The Japanese police have brought charges against the defendants for the installation of a mining program without the consent of the users. The mining program in question is Coinhive. The case is ready to proceed to a full trial in the Yokohama District Court.
Coinhive is a JavaScript miner for the Monero block chain that can be integrated into a web page. When the page gets a visitor, the miner runs directly in the user's browser, extracting Monero.
Coinhive was created in 2017 and since then it has become one of the most widely distributed tools for mining in Monero using the power of CPU and electricity of website visitors, and has been used to "attack" other people's computers through YouTube or government and university websites.
So far, local authorities are investigating three suspects, including a web designer who has already been ordered by the Yokohama court to pay around US $ 900 for placing viruses on computers illegally.
Current law that prohibits the use of computer viruses / malware. The mining programs were installed on the victim's computers without their consent when they visited websites that contain, integrated in them, the Coinhive software. Forces the computer that navigates through this site to exploit Monero while the user navigates through the site.
The Coinhive software keeps 30% of all the Monero cryptocurrency extracted using the software. The coding of the software embedded in the web pages also contains a cryptographic key that links them to a user account, to which the other 70% of the Monero mine goes
This is not the first legal case where the malware has been intentionally sent to an unsuspecting browsing computer, but this is the first case in the trial in Japan, and it is called "the first criminal prosecution of crypto-search."
As a follower of @followforupvotes this post has been randomly selected and upvoted! Enjoy your upvote and have a great day!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit