WTF is cryptojacking?
Fraudsters are constantly coming up with new tactics to siphon money from legitimate sites. The latest tactic in this never-ending arms race is called cryptojacking.
Since techies have become obsessed with cryptocurrencies like bitcoin, it was only a matter of time before fraudsters would exploit the complexity of distributed ledgers. Here’s an explainer on how cryptojacking works.
WTF is cryptojacking?
Hackers engage in cryptojacking when they use a user’s browser to harvest cryptocurrency like Bitcoin. Cryptocurrencies operate through a distributed ledger where computers are used to verify and add to the ledger. Each addition to the ledger creates more of the currency, so having access to computing power is essential for anyone trying to make a lot of money from cryptocurrencies. Instead of filling warehouses with powerful and expensive servers, some cryptocurrency enthusiasts are turning to users’ browsers to do their cyber mining.
What’s so bad about that?
Theoretically, publishers could allow users to opt into letting their devices be used for cryptocurrency mining. If that were the case, then cryptojacking could be viewed as another experiential revenue source for publishers.
But in reality, cryptojacking is happening without the user’s consent, and it’s not being carried out by traditional publishers. Instead, fraudsters are hijacking users’ devices and all the user notices is a slowdown in their processing speed. The user is likely to blame the website they’re visiting for the problem, but the website that the cryptojacking is occurring on is usually a victim, too, said Jerome Dangu, CTO at Confiant, a tech firm that specializes in blocking bad ads from publishers’ webpages.
The most infamous examples of cryptojacking occurred this fall when hackers injected their mining code into the websites of publishers like Showtime and PolitiFact without the publishers’ knowledge. When this happened, the publishers got docked for having a poor user experience even though they didn’t make any money out of the deal.
How is cryptojacking used?
Hackers can get their mining code onto people’s computers by tampering with Wi-Fi sources. Last week, customers of a Starbucks store in Buenos Aires found this out the hard way. Starbucks patrons had to wait 10 seconds to connect to the store’s Wi-Fi and the processing speed of their devices slowed down because hackers tampered with the store’s connection so that they could use customers’ laptops to mine cryptocurrency.
Hackers can also hide their code in an ad and resell the ad through multiple programmatic platforms until someone fails to catch the malware and serves it to a user, Dangu said. Another tactic hackers rely on to find users who can mine cryptocurrency for them is called “domain squatting.” For example, a hacker will buy the domain Twitter.com.com. Twitter is a popular domain, so there’s bound to be traffic from people who mistype the name of its website.
When users visit Twitter.com.com, they’re sent to a site that offers little in the way of content but makes money by harnessing the user’s CPU in the background for cryptocurrency mining.
Who is doing this hacking?
Dom Fortin, chief information officer at programmatic platform District M, said the practitioners of cryptojacking are already engaged in other types of fraud. Cryptojacking just helps them add a little more cheddar to their pillage. For instance, someone making money by arbitraging the difference between display and video CPMs can add cryptojacking to the mix and get a few more cents out of each user. If a scam is being applied on thousands or millions of users, the money quickly adds up.
Why has this tactic become popular recently?
Tools like Coinhive, which let users mine cryptocurrency directly in the browsers, came out in the fall. Several cryptocurrencies’ prices have also significantly risen over the past year, increasing the incentive for mining these coins for nefarious purposes.
How Axios is tackling local news: newsletters from small teams, in more markets
Axios plans to have local newsletters in 23 markets in 2022. But local news is a challenging undertaking, and many have failed before it. How is Axios differentiating itself?
‘Giving people more control’: Rise in flexible working is enabling older workers to defer retirement
Enforced working from home has opened many people’s eyes to the potential for flexible working, and for many older people it has offered them a way to defer retirement.
Member ExclusiveMedia Buying Briefing: ‘The golden age of audio’: New forms hit a higher note, but radio buyers still struggle to hear it
As digital audio continues to grow, forecast by eMarketer to hit $5.59 billion in 2021, media buyers and planners are still trying to find ways to make effective use of it.
SponsoredHow legacy publishers are transforming into profitable streaming channels
Navdeep Saini, co-founder and CEO, DistroScale, parent company of DistroTV Connected TV (CTV) has become one of the fastest developing channels in advertisers’ marketing mix today. The pandemic led to an increase in CTV consumption, with 75% of consumers watching more streaming content than before quarantines set in. With streaming viewership continuing to gain momentum, […]
Publishers boost climate change coverage as the issue takes the world stage
With the countdown to the COP26 summit underway, publishers are boosting their coverage of climate change in videos, articles, events and audio.
‘We see a world where publisher data replaces third-party data’: News U.K. puts its data at the nucleus of post-cookie push for media budgets
News U.K. has overhauled the way it collects, sorts and monetizes its audience data across all its titles via first-party data platform Nucleus.