PC Pro

PC Probe: What’s yours is mined

We discover how your PC or smartphone could be being dragged down by secret Bitcoin-mining software in apps and websites.

-

Have you noticed your web browser swallowing more of your computer’s resources? It’s tempting to believe that Google Chrome’s memory hogging is getting worse, but it could be that the site you’re visiting is secretly harvesting your “spare” CPU cycles for a profit.

Amid a dramatic, volatile increase in the value of virtual currencies such as Bitcoin and Monero, mining them is an increasing­ly tempting source of income. So much so that a new set of JavaScript-based mining tools designed to help websites legitimate­ly earn money from their visitors are being subverted to steal CPU cycles on the quiet.

“You’re effectivel­y stealing resources from someone else and trying to make money out of it,” said Simon Edwards, security architect at Trend Micro. “The impact on users of affected devices is clear in increased device wear and tear, reduced battery life and comparably slower performanc­e.”

Cryptocurr­ency mining is big business, and with the cost of creating competitiv­e specialist rigs escalating, a distribute­d model makes sense – if the participan­ts are aware that their processors are being used as mining tools.

However, in the few weeks since technology for mining currency in browser windows has been released, researcher­s have seen a surge in abuse – both on websites and in Android apps.

Platforms such as Coinhive and JSEcoin can be installed legitimate­ly within web tools to, as JSEcoin puts it, “carry out the mathematic­al hashing process in the background while browsing a website, using excess CPU power which would be otherwise wasted”.

JavaScript on the website runs in the end user’s browser and goes through the process of mining the blocks. In return for running the code, websites receive 70% of the currency generated from users on their sites.

“Client-side mining on websites was not a thing until recently because JavaScript (Flash, or whatever) didn’t have good performanc­e for mining, and mining required downloadin­g gigabytes of the blockchain, which is not possible for site visits that may only last a few seconds,” Denis Sinegubko, founder of Unmask Parasites and senior malware researcher at security firm Sucuri, told PC Pro.

“That was until this autumn when JavaScript mining platforms emerged – they chose Monero coins, whose mining algorithm had comparable performanc­e even on client computers.” Hackers have been quick to exploit the new tools. Security firm Trend Micro recently spotted two apps in the Google Play Store, while security company Sucuri told

PC Pro it had seen at least a thousand cases of infected sites running WordPress plugins for Coinhive.

Pirates’ plunder

The first widely publicised use of client-side CPUs for clandestin­e mining came with the news that ageing filesharin­g site The Pirate Bay had been caught running the tools surreptiti­ously, after users spotted an increase in processor activity when visiting the site. The site had given

The impact on users of affected devices is clear in increased device wear and tear and reduced battery life

no notice, nor offered any opt-out for the mining script.

It’s more widespread on the murkier parts of the web, such as adult and file-sharing sites, where visitors are likely to dwell rather than briefly dip in to read a news story.

Security experts say a simple declaratio­n that they were using the tools would mean websites were acting responsibl­y and legitimise the technology, but many prefer to drop the mining code into browsers without warning. “Most sites will sneakily use this approach, embedding it into anything that can run JavaScript, said Bruno Škvorc, founder of cryptocurr­ency site Bitfalls.com, which recently, and openly, deployed the technology in a trial. “It’s easy to drop it on unsuspecti­ng and technicall­y illiterate users, because we’re so used to browsers eating our RAM and CPU all the time.”

Developers are also targeting apps delivered via Google Play, which embed the technology into web browsers within apps. “It all started about a month ago and currently there are dozens of Coinhive clones that use the same tactics – they set up a small hidden browser inside an app and use the very same Coinhive code to do the mining,” explained Andrey Meshkov, CTO of advert blocking company AdGuard.

“Its profits are very low but the number of apps that are looking to use this is alarming and Google Play doesn’t have any real process [for blocking this], so nothing stops them from embedding some kind of miner in there.”

Opportunit­y to earn

Although the abuse risks ruining this nascent technology before most people have even heard of it, industry watchers believe that CPU mining could actually work as a web currency. With advertisin­g revenue increasing­ly hard to come by due to the dominance of Google and the increased use of ad-blockers, mining could provide an alternativ­e revenue stream.

“It could be positive, not just as a replacemen­t for adverts,” said Meshkov. “There are a lot of paywalls and wouldn’t it be better not to pay for a subscripti­on, but to mine for an hour and then get access. But the whole model could be destroyed by all the guys that use it unlawfully. If you can opt out and provide a choice this is fine, but when they do it in a hidden way then it’s pure malware.”

However, even legitimate sites will struggle to make much money from mining and some have swiftly dropped

the technology because the return on investment simply wasn’t worth the hassle. “We tried going that route (with a full, up-front warning to people, and a permanent opt-out button right smack in the middle of the header), to spare our readers from having to see ads,” said Škvorc. “At a meagre 8,000 visits per day on average, the payout was under $4 per month. That, coupled with the fact that many people’s antivirus programs went crazy, and the fact that it’s a huge battery drain on laptops and mobile devices ( see boxout), convinced us that it was in no way worth it.”

Changing tactics

JavaScript mining tools are evolving fast in response to concerns over performanc­e and security software flagging the tools as malware – and the main players want to fully legitimise distribute­d mining. Coinhive, for example, has released an updated version of its platform that can’t be implemente­d without first gaining user permission, but the raw, no-consent-required version is still available on the site, albeit with a warning from the creators. “The miner itself does not come with a user interface – it’s your responsibi­lity to tell your users what’s going on and to provide stats on mined hashes,” the company says of the original miner in its FAQs. “While it’s possible to run the miner without informing your users, we strongly advise against it. You know this.” Sound advice, but advice that can be easily ignored. “This thing is very new [and] there are no regulation­s, so platforms, sites and hackers are still trying to find a viable model for them. Inevitably they all make mistakes and learn,” said Sinegubko. “As this thing matures there will be less room for abuse and it will be clearer what is acceptable use of this technology and what is not.”

 ??  ?? RIGHT If your phone has started running slowly, it might be mining for Monero coins
RIGHT If your phone has started running slowly, it might be mining for Monero coins
 ??  ?? RIGHT Securi’s Denis Sinegubko believes there will soon be less room for abuse in mining
RIGHT Securi’s Denis Sinegubko believes there will soon be less room for abuse in mining
 ??  ?? LEFT Andrey Meshkov, CTO of AdGuard, argues that mining could actually be positive – if done properly
LEFT Andrey Meshkov, CTO of AdGuard, argues that mining could actually be positive – if done properly

Newspapers in English

Newspapers from United Kingdom