Categories: Cryptocurrency hack

Chrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge

Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their browsers without the user’s knowledge and now the chrome extension Archive Poster.

Websites involved in crypto-mining by injecting mining scripts into visitors browsers and most popular among them is Coinhive which offers a JavaScript miner for the Monero Blockchain that can be embedded into other Web sites.

Now even the Chrome extension started mining cryptocurrency, a chrome extension Archive Poster with more than 105,000 users Caught injecting an in-browser cryptocurrency miner.

Archive Poster is an extension used to repost the Tumblr blogs, according to the users review the extension includes the most famous coinhive source code starting from the December.

The extension consists of a hidden Coinhive crypto jacker and it won’t ask any permissions before abusing the user’s CPU resource.

The largest torrent search engine, the Pirate Bay, that made CoinHive famous by being caught using it. Last week another Cryptocurrency Miner spotted using chrome version of facebook messenger to mine Cryptocurrency.

Temporary Defense – Archive Poster

Temporary defense is to trash the extension from Chrome which halts the mining process.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…

3 hours ago

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…

3 hours ago

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…

3 hours ago

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…

8 hours ago

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…

10 hours ago

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in…

10 hours ago