A first look at browser-based cryptojacking
In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar codebases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency---typically without her consent or knowledge---and pays out the seigniorage to the website. Websites may consciously employ this as an alternative or to supplement advertisement revenue, may offer premium content in exchange for mining, or may be unwittingly serving the code as a result of a breach (in which case the seigniorage is collected by the attacker). The cryptocurrency Monero is preferred seemingly for its unfriendliness to large-scale ASIC mining that would drive browser-based efforts out of the market, as well as for its purported privacy features. In this paper, we survey this landscape, conduct some measurements to establish its prevalence and profitability, outline an ethical framework for considering whether it should be classified as an attack or business opportunity, and make suggestions for the detection, mitigation and/or prevention of browser-based mining for non-consenting users.
This paper is published in IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B) 2018 University College London (UCL), London, UK and has been discussed online by many sources, such as Cointelegraph, Bruce Schneier blog, Motherboard Vice and many more.
This work was partially funded by NSERC and FRQNT.
Media and resources:
- A first look at browser-based cryptojacking: https://arxiv.org/abs/1803.02887
- ‘Attack Or Business Opportunity?’: Academics Question Ethics Of Coinhive Cryptojacking: https://cointelegraph.com/news/attack-or-business-opportunity-academics-...
- A comprehensive report looks at the rise of in-browser cryptocurrency mining: https://motherboard.vice.com/amp/en_us/article/ywqy9w/coinhive-monero-mi...
- Schneier on Security: Hijacking Computers for Cryptocurrency Mining: https://www.schneier.com/blog/archives/2018/03/hijacking_compu.html