Employees work on bitcoin mining computers at a factory in Florence, While this operation is legal, hackers are now putting malicious software on victim's devices that makes them mine for digital money. Alessandro Bianchi / Reuters
Employees work on bitcoin mining computers at a factory in Florence, While this operation is legal, hackers are now putting malicious software on victim's devices that makes them mine for digital moneShow more

How your TV or smart fridge might be mining bitcoin for criminals



Is the web browser on your phone slower than usual? It could be mining bitcoin for criminals.

As the popularity of virtual currencies has grown, hackers are focusing on a new type of heist: putting malicious software on peoples' handsets, TVs and smart fridges that makes them mine for digital money.

So-called "crypto-jacking" attacks have become a growing problem in the cybersecurity industry, affecting both consumers and organisations. Depending on the severity of the attack, victims may notice only a slight drop in processing power, often not enough for them to think it's a hacking attack. But that can add up to a lot of processing power over a period of months or if, say, a business's entire network of computers is affected.

"We saw organisations whose monthly electricity bill was increased by hundreds of thousands of dollars," says Maya Horowitz, Threat Intelligence Group Manager for Checkpoint, a cybersecurity company.

Hackers try to use victims' processing power because that is what's needed to create - or "mine" - virtual currencies. In virtual currency mining, computers are used to make the complex calculations that verify a running ledger of all the transactions in virtual currencies around the world.

Crypto-jacking is not done only by installing malicious software. It can also be done through a web browser. The victim visits a site, which latches onto the victim's computer processing power to mine digital currencies as long as they are on the site. When the victim switches, the mining ends. Some websites, including Salon.com, have tried to do it legitimately and been transparent about it. For three months this year, Salon.com removed ads from its sites in exchange for users allowing them to mine virtual currencies.

Industry experts first noted crypto-jacking as a threat in 2017, when virtual currency prices were skyrocketing to record highs.

The price of bitcoin, the most widely known virtual currency, jumped six-fold from September to almost $20,000 in December before falling back down to under $10,000.

The number of crypto-jacking cases soared from 146,704 worldwide in September to 22.4 million in December, according to anti-virus developer Avast. It has only continued to increase, to 93 million in May, it says.

_______

Read more:

Bitcoin's 2018 crash stokes fears of a Dot-Com like meltdown

ADGM launches framework to govern spot crypto assets

Crypto influencers are hyping up the market with $105,000 tweets

Avoid the cryptocurrency 'rat poison' and exit while you can

_______

The first big case emerged in September and centered on Coinhive, a legitimate business that let website owners make money by allowing customers to mine virtual currency instead of relying on advertising revenue. Hackers quickly began to use the service to infect vulnerable sites with miners, most notably YouTube and nearly 50,000 Wordpress websites, according to research conducted by Troy Mursch, a researcher on crypto-jacking.

Mr Mursch says Monero is the most popular virtual currency among cyber-criminals. A report by cybersecurity company Palo Alto Networks estimates that over 5 per cent of Monero was mined through crypto-jacking. That is worth almost $150 million dollars and doesn't count mining that occurs through browsers.

In the majority of attacks, hackers infect as many devices as possible, a method experts calls "spray and pray."

"Basically, everyone with a (computer processing unit) can be targeted by crypto-jacking," says Ismail Belkacim, a developer of an application that prevents websites from mining virtual currencies.

As a result, some hackers target organisations with large computing power. In what they believe might be the biggest crypto-jacking attack so far, Checkpoint discovered in February that a hacker had been exploiting a vulnerability in a server that over several months generated over $3m in Monero.

Crypto-jackers have also recently targeted organisations that use cloud-based services, in which a network of servers is used to process and store data, providing more computing power to companies who haven't invested in extra hardware.

Abusing this service, crypto-jackers use as much power as the cloud will allow them to, maximising their gains. For businesses, this results in slower performance and higher energy bills.

Martin Hron, a security researcher at Avast, says that besides the rise in interest in virtual currencies, there are two main reasons for the rise in attacks.

First, crypto-jacking scripts require little skill to implement. Ready-made computer code that automates crypto-mining is easy to find with a Google search, along with tips on the vulnerabilities of devices.

Second, crypto-jacking is harder to detect and is more anonymous than other hacks. Unlike ransomware, in which victims have to transfer money to regain access to their computers blocked by hackers, a victim of crypto-jacking might never know their computer is being used to mine currency. And as currency generated by crypto-jacking goes straight into a hacker's encrypted wallet, the cyber-criminal leaves less of a trail.

Both Apple and Google have started to ban applications that mine virtual currencies on their devices. But Mr Hron, the Avast researcher, warns that the risk is growing as more everyday devices are connected to the internet - from ovens to home lighting systems - and that these are often the least secure. Mr Hron says that cheaply made Chinese devices were particularly easy to hack.

Some experts say new techniques like artificial intelligence can help get a faster response to suspicious software.

That's what Texthelp, an education technology company, used when it was infected with a crypto-jacker, says Martin McKay, the company's chief technology officer. "The risk was mitigated for all customers within a period of four hours."

But security researcher Mr Mursch says that these precautions won't be enough.

"They might reduce the impact," he says, "But I don't think we're going to stop it."

THE LIGHT

Director: Tom Tykwer

Starring: Tala Al Deen, Nicolette Krebitz, Lars Eidinger

Rating: 3/5

COMPANY%20PROFILE
%3Cp%3E%3Cstrong%3ECompany%20name%3A%3C%2Fstrong%3E%20Revibe%20%0D%3Cbr%3E%3Cstrong%3EStarted%3A%3C%2Fstrong%3E%202022%0D%3Cbr%3E%3Cstrong%3EFounders%3A%3C%2Fstrong%3E%20Hamza%20Iraqui%20and%20Abdessamad%20Ben%20Zakour%20%0D%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20UAE%20%0D%3Cbr%3E%3Cstrong%3EIndustry%3A%3C%2Fstrong%3E%20Refurbished%20electronics%20%0D%3Cbr%3E%3Cstrong%3EFunds%20raised%20so%20far%3A%3C%2Fstrong%3E%20%2410m%20%0D%3Cbr%3E%3Cstrong%3EInvestors%3A%20%3C%2Fstrong%3EFlat6Labs%2C%20Resonance%20and%20various%20others%0D%3C%2Fp%3E%0A
The Brutalist

Director: Brady Corbet

Stars: Adrien Brody, Felicity Jones, Guy Pearce, Joe Alwyn

Rating: 3.5/5

Our legal consultant

Name: Dr Hassan Mohsen Elhais

Position: legal consultant with Al Rowaad Advocates and Legal Consultants.

How to avoid crypto fraud
  • Use unique usernames and passwords while enabling multi-factor authentication.
  • Use an offline private key, a physical device that requires manual activation, whenever you access your wallet.
  • Avoid suspicious social media ads promoting fraudulent schemes.
  • Only invest in crypto projects that you fully understand.
  • Critically assess whether a project’s promises or returns seem too good to be true.
  • Only use reputable platforms that have a track record of strong regulatory compliance.
  • Store funds in hardware wallets as opposed to online exchanges.
Business Insights
  • Canada and Mexico are significant energy suppliers to the US, providing the majority of oil and natural gas imports
  • The introduction of tariffs could hinder the US's clean energy initiatives by raising input costs for materials like nickel
  • US domestic suppliers might benefit from higher prices, but overall oil consumption is expected to decrease due to elevated costs
Indika
%3Cp%3E%3Cstrong%3EDeveloper%3A%3C%2Fstrong%3E%2011%20Bit%20Studios%3Cbr%3E%3Cstrong%3EPublisher%3A%3C%2Fstrong%3E%20Odd%20Meter%3Cbr%3E%3Cstrong%3EConsole%3A%3C%2Fstrong%3E%20PlayStation%205%2C%20PC%20and%20Xbox%20series%20X%2FS%3Cbr%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%204%2F5%3C%2Fp%3E%0A
The specs: 2018 Nissan Patrol Nismo

Price: base / as tested: Dh382,000

Engine: 5.6-litre V8

Gearbox: Seven-speed automatic

Power: 428hp @ 5,800rpm

Torque: 560Nm @ 3,600rpm

Fuel economy, combined: 12.7L / 100km

The past Palme d'Or winners

2018 Shoplifters, Hirokazu Kore-eda

2017 The Square, Ruben Ostlund

2016 I, Daniel Blake, Ken Loach

2015 DheepanJacques Audiard

2014 Winter Sleep (Kış Uykusu), Nuri Bilge Ceylan

2013 Blue is the Warmest Colour (La Vie d'Adèle: Chapitres 1 et 2), Abdellatif Kechiche, Adele Exarchopoulos and Lea Seydoux

2012 Amour, Michael Haneke

2011 The Tree of LifeTerrence Malick

2010 Uncle Boonmee Who Can Recall His Past Lives (Lung Bunmi Raluek Chat), Apichatpong Weerasethakul

2009 The White Ribbon (Eine deutsche Kindergeschichte), Michael Haneke

2008 The Class (Entre les murs), Laurent Cantet

UAE'S%20YOUNG%20GUNS
%3Cp%3E1%20Esha%20Oza%2C%20age%2026%2C%2079%20matches%0D%3Cbr%3E%0D%3Cbr%3E2%20Theertha%20Satish%2C%20age%2020%2C%2066%20matches%0D%3Cbr%3E%0D%3Cbr%3E3%20Khushi%20Sharma%2C%20age%2021%2C%2065%20matches%0D%3Cbr%3E%0D%3Cbr%3E4%20Kavisha%20Kumari%2C%20age%2021%2C%2079%20matches%0D%3Cbr%3E%0D%3Cbr%3E5%20Heena%20Hotchandani%2C%20age%2023%2C%2016%20matches%0D%3Cbr%3E%0D%3Cbr%3E6%20Rinitha%20Rajith%2C%20age%2018%2C%2034%20matches%0D%3Cbr%3E%0D%3Cbr%3E7%20Samaira%20Dharnidharka%2C%20age%2017%2C%2053%20matches%0D%3Cbr%3E%0D%3Cbr%3E8%20Vaishnave%20Mahesh%2C%20age%2017%2C%2068%20matches%0D%3Cbr%3E%0D%3Cbr%3E9%20Lavanya%20Keny%2C%20age%2017%2C%2033%20matches%0D%3Cbr%3E%0D%3Cbr%3E10%20Siya%20Gokhale%2C%20age%2018%2C%2033%20matches%0D%3Cbr%3E%0D%3Cbr%3E11%20Indhuja%20Nandakumar%2C%20age%2018%2C%2046%20matches%3C%2Fp%3E%0A
MATCH DETAILS

Manchester United 3

Greenwood (21), Martial (33), Rashford (49)

Partizan Belgrade 0