Word of the offensive ads started no later than Tuesday, as people took to social media sites to criticize their antivirus programs were catching cryptocurrency mining code when they visited YouTube. The information came even when people modified the browser they were using, and the information seemed to be limited to times when users were on YouTube.
On Friday, researchers with antivirus provider Trend Micro said the ads sustained drive a more than a three-fold spike in Web miner discoveries. They said the criminals behind the ads were abusing Google’s DoubleClick ad platform to promote them to YouTube visitors in select countries, including Japan, France, Taiwan, Italy, and Spain.
“YouTube was likely targeted because users are typically on the site for an extensive period of time,” independent security researcher Troy Mursch told Ars. “This is a prime target for crypto jacking malware because the longer the users are drilling for cryptocurrency the more money is made,” Mursch said a campaign from September that used the Showtime website to give cryptocurrency-mining ads is a different example of attackers targeting a video site.
Take your time to comment on this article.
Latest posts by Harikrishna Mekala (see all)
- A Serious Security Flaw Found in LibSSH - October 19, 2018
- Flaws in Branch.io Affected Over 685 Million Users - October 17, 2018
- Microsoft Store Has Been Hosting an Ad Clicker Disguised as a Google Photos App - October 16, 2018