying out these computational tasks, called mining, users are regularly rewarded with new coins.

Palo Alto Networks said it had found Coin-Hive on almost 150 separate domains. The most popular locations for the code were porn, video and file-sharing sites.

"The use of Coin-Hive or similar mining services is itself not a malicious activity," said Yuchen Zhou and colleagues at security company Palo Alto. "It is how they are used that makes the sites malicious."

The wide uptake of Coin-Hive and the surging price of Bitcoin, now worth about $5,630 (£4,288) per coin, has led to the creation of many "copycat" coin-mining systems.

Security news website Bleeping Computer has now found 10 separate "clones" of Coin-Hive that mine different types of coins for their creators.

"Most are behaving like malware, intruding on users' computers and using resources without permission," wrote Catalin Cimpanu on the Bleeping Computer site. On portable devices, the code can drain batteries very quickly.

Some of the copycat coin-mining programs specifically target popular website creation and admin systems such as WordPress. Others, said Mr Cimpanu, are written in Javascript and their creators try to insert them wherever they can.

Many anti-virus firms have updated their software so they now spot and disable mining software.

Also, Coin-Hive has now launched an authorised version of its software which only mines coins if users give their explicit permission.

Image copyright AFP
Image caption Many people are looking to cash in on Bitcoin's growing value

The growing number of coin miners kicked off a discussion among Google engineers working on the firm's Chrome browser about how to tackle it.

"Yes, we should do something about it," wrote Ojan Vafai, a Chrome engineer on the forums where browser changes are debated.

Mr Vafai suggested getting the browser to watch for situations when mining software grabs lots of processing power from a computer or portable device.

If the browser spots this activity it would "aggressively throttle" browser activity to limit how much number-crunching power can be grabbed. Users would also be warned about what was happening.

The change would let users see when their browser was being used for mining and let them choose if it continued. Blocking the activity any other way would be difficult, he said.

"I'm effectively suggesting we add a permission here, but it would have unusual triggering conditions," he wrote. "It only triggers when the page is doing a likely bad thing."

RECENT NEWS

From Chip War To Cloud War: The Next Frontier In Global Tech Competition

The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more

The High Stakes Of Tech Regulation: Security Risks And Market Dynamics

The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more

The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics

Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more

The Data Crunch In AI: Strategies For Sustainability

Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more

Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser

After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more

LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue

In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more