×
GreekEnglish

×
  • Politics
  • Diaspora
  • World
  • Lifestyle
  • Travel
  • Culture
  • Sports
  • Cooking
Sunday
14
Dec 2025
weather symbol
Athens 11°C
  • Home
  • Politics
  • Economy
  • World
  • Diaspora
  • Lifestyle
  • Travel
  • Culture
  • Sports
  • Mediterranean Cooking
  • Weather
Contact follow Protothema:
Powered by Cloudevo
> technology

Hijacking computers to mine cryptocurrency is all the rage

Hackers are using old tricks and new cryptocurrencies to turn stolen computing power into digital coins

Newsroom October 6 08:17

Have you visited Showtime’s website recently? If so, you may be a cryptocurrency miner. An observant Twitter user was the first to sound an alarm last month that the source code for the Showtime Anytime website contained a tool that was secretly hijacking visitors’ computers to mine Monero, a Bitcoin–like digital currency focused on anonymity.

It’s still not clear how the tool got there, and Showtime quickly removed it after it was pointed out. But if it was the work of hackers, the episode is actually part of a larger trend: security experts have seen a spike in cyberattacks this year that are aimed at stealing computer power for mining operations. Mining is a computationally intensive process that computers comprising a cryptocurrency network complete to verify the transaction record, called the blockchain, and receive digital coins in return (see “What Bitcoin Is, and Why It Matters”).

Lately the same mining tool that appeared on Showtime’s website has been showing up all over the Internet. Released just last month by a company called Coinhive, the tool is supposed to give website owners a way to make money without displaying ads. But malware authors seem to be among its most voracious early adopters. In the past few weeks, researchers have discovered the software hiding in Chrome extensions, hacked WordPress sites, and even in the arsenal of a notorious “malvertising” hacker group.

Coinhive’s miner isn’t the only one out there, and hackers are using a variety of approaches to hijack computers. Kaspersky Lab recently reported finding cryptocurrency mining tools on 1.65 million of its clients’ computers so far this year—well above last year’s pace.

The researchers also recently detected several large botnets set up to profit from cryptocurrency mining, making a “conservative” estimate that such operations could generate up to $30,000 a month. Beyond that, they’ve seen “growing numbers” of attempts to install mining tools on servers owned by organizations. According to IBM’s X-Force security team, cryptocurrency mining attacks aimed at enterprise networks jumped sixfold between January and August.

The researchers say that hackers are especially attracted to relatively new alternatives to Bitcoin, particularly Monero and zCash. That’s probably in part because these currencies have cryptographic features that make transactions untraceable by law enforcement (see “Criminals Thought Bitcoin Was the Perfect Hiding Place, but They Thought Wrong”). It’s also because hackers can generate more profits mining these newer currencies than they can with Bitcoin. Bitcoin-mining malware was extremely popular two or three years ago, but the currency’s popularity has, by design, made it more difficult to mine, warding off this kind of attack. Hackers are now embracing newer, easier-to-mine currencies.

Malware containing cryptocurrency mining tools can be relatively straightforward to detect using antivirus software, says Justin Fier, cyber intelligence lead for the security firm Darktrace. But illegal mining operations set up by insiders, which can be much more difficult to detect, are also on the rise, he says—often carried out by employees with high-level network privileges and the technical skills needed to turn their company’s computing infrastructure into a currency mint.

>Related articles

The Greeks of Silicon Valley

Voyager 1 ready to make history again: in 2026 it will reach a distance of “one light-day” from Earth

Kyriakos Mitsotakis: There can be no productivity without the use of technology (video)

In one instance, Fier’s team, which relies on machine learning to detect anomalous activity inside networks, noticed an employee at a major telecom company using a company computer in an unauthorized way to communicate with his home machine. Further investigation revealed that he had planned to turn his company’s server room into a mining pool.

So long as there is a potential payday involved, such inside jobs are likely to remain high on the list of cybersecurity challenges that companies face. As for keeping hacked websites from hijacking your personal computer? In an ironic twist, some ad blockers are now banning Coinhive.

Source: technologyreview.com

Ask me anything

Explore related questions

#Bitcoin#computers#hackers#hacking#hacking attacks#hijacking#research#science#technology
> More technology

Follow en.protothema.gr on Google News and be the first to know all the news

See all the latest News from Greece and the World, the moment they happen, at en.protothema.gr

> Latest Stories

How “Albanian” was Georgios Kastriotis or Skanderbeg, what does the domed tomb at the Hilandar Monastery on Mount Athos hide?

December 14, 2025

See all the farmers’ demands to the government: They do not want OPEKEPE’s control to be transferred to AADE

December 14, 2025

Mitsotakis to farmers: Dialogue cannot take place with ultimatums – Roadblocks undermine your struggle – We are examining a new support package

December 14, 2025

Shooting in Sydney: Gunfire by two unknown individuals at a Jewish celebration on a beach, reports of casualties (videos)

December 14, 2025

Shops are open today, the market is open during festive hours

December 14, 2025

Sunday Sports Broadcasts: Where to watch the tests of the Super League’s Big Four

December 14, 2025

Moments of terror at Brown University after the shootings: Police evacuated students who had hidden

December 14, 2025

The redevelopment of Ellinikon prioritizes the extension of the Metro toward Glyfada – New extensions to follow

December 14, 2025
All News

> Politics

Mitsotakis to farmers: Dialogue cannot take place with ultimatums – Roadblocks undermine your struggle – We are examining a new support package

He says he is surprised by the farmers’ “no” – “Whoever rejects the principles of democracy assumes a great burden toward society” – Reiterates that the government’s door remains open for a meeting

December 14, 2025

What the leadership of the ESM means for Greece: The country’s major creditor and the messages for the Greek economy

December 13, 2025

Zoe’s extreme parliamentary reality show: The repeated calls to 100, the sexist attacks, and the “to the very end”

December 13, 2025

Mitsotakis meets the UN Secretary-General’s Personal Envoy for Cyprus

December 12, 2025

Liakouli on tensions with Konstantopoulou: Parliament staff leave the committee in tears

December 12, 2025
Homepage
PERSONAL DATA PROTECTION POLICY COOKIES POLICY TERM OF USE
Powered by Cloudevo
Copyright © 2025 Πρώτο Θέμα