Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

09:05 AM
Simon Marshall
Simon Marshall
Simon Marshall

Cryptomining: Paying the Price for Cryptocurrency

The growing popularity of Bitcoin and other cryptocurrency has led to cryptomining, with enterprises and individuals running the software unknowingly. Here's a look at the underside of this new business model.

What are BitCoin, Ethereum or any other cryptocurrency really worth? Valuations are mercurial, exchanges have been raided, wallets hacked and currencies manipulated -- so, who really knows?

Weiss Ratings has just released the world's first cryptocurrency grades, in the race to enable better currency trading decisions. No cryptocurrency scored an "A" rating -- primarily Weiss says because of the volatility of these currencies -- with Bitcoin scoring a "fair" C+ and Ethereum ranking highest at a "good" B.

It's not clear if Weiss has, in creating the grades, factored in that crypto coins can be outright stolen from wallets, or are the ill-gotten proceeds from ransomware and other illegal activity. Also, with so many websites either openly or covertly running cryptominers, it's uncertain how much is being created, and who really owns it.

(Source: Pixabay)
(Source: Pixabay)

Pirate Bay, Showtime and politifact.com have all secretly or unknowingly exploited their customers by exposing them to onerous cryptomining. But with the value of cryptocurrencies currently rising, are we looking at the perfect storm?

1 billion cryptominers
Web browsing firm Opera estimates that about 1 billion people worldwide are currently affected by unwanted cryptomining.

To be fair, in some cases, users are aware their machines are being used to mine currency because the website offers a heads up that a miner will be installed instead of, for example, serving up ads. But in most recent cases, the site installs a miner without informing the user, or indeed, in Showtime's case, the site is hacked and the miner is injected without their knowledge.

A reported total of 2,531 of the top 3 million websites (about one in 1,000) are running the de facto miner, Coinhive, which creates Monero currency, and was at the center of the Pirate Bay and Showtime cryptojacking incidents. Kaspersky has said it considers miners as riskware, not malware. That is, it considers the software is legitimate, but acknowledges it could be used for malicious purposes.

There are other cryptojacking tools out there, such as JSEcoin, and Crypto-Loot. However, I have MalwareBytes installed on my machine, and it blocks access to Coinhive's home page, period. That says something.

"The recent uptick in [cryptojacking] can likely be attributed to the release of the popular JavaScript miner by Coinhive in September 2017," Jonathan Tomek, senior director of threat research at Reston, VA-based LookingGlass Cyber Solutions, told SecurityNow.

Coinhive maintains that digital advertising doesn't really work, and that coin mining is an alternative for website owners to monetize their sites. It recently added an opt-in interface so that users can decide for themselves if they wish their PC to be used for mining. That only works if the site is upfront about having users do the work for them by exposing them to the interface.

Coinhive mines Monero because the currency is anonymous and requires less computing power to yield results than other currencies such as Bitcoin. LookingGlass believes Monero will be the major cog in ransomware and money laundering schemes this year. However, LookingGlass believes criminals will broaden their horizons beyond ransomware, and for good reason.

Expanding mining territories
"Last year was plagued with ransomware but we have seen a recent decrease which is likely tied to the ever-rising prices of cryptocurrencies," said Tomek. "Cybercriminals appear to be targeting wallets or leveraging mining due to its ease. Mining is expanding and taking the form of malicious website injection, malware, trojanized applications, and even WiFi connection hijacking."

Smart cybercriminals are also involved in driving the value of currencies by recruiting botnets to spam consumers with emails hyping the values, according to Tomek. This shows how savvy the hackers are, as they insinuate themselves into every aspect of the currency lifecycle from creation through to valuation and eventually rogue ownership.

"Cybercriminals are typically involved in pump-and-dump schemes, not dissimilar to day traders," said Tomek. "A recent cybertheft example is when the Necurs botnet was pumping Swisscoin last month from $0.20 to $20. It is now worth less than $0.01"

Obviously, one way to reduce this is to eliminate the botnets currently pumping the currencies by taking down the infected hosts, and blocking the spam. Joe Public can make a difference too, by ensuring that cryptowallets remain locked.

"The most common way for their cryptocoin to be stolen is by having their wallet taken and coin transferred to a cybercriminal," said Tomek. "With a secure password, victims would prevent the criminals from moving or stealing their coin."

Are you being mined?
Apart from a tell-tale spike in CPU usage, causing machines to slow down and heat up, there are very few signs that a PC is being mined. And even less so for mobile devices.

"When you browse the web, there are no visual clues that your device is exposed to mining," said Jan Standal, vice president of product marketing at Opera.

Cryptomining can be considered a nuisance, but it is very dangerous to users for several reasons; it takes place in most instances without their knowledge, and it robs them of computing power, putting the PC at threat and inflating power bills. It can cause PCs to slow or freeze, work to be lost, productivity downed, and battery life reduced.

Most worryingly, cryptojacking tools can provide easy access for hackers to computer resources and private data.

An extension for Chrome called NoCoin hopes to alleviate issues. Microsoft browsers need a decent third-party antimalware tool, but there is a handy No Miner extension to protect Firefox users.

Opera now has built-in miner protection. Worried you're a victim? The firm has posted a free tool. It only works on desktop OS and Android phones but support for iOS is reportedly coming soon.

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.