wrapper

Breaking News

Recently, cryptocurrency mining activity was caught taking place surreptitiously via YouTube Ads. This took place through public mining codes available from a digital currency company called Cognitive.

According to a report by the ArsTechnica, these cryptocurrency miners were caught mining for Monero, a digital currency, through YouTube ads. They used the Google's DoubleClick ad network, to run this malicious activity. According to researchers with antivirus provider Trend Micro, the malicious activity is active in Japan, France, Taiwan, and Italy.

For mining, a miner requires an internet connection and electricity to power computer hardware. Since mining requires a long time and consumes a lot of resources, mining covertly through another person's system is quite likely.

Therefore, when an attacker runs a JavaScript code, it drains away the power of the CPU of the person on whose system the attack happens. According to the report, YouTube has been opted for such an activity, since a person would spend a long time on the video platform.

The attack has been tracked by some antivirus programs which have notified its users.

The attackers were using these codes, which are available in two forms. One is public, the other is private. The public one comes from a place like the Cognitive are mostly used for mining, other attackers also use private ones. Meanwhile, mining consumes 80 percent of the person's CPU.

These malicious ads reportedly also come in the form of fake virus attack warnings. Here, if the person clicks on these ads, it activates the javascript.

Google has reportedly blocked such malicious ads.

News Source: TECH2

Last modified on Monday, 29 January 2018