In 2017, cyber criminals have developed new ingenious ways to keep their victims without money and valuable information. They steal phone numbers to intercept one-time passwords and hack your Bank account, embed a virus in a pirate broadcast of the popular TV show to collect personal data, and — something else — secretly mined cryptocurrency by using the computing power of compromised computers. Dynamiclayouts according to IBM's X-Force and "Kaspersky Lab", from the beginning of 2017, the number of attacks on the corporate network with the purpose of mining cryptocurrencies has increased six-fold, and viruses, providing a hidden bitcoin mining and were infected a third of all Metropolitan computers.
Recently, the probability that your computer will take into slavery, has increased dramatically. Some online services have begun to test alternative method of monetization, and hackers found in this resource for illegal earnings, which can literally extort from other people's computers.
Where did the energy-guzzlers?
But as it turned out, the services has access to legal earnings, is also involved in testing new system to bypass the user or, as the major sources of traffic have been used by enterprising hackers. On a hidden mining Monero caught the American channel Showtime, and it became known that this could be loaded to 60 percent from online custom processors. The company has not commented on this information.
The same problem faced by readers of a number of Ukrainian media owned by one holding company. After user complaints such publications as Football.ua, Korrespondent.net admitted that the power could use a "one partner" media resources, and formally apologized to users in official statements.
Photo: Andrew Burton / Getty Images
It is obvious that, despite the good-looking facade, which is the development of new ways of monetization, site owners are in no hurry to declare in advance the intention for its users, as if hoping that all delivered audience the inconvenience will be blamed on hackers. And, of course, to make some money until users learned to block infection.
In addition, all programs for the pirate mining is eloquent common features, profitable, and pirates, and those who, not having sufficient technical training covered activity: while viruses infect only computers running on Windows operating system, and make it mine Monero. As a result, the scammers get the cryptocurrency, and the user collapse the performance of the computer up to the serious injury to the system.
Now Monero has a different Outlook: it occupies the 8th place in the ranking of cryptocurrencies by market capitalization and costs around one hundred dollars. But the reputation steadily appreciating cryptocurrency is at risk and pirates, and services in search of new ways of monetization for covert mining choose. In the end, every day there are more reports of lesion sites with viruses-getters Monero.
Features mining Monero is such that for him more suited as times the capacity of the processors, particularly the Intel Core I7 and graphics cards for example. The most common script СoinHive was developed for covert mining of this coin and using Internet browsers. But the main thing — a measure of anonymity Monero. Unlike bitcoin wallet address Monero cannot be traced, but transaction history is not stored anywhere, which is extremely important for all followers of the shadow wages.
When high-profile cases related to the closure of sites AlphaBay, Hansa and a temporary freeze crypto currency exchange BTC-e, showed that the intelligence services have the tools to identify users of the blockchain, involved in illegal activities, the criminal world began a massive shift with bitcoins for other cryptocurrencies. During this year, the share of illicit transactions in bitcoin, is steadily falling and now stands at just 20 per cent of total transactions, which include selling drugs on the darknet, and the laundering of funds obtained by other illegal means in recognized currencies.
How to check and protect your computer?
Your computer is at risk if you are using Windows. But laptops, unlike desktop PCs, found immunity to the pirate plague. The device from Apple is also resistant to currently known scripts for covert mining.
Image: page, Evg Bell in Facebook
If overheating, unresponsiveness and other visible evidence of overloading the system CPU is not observed, to identify the script should check for the appropriate list of malware. In case of detection of one of the scripts, which can be seen via the task Manager of the browser, they should be lock in the settings.
However, additional protection of miners also loads the computer's RAM, though not as much as the activities themselves miners. Users who are not ready to install another extension, and limited to, for example, the standard uBlock, but the result is not guaranteed. Still have to block all suspicious scripts, by trial and error by identifying which of them will not affect the operation of the sites.
The Internet is a new era or I earn, and then the technology will be forgotten?
Most likely, the advertising market the first thing to react to new opportunities for marginal sites by raising the price of advertising. Small web services and platforms for selling services around in the hackers, and get their three rubles and calm down. Well, the largest of the company as soon as possible return to the old method.
Photo: Thomas Peter / Reuters
However, the method of monetization through mining has the prospect, if his ideology will be able to stop the epidemic of hidden prey and to find a civilized approach to resource allocation and to solve the main ethical problem — the problem of consent.
Companies lose reputation, by default, assuming that the user agree on one payment method — advertising, also agree on another option, but still hidden. On the situation in the network paranoia caused by surveillance by the authorities, and all new distortions of the law, to rely on the tacit consent simply stupid. Instead of suppressing the need of active actions from the major players like Showtime, which will serve as a positive example for others. For example, a constructive solution may be to offer users to pay for the services, software or content giving power of their cars to rental companies.
- 21-02-2020The phantom menace: the non-obvious consequences of the depletion of nature for the economy
- 24-07-2019Look at the future of business: five trends postremoval era
- 23-06-2019Industrial revolution 4.0: how the Internet of things is changing business and how to stay afloat
- 19-04-2019How IoT technologies will change the world in the next 10 years
- 12-04-2019Empty threats: why Russia does not control the execution of its sanctions