SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

A Look into the Global “Drive-By Cryptocurrency Mining” Phenomenon

MalwareBytes Labs

1 min read
in Document, Paper

Differing from traditional money, cryptocurrencies are not issued by a central bank or authority. Instead, this digital asset can be produced by “mining,” a process that involves solving complex mathematical and cryptographic algorithms. Bitcoin is one of the most famous cryptocurrencies, and now requires exceptional computational power to be mined.

Cryptocurrencies were bound to trigger the interest of criminals and it wasn’t long before coin mining malware made an appearance and addressed the scalability and resource-intensive process by enrolling as many bots as possible for the common effort.

Other cryptocurrencies continued to come out, including Monero (XMR), which unlike Bitcoin, can be mined by average computers. Unsurprisingly, many malware authors jumped in to compromise new hosts to deliver Monero-based mining malware. An important milestone in the history of cryptomining happened around mid-September when a company called Coinhive launched a service that could start mining for Monero directly within a web browser using a simple JavaScript library.

To differentiate browser-based mining from other previous forms, many started to label these instances as JavaScript Miners or Browser Miners.

READ REPORT

Related

Tags: College Students DocumentsCryptojacking DocumentsDrive by attackmalware-documentsMalwareBytes Labs
2
VIEWS
ADVERTISEMENT

Related Posts

The Threat of Terrorist Organizations in Cyberspace

The Threat of Terrorist Organizations in Cyberspace

May 9, 2022
Cyber Terrorism and Information Security across National Policies and International Diplomacy

Cyber Terrorism and Information Security across National Policies and International Diplomacy

May 9, 2022
Cyber Terrorism: A New Dimension in Battlespace

Cyber Terrorism: A New Dimension in Battlespace

May 9, 2022
Determining Extremist Organisations’ Likelihood of Conducting Cyber Attacks

Determining Extremist Organisations’ Likelihood of Conducting Cyber Attacks

May 9, 2022

More Articles

The Code Book

September 22, 2020
Tool

Cloud Wrapper

March 29, 2022
Alerts

F5 security advisory (AV22-241)

May 2, 2022

Intruder

November 22, 2021
Alerts

Dell security advisory (AV22-186)

April 6, 2022
CyberTips

CyberTip: How to properly back up your personal data

October 19, 2020
Entertainment

The Social-Engineer Podcast

February 24, 2021

2020 Data Breach Investigations Report

September 30, 2020
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....