YouTube ads have covertly been running cryptocurrency mining codes which drain CPUs: Report

Since cryptocurrency mining requires a long time and consumes a lot of resources, mining covertly through another person's system is quite likely.

Recently, cryptocurrency mining activity was caught taking place surreptitiously via YouTube Ads. This took place through public mining codes available from a digital currency company called Coinhive.

Representational image. Reuters.

Representational image. Reuters.

According to a report by the ArsTechnica, these cryptocurrency miners were caught mining for Monero, a digital currency, through YouTube ads. They used the Google's DoubleClick ad network, to run this malicious activity. According to researchers with antivirus provider Trend Micro, the malicious activity is active in Japan, France, Taiwan and Italy.

For mining, a miner requires an internet connection and electricity to power computer hardware. Since mining requires a long time and consumes a lot of resources, mining covertly through another person's system is quite likely.

Therefore, when an attacker runs a JavaScript code, it drains away the power of the CPU of the person on whose system the attack happens. According to the report, YouTube has been opted for such an activity, since a person would spend longer time on the video platform.

The attack has been tracked by some antivirus programs which have notified its users.

The attackers were using these codes, which are available in two forms. One is public, the other is private. The public one comes from place like the Coinhive are mostly used for mining, other attackers also use private ones. Meanwhile, mining consumes 80 percent of the person's CPU.

These malicious ads reportedly, also comes in the form of fake virus attack warnings. Here, if the person clicks on these ads, it activates the javascript.

Google has reportedly blocked such malicious ads.

Loading...



Top Stories


also see

science