Malignant currency mining program "Monero" targeted Google's "DoubleClick" operations
Trend Micro, a provider of security software, hardware and services, has discovered Malvertising, a campaign to use online advertising to spread malware on high-end websites used by **Coinhive, JavaScript **programming scripts that allow webmasters to mine Currency "Monero" using CPUs for visitors.
Trend Micro reported in the security information blog that the attackers targeted Google's DoubleClick operations, which provide Internet advertising services for distribution. In addition, Maladvertisements also used an independent Internet metal connected to a private mining cluster. Trend Micro also reported its findings to Google about the campaign that affected Japan, France, Taiwan, Italy and Spain. Trend Micro observed an increase in traffic to five harmful areas on January 18, and on January 24, there was a 285% jump in the metal number "Coinhive" where hits came from DoubleClick ads.
Include Internet Metal Scripts
Two different Internet mineral scripts are included, along with a text program that displays ads from "DoubleClick". Where the web page attacked the ad while the online miners performed their secret duties. The use of ads on legitimate sites is believed to be a trick to attack more users. However, movement on the sites associated with these minerals decreased after 24 January.
The ad contains JavaScript programming commands that randomly generate a number between one variable and 100. When a variable is created above 10, the "coinhive.min" is alerted to 80% of CPU power. This occurs in 90% of the time, while for the other 10%, a special metal is launched on the Internet. The mineralizer is formed through a 0.2 throttle indicating that they use 80% of the CPU's mining resources.
After the removal of the "mqoj_1" private Internet mute, it is still possible to determine the code in **JavaScript **based on "Coinhive" and then the modified metal using a different mining pool which is used to avoid a 30% commission fee from Coinhive.
Ability to prevent attacks
Metal "Coinhive" can be prevented from using CPU resources by preventing JavaScript-based applications from running on Internet browsers, according to the code. The impact of malicious digital currency programs and other threats that exploit system vulnerabilities can also be mitigated by updating and correcting programs.
The Trend Micro protection suites and security-free security protect users and users from threats by blocking certain URL links and other files. The Micro Trend Protection Suites provide "Trend Micro" capabilities such as behavior control, reputable online services, a high-precision learning machine and application control to minimize the impact of metallic digital currencies and other threats.