Anti-block webpage "mining kidnapping", learn 3 strokes refuse to be free miners

Hackers are also making money by encrypting money to dig mining wealth, beginning in 2017 a large number of web-based malicious mining procedures, buried in the popular Web site to use computer resources to mine mining, making people unavoidable. Not only the computer, Trend Micro pointed out that if Feel the speed of the phone seems slower and slower or the battery is hot, may have become a hacker free digger.

Web mining program led by Coinhive, pornographic sites the most dangerous

Jane Shing Choi, a veteran technology consultant at Trend Micro, pointed out that in the past, malicious excavation programs were mostly tapped into user computers for stealing and mining in the form of Trojans. However, web-based mining procedures implemented through Javascript have been increasing since 2017 even with malicious Large-scale advertising spread on the 12th came also contains the United Kingdom, the United States government and other 4,200 websites, were implanted malicious mining code.

What is a web-based mining program? The highest market share of Coinhive, for example, it will dig the Monroe program packaged in the browser side of Javascript, web site operators as long as their home site embedded Coinhive code, you can use the user Computing power digging Monroe Coinhive hope that web site operators can use this revenue instead of advertising income on the site revenue, while also enhancing the user experience, and Coinhive pumping 30% from.

Although Coinhive reminds you not to use the service without prompting the user, in fact, Coinhive has been abused by multiple websites to steal the user's computer computing resources.According to the AdGuard study, there are nearly 1 billion streaming media sites Visitors are secretly used in mining activities.

According to a survey conducted by Qihoo 360's Network Security Research Lab (Netlab), 629 (0.21%) of the Alexa Top 300,000 websites have built-in mining code on the homepage, of which pornographic related websites are the mainstay , Accounting for 49% of the total. Others include scams (8%), advertising (7%), mining (7%), film and television (6%), and some content websites also embed 2 or more mines website.

Not only is the mining program embedded in web pages, Trend Micro found that hackers used Google's online advertising service, DoubleClick, to distribute mining malware and triplicate the number of Coinhive mining procedures in Japan, France, Taiwan, Italy and Spain .

Anti-blocking web mining kidnapping, learn 3 strokes self-protection

Trend Micro states that as long as it avoids browser execution of JavaScript applications, it prevents Coinhive mining programs from using CPU resources, and periodically patching and regularly updating software, especially web browsers, can reduce the impact of cryptocurrency mining programs.

Not only computers, but also mobile phones are also affected by the web-mining program, but harder to detect. Simple wins proposal can be protected by anti-virus application with web filtering mechanism. In addition, Trend Micro also launched Trend Micro Zero browser application, Can block embedded mining procedures, reducing device power consumption, but only the iOS version.

2016 GoodChinaBrand | ICP: 12011751 | China Exports