Expansion against mining. Browser mining. How to get caught up in something new. How to protect yourself from browser mining

Golovna / Troubleshooting

The number of these queries has grown significantly, especially in aphids, and has grown significantly in just a short hour of the release of the most popular digital currency - Bitcoin. Buying bitcoins and checks, the rate of increase is risky, mining cryptocurrency is expensive and often unprofitable. There is no longer another way to snag profits, the most obvious and obvious one is to use the resources of Internet users for mining. Browser mining is now commonly known as browser mining.

A bit of theory

It would be wrong to say that such a phenomenon appeared more immediately. Back in 2011, Symantec announced that mining could be launched in a botnet, and Kaspersky Lab discovered a nasty program that connected infected computers to a mining pool. There were special Trojans that were literally placed on the shoulder blades of heavy-duty computers. In the past few years, problems have arisen more than once. The most common issue - the developers of the popular torrent client μTorrent in the beginning of 2015 introduced the program (version 3.4.2 build 28913) with the EpicScale module, which used computer resources to calculate idle time. After massive storms of hackers, the distributors managed to take it from the installation file.
It’s a completely natural diet: why didn’t anyone think of doing mining in a browser before? Moreover, this method does not require special equipment, and the audience of many sites exceeds tens of millions of viewers. It turned out that everything was very simple. Another number of digital currency coins for specific purposes were mined mainly for bitcoins, which would require the availability of ASIC processors and video cards. With the popularization of mining, new cryptocurrencies began to appear, for example, Feathercoin, Litecoin and Monero, the kind of which, because special hashing algorithms do not require such efforts.

Through what is all the fuss

Browser mining has appeared on the mass market for cryptocurrencies and their types. Some are an alternative to advertising on websites, while others are a cunning way to earn money from advertisers on web resources. However, everyone else is not yet ready to play by the rules. The process of mining in a browser can be characterized by the phrase “and for the world, and for all purposes.” Previously, for such purposes, hackers used Trojans to infect the computer, then it is enough to add a special code to the side of the site and while the user is on that page, the computer will mine the cryptocurrency. Moreover, it doesn’t matter whether this code is written, you can insert it in the advertising banner. All that is required for the “victim” is a browser with JavaScript enabled.

A terrible scandal that has overwhelmed the entire Internet, becoming an unexpected loss from the largest torrent resource The Pirate Bay of the hacked miner on its web pages. After the tweet, the site’s authorities admitted that they simply wanted to conduct an experiment with mining as a new method of monetization. In the code of some pages of The Pirate Bay, researchers discovered rows with the Coinhive script, which generates the Monero cryptocurrency.


Before speaking, on the Coinhive website it is entirely clear to demonstrate its services by installing a JavaScript miner on web pages - you can earn money here. In this case, the retailers themselves position their miner as an alternative to advertising and oppose the recruited promotion without prioritizing the investors. Last month, the authors of the Coinhive miner announced a record-breaking one-hour connection of over 2.2 million accounts during the first period of its existence. The total volume of this amounted to 13.5 megahashes per second, which is approximately 5% of all Monero output.


The new trend has begun to rapidly gain momentum, and at the same time, information has appeared about those who have manipulated their computers to mine the Monero cryptocurrency. The SafeBrowse extension used the same Coinhive script.

The anti-virus company ESET identifies miners in the miners' code as unsafe software and classifies them as malvertising. They conducted an investigation and found that sites with such scripts were widely located in Russia, Ukraine and Belarus.


To be fair, Coinhive is far from being the only such service. And other sites that sell ready-made scripts for mining in the browser. Please note that such services are in demand.

How much can you earn by mining in your browser?

At this point, the authors tried to publish messages to the Chain media channel in Telegram using the ready-made Coinhive script. As a result, if you can continuously view Monero through your browser for only one processor, you will end up with approximately $15 per rik. The Pirate Bay's insurance coverage (over 300 million visits per month) and the average hour spent on the site (5.17 times), resulting in income of $47 thousand. for a month. If this principle is used to determine how much you can earn from your Pornhub resource, you will end up with a decent sum - $20 thousand. for a day.


This is what makes sense for great sites with online games and media content. Otherwise, this method will not bring great profits. Zokrem, information resources can earn much more money from advertising, press releases and articles on contracting, or from paid mining in the browser.

How to protect yourself from browser mining

So we went to the main nutrition room. If you often play browser games, watch movies and TV series online, spend a lot of time on great resources, and note how your computer begins to behave, it is entirely clear that you are constantly acquiring cryptocurrency for anyone. There are many ways to protect yourself from this.

For more help, use JavaScript
The simplest way is to turn on JavaScript on sites with a customized browser. On the other hand, this method may cause problems with running scripts on sites, and other sites may not open.



Browser extension for help
It’s much easier to quickly use extensions that can selectively block scripts, for example, NoScript (Firefox), ScriptBlock or ScriptSafe (Chrome).

You can fight mining scripts with the help of ad blockers. The popular extensions AdBlock Plus and UBlock have already added to the list of server filters that are targeted by miners. In the event that the script has changed the domain and is no longer blocked, you will have to make additional changes manually.


Special extensions for browsers have appeared – anti-miners. Among them is Coinhive on Windows OS, open the hosts file in Notepad, which is located on the route: Windows\System32\drivers\etc.
Add a row at the end of the document 0.0.0.0 coin-hive.com and save your money.

On Linux, this file can be opened by typing the command in the terminal: sudo nano /etc/hosts, in Mac OS X - sudo nano /private/etc/hosts. A similar procedure should be followed with other miners if you know their domains.

For additional help, Anti-WebMiner utility
In principle, the same job of editing the hosts file for you can be eliminated by the Anti-WebMiner utility. This is a program for Windows that blocks various web mining scripts. Vaughn redirects the domain, until the scripts are launched. In this case, the utility allows you to delete entries that were made by it, thus rotating the hosts file into the cob mill. Anti-WebMiner is suitable for those users who do not know what hosts are and why they are needed.

In the pouch

The main idea is that mining in a browser is similar to mining directly on the Internet, where you can quickly and easily earn money. If you are rich, you want to believe in this place. The funny thing is that this method is already used by everyone, including small online stores and sites with a small audience. If this reality is of a mass nature, then more serious decisions will be needed, both on the level of search engines and the browsers themselves.

Nowadays, the network actively discusses such a phenomenon as mining cryptocurrency in a browser. But few people write about how to block this process.

The principle of mining through a browser

Over the past few months, JavaScript files have been identified that may have been used to mine cryptocurrencies directly in the browser. For a long time now, cybercrooks have been stealing money in this way to get their money back. Beware of victorious programs or potentially unwanted programs that are installed on the victim’s computer in order to convert the computer’s use into coins.

The mining process takes place within an hour of simply accessing the site. Thus, there is no need to infect a computer or cause a spill. All you need is a browser with JavaScript enabled (which is standard in most browsers).

The website miner is associated with dishonest wikis. This action requires a central processor that blocks a large number of advertising layers so as not to hinder the site’s performance. Cryptocurrency mining, especially Bitcoin mining, will require a lot of effort. Ale hackers respected their brothers for their beauty.

This problem first attracted attention to the CoinHive script, which was launched when you logged into The Pirate Bay, as well as other scripts for development and other websites that vikorist them. So what can you earn? Luckily, there is a security program that can help.

Why doesn't my browser block them?

Before the speech, web browser developers are already discussing ways to exploit cryptocurrency miners. For example, Google Chrome developers are discussing how to solve the problem in their implementation of updates.

Obviously, the creators of Google Chrome do not want to simply keep a blacklist of cryptocurrencies, but consider the possibility of allowing web sites to constantly steal all processor resources without permission.

Some ad units also block cryptocurrency users, but I do not recommend using them because such websites will constantly bombard you with advertisements. Blocking everyone is absolutely necessary for the vikoristan of a large number of websites for the vikoristan of cryptocurrency miners and other greedy speeches against cryptocurrencies without Adblock Plus. I am already convinced that browser vendors will be able to praise the solution to the addition that will help to steal all types of cryptocurrency miners from the future. Today we have to protect ourselves from attacks by miners and criminals who are trying to make money on us.

Install browser extension No Coin

If you just want to protect yourself from bitcoin mining as a preventive measure, then an alternative is now a browser extension that will automatically block cryptocurrency miners for you. Varto should respect that the bases of such extensions are regularly updated with new development scenarios to combat problems that arise.

I recommend you the most popular extension No Coin , available for Google Chrome, Mozilla Firefox and Opera. This extension with a transparent output code is the most popular of its type and effectively copes with blocking of Coin Hive and other similar cryptocurrency miners. You can click on the white list of the popular bitcoin distributor and allow him to hijack your laptop as you wish.

The No Coin extension is currently not available for Microsoft Edge, Apple Safari or Internet Explorer. If you use one of these browsers, you will definitely need another solution, for example, an add-on to protect against corrupted programs that blocks cryptocurrency mining.

Vimknennia JavaScript

Since cryptocurrency mining is based on the distribution of JavaScript files, it goes without saying that something needs to be said about it, and you may just need to turn it on. You can include files, but you need to remember that, with the help of JavaScript, web crawlers create websites without any necessary functions. Are you ready to the point that any required site will not open or function incorrectly?

Therefore, I do not recommend that uninformed professional clients try this procedure. Tim, if you are going to undertake such a short term, you need to remember that you will have to manually register both permitted and prohibited sites. Just because you know how to enable JavaScript in your browser, I won’t provide instructions for that.

Other methods of blocking

There are also other ways to block these scripts, such as editing the hosts file to redirect them and prevent web pages from attracting scripts. You will need to keep the list of blocked miners up-to-date on your own, so it would be better to automatically update your software security so that you can maintain this list for you, for example, browser extensions or security software.

There is also a faceless extension for browsers and a utility of this kind. Most of them have recently appeared and are often in the developmental stage, so they can often be affected by various undeveloped conditions.

Pouches

Vikoristanni cryptocurrency mining for a frying income on the web site is the bouti caviar with compromium - Pranaimnі, Yakby Sait, Yaki Vikoristova Maineriv, they were about those, the miner prazuu, and they allowed the self -praise of the russian rushennya. But you probably won’t notice, because you won’t know that the web page is maximizing the processor, and that’s the problem. Most web sites, like vikory miners, do not give high bids to those that use vikory processors.

In order to avoid these problems, I recommend that beginners and lazy hackers simply install the No Coin extension in their browser, and for those who like to delve into settings and make themselves as safe as possible, start manually editing the hosts or JavaScript file. If you are infected with various virus solutions, I still recommend using an antivirus that blocks cryptocurrency miners.

Like our materials and you want to see them more often on your page.

Mining cryptocurrency on websites has become a real problem. Recently told The Pirate Bay this monetization option. The first services have appeared on the Coinhive platform, which encourages Vlasnik sites to install miners and earn money without banners or advertising. Based on these developments, the average website output on an average laptop generates 30 hashes per second. For The Pirate Bay With an average hour of a session of 5 weeks and a monthly audience of 315 million people, this gives 30×300×315,000,000 = 2,835,000 megahashes per month.

If you treat people humanely and tighten the processor by less than 30%, you will lose 850,000 megahashes. Coinhive pays website owners 0.00015 XMR per million hashes, so The Pirate Bay You can earn 127.5 XMR ($12,000) per month and completely build your reputation in the eyes of traders.

Unfortunately, more sites now choose this monetization option. Sometimes miner scripts penetrate websites without the knowledge of the authorities themselves. One such story was recently revealed by one of the Koristuvachs of Habr. We recently discovered a miner on a small Russian website selling goods for animals.

What’s worse, criminals have begun to exploit miners directly into browser extensions, so that they can work continuously, stealing the computing resources of computers. For example, for several days the SafeBrowse extension with a miner was expanded through the official Chrome Web Store, but the first one was removed. There are two extensions with miners available for Firefox.

Of course, we cannot be quieted by such a prospect. From the point of view of most people, the main problem is how to protect yourself from these miners, so that the stinks do not invade the processor, do not damage the computer and do not consume electricity.

Members of the uBlock Origin advertising blocker have been discussing the problem on GitHub for many years and maintaining a list of cheap domains for blocking. Unfortunately, lately miner scripts began to rapidly change domains, so it’s not so easy to block scripts, unless you block JavaScript in your browser.


It’s important to block the miner script, which is a vikorist’s vypadkovy domain, with standard blockers

However, scripts with random domains are still rarely published. Most mining scripts can be stolen by blocking the most popular domains in hosts and maintaining the list in the current state, adding new domains in the world where they are found. Recently a cost-free program Anti-WebMiner appeared, which does this: the authors update the list of mining domains on GitHub, and the program itself adds these domains to the hosts file.

You can do this manually. At the moment, the list includes 16 domains, including the domain of the well-known Coinhive, which positions itself as a legal service for website owners:

# Anti-WebMiner Start 1.0 43011
0.0.0.0 azvjudwr.info
0.0.0.0 cnhv.co
0.0.0.0 coin-hive.com
0.0.0.0 gus.host
0.0.0.0 jroqvbvw.info
0.0.0.0 jsecoin.com
0.0.0.0 jyhfuqoh.info
0.0.0.0 kdowqlpt.info
0.0.0.0 listat.biz
0.0.0.0 lmodr.biz
0.0.0.0 mataharirama.xyz
0.0.0.0 minecrunch.co
0.0.0.0 minemytraffic.com
0.0.0.0 miner.pr0gramm.com
0.0.0.0 reasedoper.pw
0.0.0.0 xbasfbno.info
# Anti-WebMiner End

Although no one needs to edit hosts manually, then use the utility to update the list of domains and make changes to hosts more easily.

The list of “banned” domains can also be manually entered into the advertising blocker program you are using.

And other options for blocking miner scripts. For example, the No Coin extension for Chrome (GitHub cob code).


The No Coin extension revealed a miner script on the website

This is an extended monitoring of activity on each site - and signals that a miner script has been detected on it. This approach helps to protect against scripts from random domains. Before that, here you can place the site on a white list if you really want to donate some of your processor time. For example, there are a lot of koristuvachs The Pirate Bay In the comments before the news about testing the miner's script, they thought that they wouldn't mind helping their favorite site with their processor time. Over the past year, this torrent tracker has collected a total of $3,500 in donations, and through a miner script you can collect $12,000 per month, in which people will not have to part with pennies (let’s face it, not indiscriminately). People download warez here, free music and films, so why not give it some tedium?

Another extension of minerBlock for Chrome follows the same principle as No Coin. It is also expanding with open weekends, so there will be no turbulence, as the blocker of miners itself will quietly mine the cryptocurrency.

However, the best way to block miner scripts is to install an extension that blocks wikis of any scripts, like NoScript for Firefox.

What happens if someone starts mining cryptocurrency on your computer without your knowledge? Why is the computer not safe? How to protect your computer from online or other unauthorized mining?

What is expected?

On one or more sides of your browser a free code for cryptocurrency mining has been launched.

The processor of your laptop or computer is determined by how much effort is needed for the cryptocurrency, which will be insured by the owner of one of the sites from the downloaded script of the hired miner.

How can I verify this?

On Mac it can be opened Programs -> Utilities -> System Monitoring, go to the tab CPU And we sort all active workloads from the processor. For Windows, open Dispatcher by pressing the key combination CTRL+ALT+DEL.

We expect this picture.

In this vipadka site w-o-s.ru(Posted to the site for those interested - be careful, the site upgrades the system and quickly discharges the battery) taking a closer look at the MacBook processor and the vikorist for the video boot of cryptocurrency.

Subscribe to our channel at Telegram to read only the latest high technologies

Who cares?

Webmasters place a special virus script on the site that will use the processor of your computer or laptop as a remote miner.

It seems that without any effort, mining on websites can turn web surfing into roulette.

Many Vlasnik sites want to make money, and a mining script is a way to a completely stable income that is easy to implement.

There are also a number of options for protecting against web mining.

Method 1. Monitor the cooler and laptop temperature

Perhaps this is the most banal, but also the most effective way to protect yourself from a useless script. If you don't work with 3D graphics and don't render complex scenes with special effects, the laptop can't constantly spin up the cooler.

Take a look at us first System monitoring(on Mac) or open Dispatcher(on Windows) and reconnect so that each of the tabs in the browser does not consume the processor more than 100%.

Method 2. No Coin extension to steal from mining

A special extension No Coin (Zavantazhiti) has been updated for the Google Chrome browser. When you go to the site where the script of the recruited miner is located, the sign will light up in No Coin, and the mining process will be suspended.

Method 3. Extension of minerBlock to steal from mining

Another extension that duplicates the functionality of No Coin. minerBlock (Enter) is also available for the Google Chrome browser and can alert you to the presence of a rogue miner on a site that has blocked its activity.

Method 4. Blocking the Hosts file

Any system (Windows, macOS, Windows) has a system host file, which contains the addresses of web resources to which access from a computer or laptop is blocked.

On macOS, open the program Terminal then enter the command:

From the new row, add to the file and add to the following address:

This way you will block access to one of the most popular web miners (the little ones). Next, if new ones are discovered, you can also update the list of blocked sites in the hosts file.

Method 5. Use the NoScripts plugin to steal from mining

One of the most effective ways to combat web miners is to block JavaScript. So, for the Firefox browser there is a special NoScript plugin that automatically includes code that will corrupt your laptop’s processor for the benefit of innocent miners.

The received scripts that transform our laptops and computers on the farm are the reality of daily surfing. The only way to combat rude and rude webmasters is to eliminate all blockers and control them.

As it turns out, website owners are ready to sacrifice their reputation for Bitcoin and Ethereum.

Dzherelo iphones.ru Author Ivan Petrov | Photo by Dzherel

With the help of cheap scripts, unscrupulous miners can exploit your “hedge” as an additional computing resource for searching for cryptocurrency blocks, which can lead to rapid wear of video cards and processors, overheating of devices and rapid battery drain. laptop.

This method of earning cryptocurrencies is called cryptojacking. According to the statistics of the AdGuard service, this non-trivial method of secretly obtaining cryptocurrency is practiced by more than 30 thousand sites. And its volume grows with every month.

How do you mean that your PC or smartphone has become a victim of dark miners?

It’s easy to discover the fact that your computer has become a victim of cryptojacking. Yakshcho is packed with the productivity of the PC, and the count of the processor of the processor nuclei at the “dispatchers of the Zavdan” (for Khil, the Zhodni resource not to vicentally vicentized), the showing is pretended to be practically, the cluster is practical on your comp'yuteri crypto.

When using a smartphone, you will notice the amazing activity of mobile programs. And if your device was recently purchased, and soon began to rapidly discharge and heat up, it is especially likely that you have become a “zombie” in the service of shadow miners. The signs we have listed can never be the cause of infection of the device, but you won’t be able to change it at all.

If you have determined that the problems with your devices are due to the dark version of cryptocurrency via your browser, be sure to close the browser and restart your computer or smartphone. It is certain that in 99% of cases the anomaly will be corrected, and you can equip your “hatch” with additional software, following our recommendations below.

How to protect yourself from cryptojacking and mining?

  1. If you have not yet become a victim of targeted mining, then this is an effective way to protect yourself from it. Given the scale of the tragedy, Opera Software has released a new browser that provides additional protection against mining. It is activated when the ad and spam blocker is turned on on desktop PCs and mobile devices. For the rest, you need to download and install the Opera Mini browser (for Android and iOS). The advertising blocker, in its own way, automatically detects mining scripts embedded in the code of web pages and blocks them.
  2. It is not obligatory to immediately look at Opera, if you prefer someone else. You can now check to see how much your third-party browser can be stolen by malicious scripts. For this purpose, the authors of Opera Software launched a website on the Internet www.cryptojackingtest.com. Once you've signed up via any browser on your PC, smartphone or tablet, click on the “Start” button, after which the service will check for security. After an hour of testing Google Chrome showed a positive result.
  3. If you use the Google Chrome or Mozilla Firefox browser and don’t mind switching to Opera, simply install the No Coin or Adblock Plus extension for your browser using your preferred service. These plugins effectively deal with cryptojacking blocks. And with Firefox, you can immediately enable the viewing of any scripts using the equally popular NoScript plugin.
  4. And most importantly, do not access sites in doubt, do not install unknown programs and software on your computer or smartphone, and do not forget to regularly update your anti-virus software.

© 2024 androidas.ru - All about Android