Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


YouTube Visitors’ Computers Bogged Down via Crypto-Jacking


Crypto-jackers have been compromising YouTube advertisements so people accessing those advertisements were so affected that the malicious actors seized and exploited their PCs' processing power for mining digital coins.


According to a Google spokesperson, digging for crypto-currency via advertisements has started not since long, an abuse which goes against the company's policies as also something which Google has been monitoring aggressively. Ars Technica an Internet-based technology publication reported the issue following people's reports on social media about their AV software identifying crypto-currency mining malicious software on YouTube.


By capturing and using ordinary PCs' computing power that are Internet-connected, crypto-jackers churn digital assets. As crypto-jacking is related to hefty rewards, the malicious activity is getting more-and-more common. And given the recent incident of millions of people who accessed YouTube and got affected, it's anticipated that crypto-jacking may turn into an enormously big threat to cyber security during forthcoming days. Journaltranscript.com posted this, January 31, 2018.


Sadly, the majority of victims don't realize when it happens because the crooks carry it out clandestinely devoid of any opportunity to potential victims for opting out. Also, despite no download needed, hackers worked out a strategy wherein crypto-jacking can go on, no matter if end-users disable the mining tab. Besides, being a more or less novel concept, hackers have the scope to innovate, altering their techniques so they may go on with their deceitful operation.


The process is as well problematic when the victim's server else his work PC too are so much exploited that they fail to do even the basic tasks that could eventually harm the actual business. Now though that 80 percent load mayn't get noticed inside an end-user's PC, the victim possibility isn't purchasing anymore computing power other than what he requires for his business purpose, thus it is far greater than a problem. Consequently, like at peak time when an end-user's Internet-connected PC usually operates near flat out, the same state may occur anytime suddenly.


Now, quite like CoinHive, there are other crypto-currency mining malware equally disturbing. For remaining safe therefore, cyber-security specialists suggest using 3rd-party AV programs besides loading one Ad Blocker.

» SPAMfighter News - 2/8/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page