30,000 websites with mining code: When you go online, you may help hackers mine

There are more than 30,000 websites in the whole network with built-in mining code. As long as the user opens the website for browsing and operation, the website will call the computing resources of the computer or mobile phone for mining. About 500 million computers have been kidnapped and mined around the world. .

The main source of revenue for a website is advertising. If no one clicks on an ad, it means no income. In particular, some content traffic sites rely on advertising to live.

However, the revenue that advertising can bring to the website is limited. After the poor, they are beginning to focus on virtual currency. 2.2% of the top 10,000 websites in the world are doing this kind of harm.

BlockBeats statistics, as of July 9, more than 30,000 websites have built-in mining code. As long as the user opens the website for browsing and operation, the website will call the computing resources of the computer or mobile phone for mining. According to Adguard's statistics, about 500 million computers worldwide have been kidnapped for mining.

Sites with smaller traffic can earn a few dollars of extra income per day, and can reach thousands of dollars. The price is to sacrifice the computer performance and energy of the website users, in exchange for Monroe.

Browse mine, if you feel that your computer and mobile phone are inexplicably hot when you are online, then you should consider whether it has been used by the website to mine.

Browse mine, hackers can always find all kinds of strange resources to profit

Almost all of the mining mining code digs are Monroe coins.

The Monroe coin uses Cryptonight's mining algorithm, which is very friendly to the CPU and is very suitable for running on a normal computer. So, there are developers who have a bad idea.

They use javascript to write code, and when the user loads a website, it also loads the mining code. According to the data of the largest Monroe mining code provider Coinhive, their code runs roughly equal to the Monroe currency. 65% of the mining machine, there is still room for improvement in the future.

Although the user can only contribute a little bit of computing power during the time of visiting the website, but the accumulation is small, the greater the amount of visits, the more profitable.

Many mining code providers have calculators for developers to predict revenue. If your website has 10-20 users per day, you can earn 0.3 XMR per day, about 270 RMB, and you can get 8100 yuan per month. income.

White income, why not do it? So many websites that have not had much advertising revenue, and no other profit model began to run mining code on the website.

The famous BT resource download site, Pirate Bay, has recently been built with the mining code of Monroe. The website of the Pirate Bay is very overbearing, 'As long as you enter the Pirate Bay website, you agree to use your CPU. Do Monroe mining. If you disagree, you can leave or install adblocker immediately.

This passage can only be seen at the bottom of the Pirate Bay website, and has been specially turned into a small font size.

In other words, even if you just open Pirate Bay to see if you have updated any resources, your computer cpu will be used up to 100% in an instant, to provide computing power for the Pirate Bay website, until you turn off the website.

It is understood that 68% of websites that are implanted with mining code are pornographic websites. If you have the habit of browsing pornographic websites, you should also pay attention to it, because many pornographic websites will also join the digging in order to increase revenue. Mine code.

When your hands are shaking and shaking, do you find that your computer has become hot, maybe you have not found it at all, because you are addicted to something else.

In addition to the site owner's own addition of mining code, there are hackers black into other web servers to maliciously implant mining trojans in the code. For example, after the college entrance examination ended last month, many college websites were hacked and hacked. Candidates must contribute to hackers when they check their test scores.

Because the scores of the sites have been published, a large number of candidates will open a web page to wait for the list, so such sites are more popular than other blogs. At the end of last month, Tencent Yuzhi Threat Intelligence Center detected Shandong, Hubei, Henan, Heilongjiang and other key universities' official websites were implanted with mining horses.

In addition, there are still a lot of game developers who will also implant mining horses in the plug-in, so that many users who are greedy and cheap, and who are eager to enjoy.

In addition to the computer side, there are also a large number of App. 360 security labs including mining horses on the Android mobile phone. The data from January this year shows that there are more than 400 mining horses in the whole network, accounting for 1/ of the total Android Trojans. 3.

Web mining and hijacking service provider, perfect black production system

There is demand, there is service, mining code and mining horses actually have a complete industrial chain behind, and the service is very perfect.

Open the web page to mine, in fact, this function is not developed by the website developers themselves, they use the interface provided by the web mining service provider. Developers only need to insert a string of code in the webpage code, you can enjoy income.

Web mining service providers provide website developers with a variety of mining services, such as verification code mining, short link access, silent mining, etc. As long as you dare to come, you can take up 100% of your computer resources in an instant. .

Any product has an iterative space. As a result, web mining service providers such as CoinHive are constantly evolving their products, allowing web developers to better hide the facts of using user computers to mine and provide more good service.

For example, in order to prevent spam comments, many websites use a click verification code to intercept the robot. CoinHive provides a similar anti-cheat module. When the user clicks this button, the web page mining will be started. After the verification is completed, the website will be dug. Mine stopped.

If the user really wants to wait for posting or logging in, it is completely acceptable for the verification time of ten seconds, but the cost is that the computer CPU is fully open for mining in a dozen seconds, and the temperature is increased by several tens of degrees.

CryptoLoot also offers silent mining capabilities to run mining codes without the user's complete awareness. On CryptoLoot's website, they advertised silent mining as a feature of their own, allowing quietness without interruption. It’s really intimate.

After digging into the mine, you can start counting money. The mining code provider can almost instantly settle the developer. They can make a separate account every 2 hours. After completing the pumping, they can directly go to the developer's wallet. Transfer money, of course, can also be withdrawn in RMB, US dollars and other legal currency.

The provider implements a full-service from start to finish, providing better service and higher revenue for web developers and hackers only.

But be aware that such behavior is illegal.

Whether at home or abroad, the user's computing resources can be arbitrarily occupied without the user's permission. It can be defined as a Trojan virus. According to the laws and regulations, this is an illegal act, and criminal responsibility will also be pursued.

Well-known websites will not use this despicable means to gain benefits. Only the types of websites we mentioned above, which are already illegal, will do this kind of thing.

Whether it is a mining code provider or a web developer, it is a shame to steal the user's computer resources to mine, so the code provider will mercilessly withdraw 30% from the mining income. The large amount of money, the website owner is also happy to accept.

According to PC Magazine's website, CoinHive's annual revenue can reach 5 million US dollars, and the websites and hackers they serve can generate up to 100 million yuan a year.

CoinHive currently serves 75% of web mining sites, plus websites covered by other service providers. The annual revenue of stealing user computers from the entire industry can reach 150 million yuan.

2016 GoodChinaBrand | ICP: 12011751 | China Exports