A New Player Joins Coinhive on the Browser Cryptojacking Scene (using site visitors' CPU power)

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
A New Player Joins Coinhive on the Browser Cryptojacking Scene



The browser cryptojacking scene has just expanded from one player to two with the recent launch of the Crypto-Loot service, a website that's eerily similar to the now notorious Coinhive in-browser miner.


The two services are identical, and both provide a simple JavaScript file that website owners can load on their sites to mine Monero using their site visitors' CPU power.


While both services allow website owners to keep the Monero funds mined on users' computers, there is a big difference in the revenue share. Compared to Coinhive, which keeps 30% and gives 70% to site operators, the upstart Crypto-Loot is trying to pull the rug from under Coinhive's feet by asking for only 12% and giving website owners 88%.

77% of users view in-browser mining as malware
Even if both are entirely legitimate services, these tools have been most often deployed by abusive site operators that mine for Monero without letting users know, without getting user approval, or without providing users with a way to turn the crypto-mining behavior off.

Some legitimate Coinhive uses
A place where the Coinhive script was properly included is Iridium, a Chrome extension for fine-tuning YouTube's interface. The Coinhive miner is enabled by default, but the extension's developer provided an option to turn the crypto-mining behavior off in case users experienced sluggish behavior.

Another proper use of Coinhive is PublicHD, a private torrent tracker, which allows users to gain site credits by letting the site operator mine Monero on their machines.


Blocking cryptojacking on your computer
Users that want to block such crypto-mining scripts on their PCs have a series of alternatives at their disposal.

First, users can use any decent antivirus. Most antivirus vendors have already blocked Coinhive or at least are now providing an alert and possibility to block the script at the user's command.

Second, users can use an ad blocker to stop the script from executing at the browser level. To our knowledge, ad blockers like AdBlock Plus and AdGuard block CoinHive.

Third, users can use one of three Chrome extensions that block Coinhive — AntiMiner, No Coin, and minerBlock. Recently, No Coin also added support for blocking Crypto-Loot.

Fourth, users can use this classic Windows hosts trick to block the Coinhive or Crypto-Loot domains at the OS level.

And if you're too lazy, then rest assured that some companies like Cloudflare are at least booting some of these sites off their network.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top