Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


YouTube Ads Serving Up Crypto-Currency Mining Malicious Code


An ad campaign of malicious nature is circulating online, and it seemingly has got onto YouTube as well. The involved malware installs certain code which mines crypto-currency by using the target computer's central processing unit (CPU); enhancing power usage whilst yielding revenue to the attacker. It was in the week of January 15 when the problem first emerged following users of social media complaining about advertisements on YouTube kicking start their anti-virus programs, reports Ars Technica. The said advertisements were discovered as having the CoinHive mining code which surreptitiously consumed 80% at most of the site viewers' CPUs for generating virtual cash to unknown hackers.


Security experts belonging to Trend Micro a security company discovered that the malicious ad scheme utilizing the ad network DoubleClick of Google for distribution of crypto-currency miners targeted computers of Internauts within Italy, Spain, France, Japan, along with more nations.


Trend Micro observed the attack, January 24, following which it informed Google of the issue. Ever since, the traffic generated from the attack is down, so stated the security firm within one January 26 advisory.


There's JavaScript inside the ads to mine Monero -name of a digital coin. From ten cases, nine have the ads utilize, for a long time, freely obtainable JavaScript that the crypto-currency mining facility CoinHive provided; the facility bears certain controversy of letting subscribers earn income by covertly utilizing other people's PCs. Rest of the period, there's utilization of private digging JavaScript by the YouTube advertisements which lets the attackers avoid the 30% retention by CoinHive. Indeed, the two scripts use up as much as 80% of the CPU belonging to the victimized visitor. Arstechnica.com posted this, January 27, 2018.


Google, the owner of YouTube, in response to users' grievances declared that it had resolved the situation within merely hours. The company sent out an e-mail stating the ads had been stopped within not even 2-hrs while the malevolent actors had been fast eliminated from its platforms.


A means for avoiding the kind of incursions is disabling JavaScript inside users' browsers. Besides, browsers require being upgraded with the latest patches that too blocks rogue code.

» SPAMfighter News - 2/5/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page