Science Now even YouTube serves ads with CPU-draining cryptocurrency miners

https://arstechnica.com/information...-ads-with-cpu-draining-cryptocurrency-miners/

YouTube was recently caught displaying ads that covertly leach off visitors' CPUs and electricity to generate digital currency on behalf of anonymous attackers, it was widely reported.

Word of the abusive ads started no later than Tuesday, as people took to social media sites to complain their antivirus programs were detecting cryptocurrency mining code when they visited YouTube. The warnings came even when people changed the browser they were using, and the warnings seemed to be limited to times when users were on YouTube.

On Friday, researchers with antivirus provider Trend Micro said the ads helped drive a more than three-fold spike in Web miner detections. They said the attackers behind the ads were abusing Google's DoubleClick ad platform to display them to YouTube visitors in select countries, including Japan, France, Taiwan, Italy, and Spain.

The ads contain JavaScript that mines the digital coin known as Monero. In nine out of 10 cases, the ads will use publicly available JavaScript provided by Coinhive, a cryptocurrency-mining service that's controversial because it allows subscribers to profit by surreptitiously using other people's computers. The remaining 10 percent of the time, the YouTube ads use private mining JavaScript that saves the attackers the 30 percent cut Coinhive takes. Both scripts are programmed to consume 80 percent of a visitor's CPU, leaving just barely enough resources for it to function.

"YouTube was likely targeted because users are typically on the site for an extended period of time," independent security researcher Troy Mursch told Ars. "This is a prime target for cryptojacking malware, because the longer the users are mining for cryptocurrency the more money is made." Mursch said a campaign from September that used the Showtime website to deliver cryptocurrency-mining ads is another example of attackers targeting a video site.

To add insult to injury, the malicious JavaScript in at least some cases was accompanied by graphics that displayed ads for fake AV programs, which scam people out of money and often install malware when they are run.

Like the ads analyzed by Trend Micro and posted on social media, it mined Monero coins on behalf of someone with the Coinhive site key of "h7axC8ytzLJhIxxvIHMeC0Iw0SPoDwCK." It's not possible to know how many coins the user has generated so far. Trend Micro said the campaign started January 18. In an e-mail sent as this post was going live, a Google representative wrote:

"Mining cryptocurrency through ads is a relatively new form of abuse that violates our policies and one that we’ve been monitoring actively. We enforce our policies through a multi-layered detection system across our platforms which we update as new threats emerge. In this case, the ads were blocked in less than two hours and the malicious actors were quickly removed from our platforms."

It wasn't clear what the representative meant when saying the ads were blocked in less than two hours. Evidence supplied by Trend Micro and on social media showed various ads containing substantially the same JavaScript ran for as long as a week. The representative didn't respond to follow-up questions seeking a timeline of when the abusive ads started and ended.

As the problem of Web-based cryptomining has surged to almost epidemic proportions, a variety of AV programs have started warning of cryptocurrency-mining scripts hosted on websites and giving users the option of blocking the activity. While drive-by cryptocurrency mining is an abuse that drains visitors' electricity and computing resources, there's no indication that it installs ransomware or other types of malware, as long as people don't click on malicious downloads.
 
I've always wanted to ask this question to people who know their shit: how exactly is a virus programmed, and how do they work?
 
I've always wanted to ask this question to people who know their shit: how exactly is a virus programmed, and how do they work?
this question is so broad it's dumbfounding. it's like asking the same of human sickness. the answer varies and the vector is massively different.

in this instance it's not a virus by traditional definitions. they are just running JavaScript that does work on behalf of the developer to create cryptocurrency. it's sort of hard to describe this if you don't understand how crypto works. most ads are designed to load as fast as possible so you aren't inconvenienced by them, but mining bitcoin is busy work for computers. somehow, these guys got Google to run ads with code that basically made YouTube users run in a hamster wheel generating money for them.
 
this question is so broad it's dumbfounding. it's like asking the same of human sickness. the answer varies and the vector is massively different.

Ah okay, sorry. To tighten the scope of my question, is it different in any way to write a program that does this to ads than it would be other kinds of malware? Also, do these cryptocurrency miner ads even count as (traditional) viruses, or something else?

Edit:

Thanks for the response.
 
Last edited:
I've always wanted to ask this question to people who know their shit: how exactly is a virus programmed, and how do they work?

A virus is pretty much any program that makes copies of itself and spreads them, however it does that. The original PC viruses were literally just simple programs that installed themselves to the boot sector of a floppy disk, and would copy themselves to the boot sector of any hard drive they detected, and then, the copies on the hard drive would similarly infect any floppies inserted. Rinse and repeat.

Somewhat more complex is the worm, which actively seeks out systems to infect on a network, whether a LAN or (more commonly now) over the Internet.

Crypto mining malware in ads isn't generally either of these things, though there are bad actors who spread worms/viruses that include mining software. It generally only runs when you're on a specific site, and isn't inherently malicious, at least if it isn't done surreptitiously. For instance, you could use it as a way of compensating the site owner if people knew it was there and agreed to that (as we did here before malefactors false reported us).
 
A lot of people hate on cryptomining javascript in webpages but I think with proper implementation it could perhaps not be so bad (and eliminate advertising), but it's a very new phenomenon and I haven't considered all the drawbacks. I think some people would rather have some idle script mining bitcoin or ethereum or something rather than annoying ads wasting up page space, wasting your time (waiting on videos to load) and also tracking the everliving shit out of you. It also could be better for businesses since it would be a form of more "guaranteed" income whereas getting advertisers to your site could prove difficult.

However, doing both at the same time is insane and greedy, but knowing how shit like this usually goes down, it wouldn't surprise me if in the future it was common to advertise to/track your consumers as well as use them to mine shitcoins.
 
Ads aren’t harmful they said, it’s only 30 seconds they said...
I usually try to be business-friendly but it went from 15-second ads to 30 second ads to 30 second unskippable ads then 1:30 second unskippable ads then to 1:30 second unskippable ads that drain your computing power. Now I'm finally considering ad block. *sigh*
 
This is good. People that don't use adblockers should be milked to the maximum extent to cover server costs. It's not as if anyone dumb enough to browse the web without one had anything more important to do with their time than watch ads.
 
Back