Recently, cryptocurrency mining activity was caught taking place surreptitiously via YouTube Ads. This took place through public mining codes available from a digital currency company called Coinhive.
According to a report by the ArsTechnica, these cryptocurrency miners were caught mining for Monero, a digital currency, through YouTube ads. They used the Google's DoubleClick ad network, to run this malicious activity. According to researchers with antivirus provider Trend Micro, the malicious activity is active in Japan, France, Taiwan and Italy.
For mining, a miner requires an internet connection and electricity to power computer hardware. Since mining requires a long time and consumes a lot of resources, mining covertly through another person's system is quite likely.
The attack has been tracked by some antivirus programs which have notified its users.
The attackers were using these codes, which are available in two forms. One is public, the other is private. The public one comes from place like the Coinhive are mostly used for mining, other attackers also use private ones. Meanwhile, mining consumes 80 percent of the person's CPU.
Google has reportedly blocked such malicious ads.