ÚN.- Cryptomedes attract the attention of numerous investors around the world, but also cyber criminals who developed a computer virus to steal these digital means of exchange, experts warned.
According to the Sophos group, which specializes in protecting networks and endpoints, irregularities tend to grow after the boom experienced by bitcoin and other digital currencies.
Among the threats is a Trojan (CoinHive); that is to say, a software that by means of the resolution of complex mathematical operations, generates cryptocurrencies, which go to the "account" of the mafioso, reviewed the digital site finanzas.com.
This crypto mining, added the publication, takes advantage of the JavaScript technology (interpreted programming language) to extract cryptocurrencies hiding in virtually any web page that includes it.
To discover cryptocurrencies, it is necessary to have several computers in operation, therefore, cybercriminals created the CoinHive, which is able to stealthily access the computer when users open a web page.
According to Sophos, crypto miners using JavaScript technology run without asking users for permission when they access a web page; therefore, SophosLabs began to label them as malware (malignant programs) and, consequently, to block them.
By the source, the hidden presence of CoinHive in various places increased in recent weeks as the total value of the cryptocurrency registered unbridled growth.
CoinHive also works on mobile devices and for short periods; the user may notice that the temperature of the device rises dramatically, considerably reducing the battery charge, the report added.
This malicious program, warned the study, tries to pass itself off as a legitimate offer for websites to use as an alternative source of ad revenue.
leave your comments thanks
follow and upvote ,thanks :)
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Spamming comments is frowned upon by the community.
Comment spam is currently defined by @steemcleaners as:
10 or more generic comments per day that are not in response to a question posed by the post or comment. “Thanks”, “Great Post!”, “Great Photo!”, “Good”, “Like”, “Nice”, “Wow”, “Cute”, “Follow me”, etc.
Commenting on old posts to hide self up-votes or a voting trail.
Copy/Paste comments that serve no purpose or the purpose is self promotion (including copying and pasting similar comments in rotating way).
Comments that inform the contributor that they have been up upvoted, resteemed, or flagged when the curator does not actually upvote, resteem, or flag the post.
Unsolicited and off topic referral links.
Continued comment spamming may result in action from the cheetah bot.
More Info: Abuse Guide - 2017.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit