Ad campaign lets attackers profit while
unwitting users watch videos
YouTube was recently caught displaying ads that covertly leach off visitors’ CPUs and electricity to generate digital currency on behalf of anonymous attackers, it was widely reported.
Word of the abusive ads started no later than Tuesday, as people took to social media sites to complain their antivirus programs were detecting cryptocurrency mining code when they visited YouTube. The warnings came even when people changed the browser they were using, and the warnings seemed to be limited to times when users were on YouTube.
Great now my browser everytime I watch youtube… my anti virus always blocking coinhive because malware . Idk much about it but this is getting annoying and I need a solution please T n T
— Arung (@ArungLaksmana) January 23, 2018
Hey @avast_antivirus seems that you are blocking crypto miners (#coinhive) in @YouTube #ads
Thank you :)https://t.co/p2JjwnQyxz
— Diego Betto (@diegobetto) January 25, 2018
— ᛗ?ᛟErvoᛟ?ᛗ (@Mystic_Ervo) January 24, 2018
On Friday, researchers with antivirus provider Trend Micro said the ads helped drive a more than three-fold spike in Web miner detections. They said the attackers behind the ads were abusing Google’s DoubleClick ad platform to display them to YouTube visitors in select countries, including Japan, France, Taiwan, Italy, and Spain.
“YouTube was likely targeted because users are typically on the site for an extended period of time,” independent security researcher Troy Mursch told Ars. “This is a prime target for cryptojacking malware, because the longer the users are mining for cryptocurrency the more money is made.” Mursch said a campaign from September that used the Showtime website to deliver cryptocurrency-mining ads is another example of attackers targeting a video site.
The above ad was posted on Tuesday. Like the ads analyzed by Trend Micro and posted on social media, it mined Monero coins on behalf of someone with the Coinhive site key of “h7axC8ytzLJhIxxvIHMeC0Iw0SPoDwCK.” It’s not possible to know how many coins the user has generated so far. Trend Micro said the campaign started January 18. In an e-mail sent as this post was going live, a Google representative wrote:
Mining cryptocurrency through ads is a relatively new form of abuse that violates our policies and one that we’ve been monitoring actively. We enforce our policies through a multi-layered detection system across our platforms which we update as new threats emerge. In this case, the ads were blocked in less than two hours and the malicious actors were quickly removed from our platforms.
As the problem of Web-based cryptomining has surged to almost epidemic proportions, a variety of AV programs have started warning of cryptocurrency-mining scripts hosted on websites and giving users the option of blocking the activity. While drive-by cryptocurrency mining is an abuse that drains visitors’ electricity and computing resources, there’s no indication that it installs ransomware or other types of malware, as long as people don’t click on malicious downloads.