Skip to main content

Some Sites Are Mining Cryptocurrency Using Your CPU Even When You Close Browser

Cryptojacking is a technique popularized by the website ThePirateBay which consists of integrating into the web code a mining system using Javascript, which ‘hijacks’ the user’s processor that surfs the web to mine cryptocurrencies. However, now according to the reports, some sites are mining cryptocurrencies using your CPU even when you close browser.

Some Sites Are Mining Cryptocurrency Using Your CPU Even When You Close Browser


The Bitcoin surpassed yesterday the 11,000 dollars, although later it adjusted its value something below. The rest of cryptocurrencies are also worth more and more money and a real fever have been unleashed around them.

As always happens in these cases, the “more fashionable” things attract the eyes of everyone, including hackers and cybercriminals as well. One of the last practices is to mine for them cryptocurrencies when we visit a web page. In addition, it has now been discovered that websites can continue to undermine cryptocurrencies on your PC even if we close the browser.

A few weeks ago we told you about the great problem of the “hidden” cryptocurrency mining scripts and the most worst thing about this is that we do not even know when it started.

Everything goes back to when The Pirate Bay began to test these actions as a way to replace advertising revenues, a segment that has been greatly affected by the use of blockers.

After this, many portals have signed up to this practice, in most cases without notifying users. Threats have also spread in the form of malware for the sole purpose of using users’ computers for the mining of cryptocurrencies such as Bitcoin or Ethereum.

The thing has come to such a point that many have had to come by and the tech giant Google’s Chrome wants to prevent the mining of cryptocurrencies natively by introducing protection measures in the browser. At the moment, we can opt for extensions like “No Coin – Block miners on the web!” to avoid it, although things are going to get worse in the coming months.

Watch out! Websites can continue to undermine even if you close the browser

Until now, it was enough to close the websites that used the cryptocurrency mining in the background through Coinhive, to end this practice. However, Malwarebytes is warning of a new technique that allows mining services “hidden” for the user to continue working even when we have closed the browser.

The technique works through the opening of a hidden pop-up that hides behind the Windows bar on the back of the watch. This makes it difficult to detect that the browser is still open. That hidden window is where the mining service continues to operate indefinitely, squeezing our processor in an unlimited way until we realize the problem.

The alternatives to end this practice also go through the use of antivirus solutions that block the mining of cryptocurrencies or the extension that we have discussed a few paragraphs above. These are the options until the main navigators get down to work and finish with this practice.


So, what do you think about this? Simply share your views and thoughts in the comment section below.

Comments

Popular posts from this blog

What is the difference between a direct and an indirect address instruction ?

Direct addressing means the instruction refers directly to the address being accessed. That is, the instruction encoding itself contains the address of the location. Depending on the instruction set, it may also allow computing a small index relative to the address. When used that way, you can think of that as a direct-indexed mode. (Note: Some processors call ‘direct’ mode ‘absolute’, such as the 6502.)

Indirect addressing uses an address held in a register or other location to determine what memory location to read or write. The idea here is that the instruction itself isn’t directly telling you the address to access, but rather indirectly telling the CPU where to find that address. The processor may also allow you to add a small offset to the indirect address, giving an indirect-indexed addressing mode.
Also Read : 5 Best Terminal Emulators for Linux The 6502 one is a little quirky: The 6502 doesn’t have general-purpose registers large enough to store addresses, so i…

What is ASP.NET? and it's ARCHITECTURE

What is ASP.Net?ASP.Net is a web development platform provided by Microsoft. It is used for creating web-based applications. ASP.Net was first released in the year 2002.
The first version of ASP.Net deployed was 1.0. The most recent version of ASP.Net is version 4.6. ASP.Net is designed to work with the HTTP protocol. This is the standard protocol used across all web applications.

ASP.Net applications can also be written in a variety of .Net languages. These include C#, VB.Net, and J#. In this chapter, you will see some basic fundamental of the .Net framework.

The full form of ASP is Active Server Pages, and .NET is Network Enabled Technologies.
ASP.NET Architecture and its Components ASP.Net is a framework which is used to develop a Web-based application. The basic architecture of the ASP.Net framework is as shown below.
 he architecture of the.Net framework is based on the following key components

Language – A variety of languages exists for .net framework. They are VB.n…

What Is Defensive Programming ?

Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed. – WikiPedia


Introduction Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed.
Advantages Defensive programming is an approach to improve software and source code, in terms of:
General qualityMaking the source code comprehensibleMaking the software behave in a predictable mannerDrawback Overly defensive programming, however, may safeguard against errors that will never be encountered, thus incurring run-time and maintenance costs. There is also the risk that the code traps or prevents too many exceptions, potentially resulting i…