Ad blocking firm AdGuard has found that over 500 million people are inadvertently mining cryptocurrencies through their computers after visiting websites that are running background mining software. The company found 220 popular websites with an aggregated audience of half a billion people use so-called crypto-mining scripts when a user opens their main page. Newsweek reports: The mining tool works by hijacking a computer’s central processing unit (CPU), commonly referred to as “the brains” of a computer. Using part of a computer’s CPU to mine bitcoin effects the machine’s overall performance and will slow it down by using up processing power. The researchers found that bitcoin browser mining is mostly found on websites “with a shady reputation” due to the trouble such sites have with earning revenue through advertising. However, in the future it could become a legitimate and ethical way of making money if the website requests the permission of the visitor first. “220 sites may not seem like a lot, ” the researchers wrote in a blogpost detailing their discovery. “But CoinHive was launched less than one month ago on September 14. The growth has been extremely rapid: from nearly zero to 2.2 percent of Alexa’s top 100, 000 websites. “This analysis well illustrates the whole web, so it’s safe to say that one of every forty websites currently mines cryptocurrency (namely Monero) in the browsers their users employ.” Read more of this story at Slashdot.
Visit link:
Over 500 Million PCs Are Secretly Mining Cryptocurrency, Researchers Reveal
A number of HP device owners are complaining of seeing black screens for around five to 10 minutes after entering their Windows login information. From a report: They appear to be pointing the finger of blame at Windows 10 updates released September 12 for x64-based systems. One, a quality update called KB4038788, offered a whopping 27 bullet points for general quality improvements and patches, such as an “issue that sometimes causes Windows File Explorer to stop responding and causes the system to stop working.” Another, KB4038806, was a “critical” patch for Adobe Flash Player that allowed remote code execution. Read more of this story at Slashdot.
An anonymous reader shares an article: Container shipping company A.P. Moller Maersk on Tuesday said it expects that computer issues triggered by the NotPetya cyberattack will cost the company as much as $300 million in lost revenue. “In the last week of the [second] quarter we were hit by a cyber-attack, which mainly impacted Maersk Line, APM Terminals and Damco, ” Maersk CEO Soren Skou said in a statement. “Business volumes were negatively affected for a couple of weeks in July and as a consequence, our Q3 results will be impacted. We expect that the cyber-attack will impact results negatively by USD 200-300m.” Maersk Line was able to take bookings from existing customers two days after the attack, and things gradually got back to normal over the following week, the company said. It said it did not lose third-party data as a result of the attack. Read more of this story at Slashdot.
From a CNET report: Next to DJ Tiesto’s loud image on Wet Republic’s website sits a photo of a bikini model with a beard and an eye patch, with a simple message: “It’s all out war.” Not exactly the type of message you’d expect from a spot that advertises itself as a dance club that doubles as a pool party, but when hackers are in town for Defcon, everything seems to be fair game. The hacker convention, which is in its 25th year in Las Vegas, typically has hotels on alert for its three days of Sin City talk, demos and mischief. Guests are encouraged not to pick up any flash drives lying around, and employees are trained to be wary of social engineering — that is, bad guys pretending to be someone innocent and in need of just a little help. Small acts of vandalism pop up around town. At Caesars Palace, where Defcon is happening, the casino’s UPS store told guests it was not accepting any print requests from USB drives or links, and only printing from email attachments. Hackers who saw this laughed, considering that emails are hardly immune from malware. But the message is clear: During these next few days, hackers are going to have their fun, whether it’s through a compromised Wi-Fi network or an open-to-mischief website. Wet Republic’s site had two images vandalized, both for the “Hot 100” party with DJ Shift. The digital graffiti popped up early Friday morning, less than 24 hours after Defcon kicked off. Read more of this story at Slashdot.