×
GreekEnglish

×
  • Politics
  • Diaspora
  • World
  • Lifestyle
  • Travel
  • Culture
  • Sports
  • Cooking
Thursday
18
Dec 2025
weather symbol
Athens 17°C
  • Home
  • Politics
  • Economy
  • World
  • Diaspora
  • Lifestyle
  • Travel
  • Culture
  • Sports
  • Mediterranean Cooking
  • Weather
Contact follow Protothema:
Powered by Cloudevo
> technology

Hijacking computers to mine cryptocurrency is all the rage

Hackers are using old tricks and new cryptocurrencies to turn stolen computing power into digital coins

Newsroom October 6 08:17

Have you visited Showtime’s website recently? If so, you may be a cryptocurrency miner. An observant Twitter user was the first to sound an alarm last month that the source code for the Showtime Anytime website contained a tool that was secretly hijacking visitors’ computers to mine Monero, a Bitcoin–like digital currency focused on anonymity.

It’s still not clear how the tool got there, and Showtime quickly removed it after it was pointed out. But if it was the work of hackers, the episode is actually part of a larger trend: security experts have seen a spike in cyberattacks this year that are aimed at stealing computer power for mining operations. Mining is a computationally intensive process that computers comprising a cryptocurrency network complete to verify the transaction record, called the blockchain, and receive digital coins in return (see “What Bitcoin Is, and Why It Matters”).

Lately the same mining tool that appeared on Showtime’s website has been showing up all over the Internet. Released just last month by a company called Coinhive, the tool is supposed to give website owners a way to make money without displaying ads. But malware authors seem to be among its most voracious early adopters. In the past few weeks, researchers have discovered the software hiding in Chrome extensions, hacked WordPress sites, and even in the arsenal of a notorious “malvertising” hacker group.

Coinhive’s miner isn’t the only one out there, and hackers are using a variety of approaches to hijack computers. Kaspersky Lab recently reported finding cryptocurrency mining tools on 1.65 million of its clients’ computers so far this year—well above last year’s pace.

The researchers also recently detected several large botnets set up to profit from cryptocurrency mining, making a “conservative” estimate that such operations could generate up to $30,000 a month. Beyond that, they’ve seen “growing numbers” of attempts to install mining tools on servers owned by organizations. According to IBM’s X-Force security team, cryptocurrency mining attacks aimed at enterprise networks jumped sixfold between January and August.

The researchers say that hackers are especially attracted to relatively new alternatives to Bitcoin, particularly Monero and zCash. That’s probably in part because these currencies have cryptographic features that make transactions untraceable by law enforcement (see “Criminals Thought Bitcoin Was the Perfect Hiding Place, but They Thought Wrong”). It’s also because hackers can generate more profits mining these newer currencies than they can with Bitcoin. Bitcoin-mining malware was extremely popular two or three years ago, but the currency’s popularity has, by design, made it more difficult to mine, warding off this kind of attack. Hackers are now embracing newer, easier-to-mine currencies.

Malware containing cryptocurrency mining tools can be relatively straightforward to detect using antivirus software, says Justin Fier, cyber intelligence lead for the security firm Darktrace. But illegal mining operations set up by insiders, which can be much more difficult to detect, are also on the rise, he says—often carried out by employees with high-level network privileges and the technical skills needed to turn their company’s computing infrastructure into a currency mint.

>Related articles

The Greeks of Silicon Valley

Voyager 1 ready to make history again: in 2026 it will reach a distance of “one light-day” from Earth

Kyriakos Mitsotakis: There can be no productivity without the use of technology (video)

In one instance, Fier’s team, which relies on machine learning to detect anomalous activity inside networks, noticed an employee at a major telecom company using a company computer in an unauthorized way to communicate with his home machine. Further investigation revealed that he had planned to turn his company’s server room into a mining pool.

So long as there is a potential payday involved, such inside jobs are likely to remain high on the list of cybersecurity challenges that companies face. As for keeping hacked websites from hijacking your personal computer? In an ironic twist, some ad blockers are now banning Coinhive.

Source: technologyreview.com

Ask me anything

Explore related questions

#Bitcoin#computers#hackers#hacking#hacking attacks#hijacking#research#science#technology
> More technology

Follow en.protothema.gr on Google News and be the first to know all the news

See all the latest News from Greece and the World, the moment they happen, at en.protothema.gr

> Latest Stories

Mitsotakis: The heart of Greece beats in Lorient, where today our flag is raised on the Belharra frigate

December 18, 2025

A plan for automatic collection of VAT from the State: The two scenarios under consideration

December 18, 2025

Training program for teaching the Greek language in the diaspora by the University of Ioannina

December 18, 2025

Protothema inside the Illuminati ceremonies in Athens: Politicians, favors, and the brotherhood’s unbreakable rules

December 18, 2025

Stefanos Papadopoulos: There is no ulterior motive behind my complaint against Mazonakis — I didn’t ask for money, only for justice

December 18, 2025

Brussels: Clashes and tear gas at farmers’ protest (videos)

December 18, 2025

Pierrakakis presented the ELTA restructuring plan to Parliament: The Post Office is changing in order to remain present

December 18, 2025

China: Surreal images show entire mountains covered with solar panels (video)

December 18, 2025
All News

> World

French farmers blockade the EU-Mercosur deal: Paris and Rome want to delay the vote

They are worried that Europe will be flooded with cheap products from South Africa without the European control framework

December 17, 2025

Britain to rejoin Erasmus from 2027

December 17, 2025

The European Parliament is in favour of the creation of a “Schengen Military Force” for a possible Russian attack

December 17, 2025

New mystery in the Bermuda Triangle: Scientists discover anomaly unlike anything else on Earth

December 17, 2025

Italy: Popular attractions that will require visitor’s entry fee

December 17, 2025
Homepage
PERSONAL DATA PROTECTION POLICY COOKIES POLICY TERM OF USE
Powered by Cloudevo
Copyright © 2025 Πρώτο Θέμα