Ethical Hacking News
Browser-Based Cryptojacking: A Growing Threat to Global Internet Security
More than 3,500 websites worldwide have been compromised by JavaScript cryptocurrency miners, marking the return of browser-based cryptojacking attacks. This malicious activity uses advanced techniques such as stealthy mining and WebSockets to evade detection and maximize its impact. As users unknowingly mine cryptocurrency while browsing compromised websites, their computers become covert crypto generation machines without their knowledge or consent. Stay informed about this growing threat and learn how to protect yourself against browser-based cryptojacking.
Cybersecurity threats have increased with new attacks emerging daily. Over 3,500 websites worldwide have been compromised by JavaScript cryptocurrency miners. A sophisticated stealthy miner is being used to assess device computational power and execute mining tasks in parallel. The attackers are using WebSockets to fetch mining tasks from an external server and dynamically adjust mining intensity based on device capabilities. Users may unknowingly contribute to malicious activities by inadvertently providing processing power for cryptojacking attacks. A range of techniques is being used to diversify payloads and revenue streams, including exploiting vulnerabilities in popular content management systems. Client-side and website-oriented attacks are becoming more common, resulting in the exfiltration of sensitive data. Attackers are prioritizing stealth over brute-force resource theft, using advanced techniques to evade detection. Users and organizations must take proactive measures to protect themselves against these types of attacks.
Cybersecurity threats have become an integral part of our digital lives, with new and innovative attacks emerging every day. Among these threats, browser-based cryptojacking has gained significant attention in recent years due to its stealthy nature and ability to compromise even the most secure websites. In a recent development, more than 3,500 websites worldwide have been compromised by JavaScript cryptocurrency miners, marking the return of browser-based cryptojacking attacks once popularized by the likes of CoinHive.
The attackers behind this malicious activity have developed a sophisticated stealthy miner that assesses the computational power of a device and spawns background Web Workers to execute mining tasks in parallel without raising any alarm. This approach allows the miners to remain undetected by both users and security tools, making them nearly impossible to detect.
Furthermore, the activity has been found to leverage WebSockets to fetch mining tasks from an external server, so as to dynamically adjust the mining intensity based on the device capabilities and accordingly throttle resource consumption to maintain stealth. This indicates that the attackers are using a combination of advanced techniques to evade detection and maximize their malicious activities.
The net result of this approach is that users would unknowingly mine cryptocurrency while browsing the compromised website, turning their computers into covert crypto generation machines without their knowledge or consent. This behavior poses significant security risks, as users may inadvertently contribute to the processing power required for these malicious activities.
According to research, over 3,500 websites have been ensnared in this sprawling illicit crypto mining effort, with some of these domains also linked to Magecart credit card skimmers in the past. The attackers are using a range of techniques to diversify their payloads and revenue streams, including exploiting vulnerabilities in popular content management systems.
In recent weeks, client-side and website-oriented attacks have been found to take different forms - from injecting fake payment forms during checkout to collecting financial information, including bank details, from victims. This has resulted in the exfiltration of sensitive data, which can be used for malicious purposes such as identity theft or financial exploitation.
The findings coincide with a growing trend of using advanced techniques to evade detection and maximize the impact of cyber attacks. Attackers are now prioritizing stealth over brute-force resource theft, using obfuscation, WebSockets, and infrastructure reuse to stay hidden. The goal isn't to drain devices instantly, but rather to persistently siphon resources over time, like a digital vampire.
As we navigate the increasingly complex landscape of cyber threats, it is essential that users and organizations take proactive measures to protect themselves against these types of attacks. This includes keeping software up-to-date, using robust security tools, and educating users about online safety best practices.
In conclusion, the stealthy rise of browser-based cryptojacking highlights the need for enhanced cybersecurity awareness and better threat detection methods. By staying informed and vigilant, we can minimize our exposure to these types of threats and protect our digital assets from malicious activities.
Related Information:
https://www.ethicalhackingnews.com/articles/The-Stealthy-Rise-of-Browser-Based-Cryptojacking-A-New-Wave-of-Cyber-Attacks-Threaten-Global-Internet-Security-ehn.shtml
https://thehackernews.com/2025/07/3500-websites-hijacked-to-secretly-mine.html
Published: Mon Jul 21 19:20:21 2025 by llama3.2 3B Q4_K_M