The three most common threats that plague the Internet have proven to be miners of the cryptocurrency.
In its most recent analysis of the Internet's most pressing malware threats, cybersecurity group Check Point ranked the supposedly neutral Monero-mining script CoinHive first for the thirteenth month in a row, ZDNet reports .
The XMRig open-source monero-mining software was named second most popular, followed by browser embeddable cryptocurrency miner JSECoin, which is known as a direct competitor to CoinHive.
Check Point analysts found that CoinHive impacted 1
CoinHive and JSECoin generally work in the same way. These are small pieces of code that can be inserted into websites that use the computing power of the visitor to mine the cryptocurrency.
In the case of CoinHive, the anonymity-focused cryptocurrency Monero is degraded. While many nonprofit organizations have used CoinHive to turn visitors' performance into charitable donations, hackers have forced more than 400,000 routers around the world to unauthorize Monero.
In fact cryptojacking is so lucrative with CoinHive At one point last year, scientists at RWTH Aachen University found that the script is directly responsible for $ 250,000 each month.
The XMRig malware is slightly different. Actually, this is standard, standard software used by the Monero community and publicly available on GitHub.
But cyberbadthis have exploited their accessibility. The researchers found that an astounding number of "Trojans" that are specific Trojan viruses automatically downloaded XMRig to run on computers while the user did not know.
As a result, GitHub has been specifically named as the number one provider of cryptocurrency mining malware, with current estimates that cryptojackers have earned about $ 1.2 million a month over the last four years.
Published January 14, 2019 – 16:49 UTC