WTF is cryptojacking?
Fraudsters are constantly coming up with new tactics to siphon money from legitimate sites. The latest tactic in this never-ending arms race is called cryptojacking.
Since techies have become obsessed with cryptocurrencies like bitcoin, it was only a matter of time before fraudsters would exploit the complexity of distributed ledgers. Here’s an explainer on how cryptojacking works.
WTF is cryptojacking?
Hackers engage in cryptojacking when they use a user’s browser to harvest cryptocurrency like Bitcoin. Cryptocurrencies operate through a distributed ledger where computers are used to verify and add to the ledger. Each addition to the ledger creates more of the currency, so having access to computing power is essential for anyone trying to make a lot of money from cryptocurrencies. Instead of filling warehouses with powerful and expensive servers, some cryptocurrency enthusiasts are turning to users’ browsers to do their cyber mining.
What’s so bad about that?
Theoretically, publishers could allow users to opt into letting their devices be used for cryptocurrency mining. If that were the case, then cryptojacking could be viewed as another experiential revenue source for publishers.
But in reality, cryptojacking is happening without the user’s consent, and it’s not being carried out by traditional publishers. Instead, fraudsters are hijacking users’ devices and all the user notices is a slowdown in their processing speed. The user is likely to blame the website they’re visiting for the problem, but the website that the cryptojacking is occurring on is usually a victim, too, said Jerome Dangu, CTO at Confiant, a tech firm that specializes in blocking bad ads from publishers’ webpages.
The most infamous examples of cryptojacking occurred this fall when hackers injected their mining code into the websites of publishers like Showtime and PolitiFact without the publishers’ knowledge. When this happened, the publishers got docked for having a poor user experience even though they didn’t make any money out of the deal.
How is cryptojacking used?
Hackers can get their mining code onto people’s computers by tampering with Wi-Fi sources. Last week, customers of a Starbucks store in Buenos Aires found this out the hard way. Starbucks patrons had to wait 10 seconds to connect to the store’s Wi-Fi and the processing speed of their devices slowed down because hackers tampered with the store’s connection so that they could use customers’ laptops to mine cryptocurrency.
Hackers can also hide their code in an ad and resell the ad through multiple programmatic platforms until someone fails to catch the malware and serves it to a user, Dangu said. Another tactic hackers rely on to find users who can mine cryptocurrency for them is called “domain squatting.” For example, a hacker will buy the domain Twitter.com.com. Twitter is a popular domain, so there’s bound to be traffic from people who mistype the name of its website.
When users visit Twitter.com.com, they’re sent to a site that offers little in the way of content but makes money by harnessing the user’s CPU in the background for cryptocurrency mining.
Who is doing this hacking?
Dom Fortin, chief information officer at programmatic platform District M, said the practitioners of cryptojacking are already engaged in other types of fraud. Cryptojacking just helps them add a little more cheddar to their pillage. For instance, someone making money by arbitraging the difference between display and video CPMs can add cryptojacking to the mix and get a few more cents out of each user. If a scam is being applied on thousands or millions of users, the money quickly adds up.
Why has this tactic become popular recently?
Tools like Coinhive, which let users mine cryptocurrency directly in the browsers, came out in the fall. Several cryptocurrencies’ prices have also significantly risen over the past year, increasing the incentive for mining these coins for nefarious purposes.
How publishers are handling the Juneteenth holiday this year
A number of publishers are observing Juneteenth this year, but not in the same way, with some making it an official holiday and others encouraging employees to use their PTO to take the day off.
Member ExclusiveMedia Briefing: How media companies’ DE&I efforts, office return statuses are affecting hiring
This week's Media Briefing looks at how issues like diversity, equity and inclusion and office return statuses are factoring into media companies' ability to hire people.
Cheat Sheet: How new antitrust bills could force more data access from Facebook and Google (and stop them from favoring their own services)
A set of bills proposed recently could force platforms to stop favoring their own services and give more data access and tech connectivity to others.
SponsoredIdentity solution fatigue is setting in: How to keep moving
By Kristina Prokop, CEO and co-founder, Eyeota As we move deeper into 2021, the desperate search for identity solutions that can smooth marketing organizations’ transitions to a cookieless world is reaching a fever pitch. There’s no shortage of new identifiers and identity technologies vying for attention — and that’s a big part of the problem. […]
Single-source panel measurement is key to optimizing social media planning, says DISQO report
New study is based on responses from 166,000 U.S. consumers in February and March, each of whom voluntarily allowed to have their digital behaviors observed.
BuzzFeed will finally monetarily reward its Community users for their viral quizzes, lists
BuzzFeed is testing to see if user-generated content could identify new areas of coverage for its staff, and bring in niche audiences, with a new summer program that could pay a contributor up to $10,000 for a viral post.