A first look at browser-based Cryptojacking

03/07/2018
by   Shayan Eskandari, et al.
0

In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code- bases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency, typically without her consent or knowledge, and pays out the seigniorage to the website. Websites may consciously employ this as an alternative or to supplement advertisement revenue, may offer premium content in exchange for mining, or may be unwittingly serving the code as a result of a breach (in which case the seigniorage is collected by the attacker). The cryptocurrency Monero is preferred seemingly for its unfriendliness to large-scale ASIC mining that would drive browser-based efforts out of the market, as well as for its purported privacy features. In this paper, we survey this landscape, conduct some measurements to establish its prevalence and profitability, outline an ethical framework for considering whether it should be classified as an attack or business opportunity, and make suggestions for the detection, mitigation and/or prevention of browser-based mining for non- consenting users.

READ FULL TEXT
research
08/28/2018

Web-based Cryptojacking in the Wild

With the introduction of memory-bound cryptocurrencies, such as Monero, ...
research
09/06/2018

End-to-End Analysis of In-Browser Cryptojacking

In-browser cryptojacking involves hijacking the CPU power of a website's...
research
08/02/2018

Digging into Browser-based Crypto Mining

Mining is the foundation of blockchain-based cryptocurrencies such as Bi...
research
12/10/2018

On legitimate mining of cryptocurrency in the browser - a feasibility study

Cryptocurrency mining in the browser has the potential to provide a new ...
research
06/18/2020

CoinPolice:Detecting Hidden Cryptojacking Attacks with Neural Networks

Traffic monetization is a crucial component of running most for-profit o...
research
04/28/2020

A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web

In late 2017, a sudden proliferation of malicious JavaScript was reporte...
research
09/19/2023

Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT

This paper explores the possibility of using ChatGPT to develop advanced...

Please sign up or login with your details

Forgot password? Click here to reset