WTF is cryptojacking?
Fraudsters are constantly coming up with new tactics to siphon money from legitimate sites. The latest tactic in this never-ending arms race is called cryptojacking.
Since techies have become obsessed with cryptocurrencies like bitcoin, it was only a matter of time before fraudsters would exploit the complexity of distributed ledgers. Here’s an explainer on how cryptojacking works.
WTF is cryptojacking?
Hackers engage in cryptojacking when they use a user’s browser to harvest cryptocurrency like Bitcoin. Cryptocurrencies operate through a distributed ledger where computers are used to verify and add to the ledger. Each addition to the ledger creates more of the currency, so having access to computing power is essential for anyone trying to make a lot of money from cryptocurrencies. Instead of filling warehouses with powerful and expensive servers, some cryptocurrency enthusiasts are turning to users’ browsers to do their cyber mining.
What’s so bad about that?
Theoretically, publishers could allow users to opt into letting their devices be used for cryptocurrency mining. If that were the case, then cryptojacking could be viewed as another experiential revenue source for publishers.
But in reality, cryptojacking is happening without the user’s consent, and it’s not being carried out by traditional publishers. Instead, fraudsters are hijacking users’ devices and all the user notices is a slowdown in their processing speed. The user is likely to blame the website they’re visiting for the problem, but the website that the cryptojacking is occurring on is usually a victim, too, said Jerome Dangu, CTO at Confiant, a tech firm that specializes in blocking bad ads from publishers’ webpages.
The most infamous examples of cryptojacking occurred this fall when hackers injected their mining code into the websites of publishers like Showtime and PolitiFact without the publishers’ knowledge. When this happened, the publishers got docked for having a poor user experience even though they didn’t make any money out of the deal.
How is cryptojacking used?
Hackers can get their mining code onto people’s computers by tampering with Wi-Fi sources. Last week, customers of a Starbucks store in Buenos Aires found this out the hard way. Starbucks patrons had to wait 10 seconds to connect to the store’s Wi-Fi and the processing speed of their devices slowed down because hackers tampered with the store’s connection so that they could use customers’ laptops to mine cryptocurrency.
Hackers can also hide their code in an ad and resell the ad through multiple programmatic platforms until someone fails to catch the malware and serves it to a user, Dangu said. Another tactic hackers rely on to find users who can mine cryptocurrency for them is called “domain squatting.” For example, a hacker will buy the domain Twitter.com.com. Twitter is a popular domain, so there’s bound to be traffic from people who mistype the name of its website.
When users visit Twitter.com.com, they’re sent to a site that offers little in the way of content but makes money by harnessing the user’s CPU in the background for cryptocurrency mining.
Who is doing this hacking?
Dom Fortin, chief information officer at programmatic platform District M, said the practitioners of cryptojacking are already engaged in other types of fraud. Cryptojacking just helps them add a little more cheddar to their pillage. For instance, someone making money by arbitraging the difference between display and video CPMs can add cryptojacking to the mix and get a few more cents out of each user. If a scam is being applied on thousands or millions of users, the money quickly adds up.
Why has this tactic become popular recently?
Tools like Coinhive, which let users mine cryptocurrency directly in the browsers, came out in the fall. Several cryptocurrencies’ prices have also significantly risen over the past year, increasing the incentive for mining these coins for nefarious purposes.
Advertising, mired in racism, has a long road to recovery
Companies need to respond to the racism row with genuine intentions or not participate in the conversation at all, anything in between can be very disingenuous.
‘The boundaries have broken’: Employers deal with the reality of workers bringing their ‘whole selves’
ven as employers have touted “bring your whole self to work” theorems over the past couple of years, it’s forgotten that that privilege has only really been afforded to a few. For many, bringing your whole selves to work isn’t an option. And the realities of the current work-from-home brigade mean that many haven’t been given a choice: When work is literally in your home, how do you keep it at arm’s length?
How publishers are changing branded content operations to remotely produce high-res campaigns
By using emerging technology like camera drop kits to ensure higher resolution content, branded content studios are able to ensure clients achieve brand safety.
SponsoredVideo: Marketers discuss the future state of less interruptive in-stream ads
In a new video, experts from GumGum, The Martin Agency and Pinterest discuss the future of video advertising — and outline their vision for how video ads can be less disruptive.
MediaMath explores a possible sale
The ad tech company is working with investment bank Centerview Partners on the process -- which could also include a debt refinancing -- according to people familiar with the matter.
With the latest crisis, media needs to back up words with actions
For the media industry, this was a week of introspection -- and a time of decision. For all the progressive ideals espoused by publishers, marketers and agencies, most fall well short when it comes to turning words into action.