Monday, November 25, 2024
HomeCryptocurrency hackChrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge

Chrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge

Published on

Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their browsers without the user’s knowledge and now the chrome extension Archive Poster.

Websites involved in crypto-mining by injecting mining scripts into visitors browsers and most popular among them is Coinhive which offers a JavaScript miner for the Monero Blockchain that can be embedded into other Web sites.

Now even the Chrome extension started mining cryptocurrency, a chrome extension Archive Poster with more than 105,000 users Caught injecting an in-browser cryptocurrency miner.

- Advertisement - SIEM as a Service

Archive Poster is an extension used to repost the Tumblr blogs, according to the users review the extension includes the most famous coinhive source code starting from the December.

The extension consists of a hidden Coinhive crypto jacker and it won’t ask any permissions before abusing the user’s CPU resource.

The largest torrent search engine, the Pirate Bay, that made CoinHive famous by being caught using it. Last week another Cryptocurrency Miner spotted using chrome version of facebook messenger to mine Cryptocurrency.

Temporary Defense – Archive Poster

Temporary defense is to trash the extension from Chrome which halts the mining process.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their...

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...