Page 37 - Payout Magazine Online Volume 10.02
P. 37

firm Check Point listed CoinHive’s software      websites, some of them with millions of
as malware for 15 consecutive months. It is      visitors per year.
estimated that 5% of all Monero mined was
mined through cryptojacking.                     How Cryptojacking is Evolving

    Part of that is attributed to a fork in          While cryptojacking has died a significant
Monero’s source code that reduced CoinHive’s     death with the CoinHive shutdown, it is not
hash rate. Another fork slated for March 9 to    completely gone. Out of the 500 websites
do more damage to CoinHive prompted the          researchers surveyed manually, 68.8% of
company to shutter operations on March 8.        those websites had removed all hidden
                                                 malicious scripts. 11.6% of websites still
    CoinHive was not the only piece of           feature calls to CoinHive, suggesting they
cryptojacking software, but it was the largest.  have not updated since the service shutdown.
With the service now out of the picture, does    Finally, 1.2% of those 500 websites still
that mean cryptojacking is dead?                 performed cryptojacking using different code.

Is Cryptojacking Dead?                               Since the fall of CoinHive, most malicious
                                                 crypto-mining scripts come from CryptoLoot.
    With the death of CoinHive comes a           Scripts from that service have impacted an
vacuum of cryptojacking waiting to be filled.    estimated 7.2% of websites still affected by
There are twp types of cryptojacking attacks.    cryptojacking. Cryptojacking appears to be in
The first is the CoinHive method – injecting     decline on consumer and business computers,
mining code into websites, browsers, or          but that doesn’t mean it is dead. Instead,
networks without the user’s permission. The      hackers are focusing their crypto-mining
second targets users’ computers to exploit       malware on enterprise and cloud computing
their computing power directly, rather than      resources. Targeting cloud computing
through site visits.                             networks means hackers can deploy malware
                                                 across a considerable network.
    Before the shutdown of CoinHive, a
detection system called CMTracker was            Ransomware on the Rise
developed. It relies on behavior-based
profiles to monitor webpages for malicious           In 2019, hackers compromised Jenkins
scripts. CMTracker estimates there were 868      open source automation servers with Monero
cryptojacked websites in the Alexa top 100K      miners. They earned over $3 million in Monero
list before CoinHive shutdown.                   before the scam was discovered. The scam
                                                 doesn’t point to a resurgence of cryptojacking,
    Now eight months after the death of          though. Likely hackers and scammers are
CoinHive, researchers are hoping to find out     attempting to extract the last pennies to be
whether cryptojacking is alive and well. They    had from the practice.
used CMTracker and manual examination of
2,770 known cryptojacked websites before             The new focus appears to be on
the CoinHive shutdown to see if it is still      ransomware, which holds computers and files
happening.                                       hostage until the victim pays. Ransomware
                                                 may solicit victims to pay hackers in their
Initial  results  (https://arxiv.org/            preferred cryptocurrency, like Monero.

pdf/2001.02975.pdf) suggest 99% of websites          The hackers behind the GandGrab
                                                 ransomware service allegedly made over $2
that had been detected by CMTracker were         billion in extortion payments. A report from
                                                 2019 (https://krebsonsecurity.com/2019/07/
no longer cryptojacking. 1% of those websites    is-revil-the-new-gandcrab-ransomware/)
                                                 suggests those hackers are re-grouping
still continue crypto mining with other          under a new ransomware program called
                                                 REvil. These ransomware takeovers encrypt
cryptojacking scripts. CMTracker is still able   files on a computer, making them inaccessible
                                                 to the victims.
to identify new cryptojacking attempts, even

from code it has never seen before.

    Researchers tracked eight unique mining
scripts from the 1% of websites still engaging
in cryptojacking their visitors. Researchers
detected 632 individual cryptojacking

                                                                                                  PAYOUTMAGAZINE 37
   32   33   34   35   36   37   38   39   40   41   42