According to the survey, half of the encrypted mining scripts are deployed on pornographic websites,
In recent years, security experts have found that more and more mining scripts are added to the network, especially those that are illegally deployed through online Hacking servers. They use computers that recruit users to perform high-load mining calculations without the user's knowledge, compromising the user's computer life.
According to an expert survey some time ago, about 49% of encrypted mining scripts were deployed on erotic websites. This research was developed by security experts on the DNSMon system by using online DNS traffic analysis to encrypt mining scripts. The experts used this to determine the websites or domain names from which the mining script was loaded. According to the research results, about 49% of the encrypted mining scripts were deployed on the related erotic websites.
The researchers said this was not surprising because pornographic websites are websites that visitors spend a lot of time watching content. This phenomenon also gives attackers a lot of space to use. In addition, these encrypted mining scripts also exist in some fraudulent websites, advertising and mining businesses. The results also show that the most common mining scripts for hackers are Coinhive and JSEcoin.
Therefore, if you need to access pornographic websites, remember to check whether the mining script is used. In addition to pornographic websites, which are the "high-risk area" of encrypted mining scripts, users should also pay attention to the following areas:
1. Short Domain Name Service Provider: for example, goobo.com.br is a short Domain Name Service Provider. when accessing the website's home page, including other short domain names, Coinhive links will be loaded for mining;
2. Advertisers: some website mining activities are introduced by external links distributed by advertisers;
3. Contaminated Supply Chain: for example, www.midijs.net is a JS-based MIDI file player. Its website source code uses the Coinhive link for mining;
4. Shell links of some websites: some websites use Shell links to hide the mining site links in the source code, and secretly use the computing power of user devices.