• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 11th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Cyber Crime » Websites use your CPU to mine cryptocurrency even if you close them

Websites use your CPU to mine cryptocurrency even if you close them

December 2nd, 2017 Waqas Cyber Crime, Security 0 comments
Websites use your CPU to mine cryptocurrency even if you close them
Share on FacebookShare on Twitter

The trend of generating cryptocurrency is increasing, thanks to the growing popularity and rise in the value of the Bitcoin. Some use cryptocurrency mining software while some embed mining codes on their website and take advantage of visitors’ CPU time whenever they visit the site.

The Pirate Bay and CBS’s ShowTimes websites were some of the famous ones who were caught secretly generating Monero coin using JavaScript code provided by Coinhive. The general conception about website mining cryptocurrency is that once the user closes the site or browser tabs, the site stops using their CPU power. But according to the IT security researchers at Malwarebytes things are far from the truth.

Researchers have discovered “Persistent drive-by cryptomining” technique using which hackers and website owners can use visitors’ CPU power to generate Monero coins even after the browser window is closed.

To prove their findings, researchers conducted a test on Google Chrome browser and visited several websites that silently loaded cryptomining code. They’ve noted that the once on the site, the CPU activity increases but when the Chrome window is closed, the activity remains higher rather than going down, which means the visited site continued cryptomining.

According to the blog post by Malwarebytes’ Jérôme Segura, “The trick is that although the visible browser windows are closed, there is a hidden one that remains opened. This is due to a pop-under which is sized to fit right under the taskbar and hides behind the clock. The hidden window’s coordinates will vary based on each user’s screen resolution, but follow this rule: Horizontal position = ( current screen x resolution ) – 100 Vertical position = ( current screen y resolution ) – 40.”

“This type of pop-under is designed to bypass adblockers and is a lot harder to identify because of how cleverly it hides itself. Closing the browser using the “X” is no longer sufficient. The more technical users will want to run Task Manager to ensure there is no remnant running browser processes and terminate them. Alternatively, the taskbar will still show the browser’s icon with slight highlighting, indicating that it is still running,” added Segura.

Below is a GIF image that shows a Windows taskbar and user visiting websites that use cryptocurrency miner. It can be seen that once the user closes the browser tab, the CPU usage remains higher:

Websites use your CPU to mine cryptocurrency even if you close them

GIF credit: Malwarebytes

The new technique can be termed as a massive threat to users since hundreds of popular websites are secretly using CPU power of their visitors to mine Monero coin. At the same time, hackers and cybercriminals are taking advantage of the situation by compromising websites to mine cryptocoins.

CloudFlare, on the other hand, states that mining cryptocurrency without informing users is considered as malware, as users have no option to opt out of it or disable the code. The company even went on to boot off torrent proxy site “ProxyBunker.online” for secretly using Coinhive miner.

Top, Featured image via PixaBay/Reisefreiheit_eu

  • Tags
  • Bitcoin
  • Chrome
  • Cryptocurrency
  • Cyber Crime
  • Google
  • internet
  • Malware
  • Privacy
  • Scam
  • security
Facebook Twitter Google+ LinkedIn Pinterest
Previous article Student hacks school's computer system to alter grades and overall GPA
Next article A Tricky PayPal Phishing Scam That Comes From Official PayPal Email
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism.

Related Posts
Cyber attack cripples networks in city of Pensacola days after shooting

Cyber attack cripples networks in city of Pensacola days after shooting

20 years prison for Romanian hackers who infected 400,000 computers

20 years prison for Romanian hackers who infected 400,000 computers

FBI uses PlayStation to bust large scale drug deal

FBI uses PlayStation to bust large scale drug deal

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
Cyber attack cripples networks in city of Pensacola days after shooting
Cyber Attacks

Cyber attack cripples networks in city of Pensacola days after shooting

421
20 years prison for Romanian hackers who infected 400,000 computers
Cyber Crime

20 years prison for Romanian hackers who infected 400,000 computers

462
FBI uses PlayStation to bust large scale drug deal
Cyber Crime

FBI uses PlayStation to bust large scale drug deal

819
Fake VPN website delivering password-stealing malware
Security

Fake VPN website delivering password-stealing malware

1474

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us