Is Cryptojacking Dead after Coinhive Shutdown?

01/07/2020
by   Said Varlioglu, et al.
0

Cryptojacking is the exploitation of victims' computer resources to mine for cryptocurrency using malicious scripts. It has become popular after 2017. Coinhive, which was a mining service, legally produced scripts and provided servers for in-browser mining activities. Over 10 million web users had been victims every month before Coinhive shutdown that happened on Mar 2019. This paper explores the new era of the cryptojacking world after Coinhive discontinued its service. We aimed to see whether and how attackers continue cryptojacking, generate new malicious scripts, and developed new methods. We used a capable cryptojacking detector named CMTracker that proposed by Hong et al. in 2018. We automatically and manually examined 2770 websites that had been detected by CMTracker before Coinhive. The results revealed that 99 no longer continue cryptojacking. 1 scripts. By tracking these mining scripts, we detected 632 unique cryptojacking websites. Moreover, open source investigations (OSINT) demonstrated that attackers still use the same methods. Therefore, we listed the typical patterns of cryptojacking. We concluded that cryptojacking is not dead after the Coinhive shutdown. It is still alive, but not as attractive as it used to be.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/25/2021

Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites

COVID-19 has hit hard on the global community, and organizations are wor...
research
03/05/2021

SoK: Cryptojacking Malware

Emerging blockchain and cryptocurrency-based technologies are redefining...
research
09/06/2018

End-to-End Analysis of In-Browser Cryptojacking

In-browser cryptojacking involves hijacking the CPU power of a website's...
research
05/09/2019

Enhanced Performance and Privacy for TLS over TCP Fast Open

Small TCP flows make up the majority of web flows. For them, the TCP thr...
research
09/30/2018

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation

The proliferation of web applications has essentially transformed modern...
research
05/09/2023

Generating Phishing Attacks using ChatGPT

The ability of ChatGPT to generate human-like responses and understand c...
research
08/28/2018

Web-based Cryptojacking in the Wild

With the introduction of memory-bound cryptocurrencies, such as Monero, ...

Please sign up or login with your details

Forgot password? Click here to reset