{"id":85551,"date":"2018-01-23T12:08:43","date_gmt":"2018-01-23T06:38:43","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=85551"},"modified":"2018-01-23T12:08:43","modified_gmt":"2018-01-23T06:38:43","slug":"browser-cryptojacking-full-throttle-report-quick-heal-security-labs","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/browser-cryptojacking-full-throttle-report-quick-heal-security-labs\/","title":{"rendered":"In-browser Cryptojacking at full throttle &#8211; A report by Quick Heal Security Labs"},"content":{"rendered":"<p><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">Cryptocurrencies like Bitcoin,\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">Monero<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">, Ethereum,\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">Litecoin<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">,<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">\u00a0and\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">Tezos<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">\u00a0are in\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">full\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">swing.\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">And they have exponentially increased\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">cryptocurrency mining\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">(or\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">crypto<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">mining<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">)<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">activities. Previously<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">,<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">crypto<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">mining<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">the\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">entire process requires\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">a\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">lot of computation<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">. However,<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">there has been an observable change in the mining trends<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">.\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">Now, web b<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">rowsers are taking part in\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">crypto<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">mining<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">and its activity is growing because the computing power used in browser mining is\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">much less than that require in hardware mining<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">. Using\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">web\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">browsers to mine cryptocurrency is termed as\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">In-browser<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">\u00a0<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"SpellingError SCXW168304383\">Cryptojacking<\/span><\/span><span class=\"TextRun SCXW168304383\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW168304383\">.<\/span><\/span><span class=\"EOP SCXW168304383\">\u00a0<\/span><\/p>\n<p>Quick Heal\u00a0Security\u00a0Labs\u00a0has come across some\u00a0popular websites\u00a0that are\u00a0compromised with\u00a0the\u00a0Coinhive\u00a0browser mining service.<\/p>\n<p><b>What is\u00a0<\/b><b>Coinhive<\/b><b>?<\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-85552 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/coinhive.png\" alt=\"\" width=\"282\" height=\"167\" \/><\/p>\n<p>Coinhive\u00a0is a browser mining service which offers\u00a0a\u00a0Javascript\u00a0miner for\u00a0the\u00a0&#8216;Monero&#8217; blockchain.<b>\u00a0<\/b>It can be easily embedded in a website. When users access\u00a0a\u00a0Coinhive-injected website,\u00a0the\u00a0miner service is executed in\u00a0the web\u00a0browser and starts mining\u00a0Monero\u00a0XMR&#8217;s<b>.<\/b><\/p>\n<p>We suspect many\u00a0businesses\u00a0use this browser-mining service by integrating a piece of\u00a0Javascript\u00a0code into their website which\u00a0consumes its visitors\u2019\u00a0CPU time\u00a0and energy\u00a0to mine XMR(Monero) for\u00a0Coinhive.\u00a0Coinhive, in return,\u00a0pays out some percentage of\u00a0the\u00a0mined value to website\u2019s owner.<\/p>\n<p><b>Our analysis<\/b><\/p>\n<p>At Quick Heal Security Labs, we noticed that\u00a0one of the proxy services\u00a0of a famous torrent search engine\u00a0called\u00a0Pirate\u00a0Bay was injected with\u00a0the\u00a0Coinhive\u00a0miner service. Fig 1\u00a0below\u00a0shows content\u00a0injected\u00a0into\u00a0the\u00a0Pirate\u00a0Bay webpage.<\/p>\n<figure id=\"attachment_85553\" aria-describedby=\"caption-attachment-85553\" style=\"width: 1154px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85553\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/miner.start_.png\" alt=\"Fig 1. Fiddler session screen-shot of Pirate Bay Website\" width=\"1154\" height=\"194\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/miner.start_.png 1154w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/miner.start_-300x50.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/miner.start_-768x129.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/miner.start_-650x109.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/miner.start_-789x133.png 789w\" sizes=\"(max-width: 1154px) 100vw, 1154px\" \/><figcaption id=\"caption-attachment-85553\" class=\"wp-caption-text\"><strong>Fig 1. Fiddler session screen-shot of Pirate Bay Website<\/strong><\/figcaption><\/figure>\n<p>As per the\u00a0Coinhive\u00a0official information,\u00a0&#8216;OT1CIcpkIOCO7yVMxcJiqmSWoDWOri06&#8217; is the user site key and\u00a0the\u00a0throttle is used to limit the CPU usage. Below are the throttle levels.<\/p>\n<p><i>throttle: 0 &#8211; CPU\u00a0<\/i><i>usage limit to 100<\/i><i>%<\/i><\/p>\n<p><i>throttle: 0.3 &#8211; CPU usage limit to 80%<\/i><\/p>\n<p><i>throttle:\u00a0<\/i><i>0.5 &#8211; CPU usage limit to 50%-70<\/i><i>%<\/i><\/p>\n<p>After accessing Pirate\u00a0Bay website, CoinHive.min.js\u00a0got\u00a0executed and started mining. The CPU usage reached\u00a0its limit as per its defined throttle level. In some websites,\u00a0it is defined as 0.5 so that particular instance of\u00a0a\u00a0browser will take 50%-70% of computation. Fig 2\u00a0shows the\u00a0CPU usage activity\u00a0of browser\u00a0and overall system\u00a0observed after accessing\u00a0the\u00a0Pirate\u00a0Bay website.<\/p>\n<figure id=\"attachment_85554\" aria-describedby=\"caption-attachment-85554\" style=\"width: 947px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85554\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/mine.png\" alt=\"Fig 2. CPU Usage after accessing Pirate Bay \" width=\"947\" height=\"453\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/mine.png 947w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/mine-300x144.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/mine-768x367.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/mine-650x311.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/mine-789x377.png 789w\" sizes=\"(max-width: 947px) 100vw, 947px\" \/><figcaption id=\"caption-attachment-85554\" class=\"wp-caption-text\"><strong>Fig 2. CPU Usage after accessing Pirate Bay<\/strong><\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">Another important thing observed in &#8216;CoinHive.min.js&#8217; file is\u00a0<\/span><\/span><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">the\u00a0<\/span><\/span><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">use of\u00a0<\/span><\/span><a class=\"Hyperlink SCXW67034229\" href=\"https:\/\/webassembly.org\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">WebAssembly<\/span><\/span><\/a><span class=\"TextRun Underlined SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">.\u00a0<\/span><\/span><span class=\"TextRun Underlined SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">It specifically runs on\u00a0<\/span><\/span><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">web\u00a0<\/span><\/span><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">browsers. It is similar\u00a0<\/span><\/span><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">to a\u00a0<\/span><\/span><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">low-level assembly-l<\/span><\/span><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">ike language which runs\u00a0<\/span><\/span><span class=\"TextRun SCXW67034229\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"NormalTextRun SCXW67034229\">with near native-performance which is a major factor to use web assembly in mining functionality implementation.<\/span><\/span><span class=\"EOP SCXW67034229\">\u00a0<\/span><\/p>\n<figure id=\"attachment_85555\" aria-describedby=\"caption-attachment-85555\" style=\"width: 1227px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85555\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/CryptoNight1.png\" alt=\"Fig 3. WebAssembly module integration\" width=\"1227\" height=\"349\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/CryptoNight1.png 1227w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/CryptoNight1-300x85.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/CryptoNight1-768x218.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/CryptoNight1-650x185.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/CryptoNight1-789x224.png 789w\" sizes=\"(max-width: 1227px) 100vw, 1227px\" \/><figcaption id=\"caption-attachment-85555\" class=\"wp-caption-text\"><strong>Fig 3. WebAssembly module integration<\/strong><\/figcaption><\/figure>\n<p>WebAssembly\u00a0uses\u00a0the\u00a0<a href=\"https:\/\/cryptonote.org\/cns\/cns008.txt\">CryptonightWASMWrapper<\/a>\u00a0web assembly hash function to generate hashes. It is an efficiently computable function which maps data of arbitrary size to data of\u00a0a\u00a0fixed size and behaves similarly to a random function.<\/p>\n<p>This mining activity is not malicious but it is running without\u00a0the\u00a0approval of\u00a0the\u00a0system owner and\u00a0consumes\u00a0CPU power which in turn slows down system performance. This bothers\u00a0the\u00a0user and hampers work\u00a0significantly.<\/p>\n<p><b>Quick Heal<\/b><b>\u00a0d<\/b><b>etection<\/b><\/p>\n<ul>\n<li>Quick Heal has released generic detections to detect such in-browser\u00a0Cryptojacking\u00a0attacks.<\/li>\n<li>These generic detections\u00a0span\u00a0over multiple security layers in\u00a0our\u00a0products.<\/li>\n<\/ul>\n<p><b>Detection s<\/b><b>tats<\/b><\/p>\n<p>Quick Heal has successfully blocked\u00a0the\u00a0detected\u00a0Coinhive\u00a0miner activity. Below is the trend observed so far for\u00a0the\u00a0last\u00a0few weeks.<\/p>\n<figure id=\"attachment_85556\" aria-describedby=\"caption-attachment-85556\" style=\"width: 856px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85556\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/01\/stats5.png\" alt=\"Fig 4. Detection trend observed at Quick Heal Security Labs \" width=\"856\" height=\"272\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/stats5.png 856w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/stats5-300x95.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/stats5-768x244.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/stats5-650x207.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/01\/stats5-789x251.png 789w\" sizes=\"(max-width: 856px) 100vw, 856px\" \/><figcaption id=\"caption-attachment-85556\" class=\"wp-caption-text\"><strong>Fig 4. Detection trend observed at Quick Heal Security Labs<\/strong><\/figcaption><\/figure>\n<p>In-browser mining is really an\u00a0easy way to generate revenue for\u00a0website\u00a0owners\u00a0and for\u00a0mining service providers as well.\u00a0And like\u00a0Coinhive,\u00a0other service providers\u00a0like\u00a0JSEcoin,\u00a0MineMyTraffic,\u00a0CryptoLoot,\u00a0and\u00a0CoinNebula\u00a0are also taking part\u00a0in\u00a0it.\u00a0In-browser mining\u00a0is not\u00a0a\u00a0malicious activity but unauthorized mining and extensive CPU usage should not be permissible. Also,\u00a0compromising one popular website\u00a0could hamper many\u00a0users.<\/p>\n<p>Malware authors are using these mining services\u00a0to fulfill\u00a0their malicious needs.\u00a0We advise our users to\u00a0avoid\u00a0browsing suspicious\u00a0websites\u00a0and\u00a0keep\u00a0their\u00a0antivirus up-to-date to prevent\u00a0your\u00a0system from being\u00a0used\u00a0in\u00a0such mining\u00a0activities.<\/p>\n<p><b>References<\/b><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/massive-campaign-delivering-monero-miner-via-compromised-websites-analysis-quick-heal-security-labs\/\">https:\/\/blogs.quickheal.com\/massive-campaign-delivering-monero-miner-via-compromised-websites-analysis-quick-heal-security-labs\/<br \/>\n<\/a><a href=\"https:\/\/blogs.quickheal.com\/beware-fake-cryptocurrency-mining-apps-report-quick-heal-security-labs\/\">https:\/\/blogs.quickheal.com\/beware-fake-cryptocurrency-mining-apps-report-quick-heal-security-labs\/<\/a><\/p>\n<p><b>Subject Matter Expert<\/b><br \/>\n<b>Prashant Kadam | Quick Heal Security Labs<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrencies like Bitcoin,\u00a0Monero, Ethereum,\u00a0Litecoin,\u00a0and\u00a0Tezos\u00a0are in\u00a0full\u00a0swing.\u00a0And they have exponentially increased\u00a0cryptocurrency mining\u00a0(or\u00a0cryptomining)\u00a0activities. Previously,\u00a0cryptomining\u00a0was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because\u00a0the\u00a0entire process requires\u00a0a\u00a0lot of computation. However,\u00a0there has been an observable change in the mining trends.\u00a0Now, web browsers are taking part in\u00a0cryptomining\u00a0and its activity is growing because the computing power used in [&hellip;]<\/p>\n","protected":false},"author":42,"featured_media":85557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,5],"tags":[1567,1556,1568,1534,1533],"class_list":["post-85551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-security","tag-conhive","tag-cryptocurrency","tag-cryptojacking","tag-miner","tag-monero"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85551"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=85551"}],"version-history":[{"count":4,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85551\/revisions"}],"predecessor-version":[{"id":85561,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85551\/revisions\/85561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85557"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=85551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=85551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=85551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}