A “separate web miner that connects to a private pool” was also involved in the scheme, according to TrendMicro’s report.
The “malvertisement” incorporated two different web miner scripts in addition to the actual advertisement, according to the report.
“The affected webpage will show the legitimate advertisement while the two web miners covertly perform their task. We speculate that the attackers’ use of these advertisements on legitimate websites is a ploy to target a larger number of users, in comparison to only that of compromised devices. The traffic involving the abovementioned cryptocurrency miners has since decreased after January 24”.
As much as 80 percent of an affected computer’s processing power can be taken over when exposed, reducing the machine’s performance, according to the report.
Clandestine cryptocurrency mining has been on the rise in recent months, as previously reported. Companies such as oil pipeline giant Transneft have seen their systems affected by the malware, and a report from November suggested that CoinHive has become one of the more common pieces of malware in circulation today.
Malware image via Shutterstock