Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3243734.3243858acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense

Published: 15 October 2018 Publication History

Abstract

A wave of alternative coins that can be effectively mined without specialized hardware, and a surge in cryptocurrencies' market value has led to the development of cryptocurrency mining ( cryptomining ) services, such as Coinhive, which can be easily integrated into websites to monetize the computational power of their visitors. While legitimate website operators are exploring these services as an alternative to advertisements, they have also drawn the attention of cybercriminals: drive-by mining (also known as cryptojacking ) is a new web-based attack, in which an infected website secretly executes JavaScript code and/or a WebAssembly module in the user's browser to mine cryptocurrencies without her consent. In this paper, we perform a comprehensive analysis on Alexa's Top 1 Million websites to shed light on the prevalence and profitability of this attack. We study the websites affected by drive-by mining to understand the techniques being used to evade detection, and the latest web technologies being exploited to efficiently mine cryptocurrency. As a result of our study, which covers 28 Coinhive-like services that are widely being used by drive-by mining websites, we identified 20 active cryptomining campaigns. Motivated by our findings, we investigate possible countermeasures against this type of attack. We discuss how current blacklisting approaches and heuristics based on CPU usage are insufficient, and present MineSweeper, a novel detection technique that is based on the intrinsic characteristics of cryptomining code, and, thus, is resilient to obfuscation. Our approach could be integrated into browsers to warn users about silent cryptomining when visiting websites that do not ask for their consent.

Supplementary Material

MP4 File (p1714-konoth.mp4)

References

[1]
Nadav Avital, Matan Lion, and Ron Masas. Crypto Me0wing Attacks: Kitty Cashes in on Monero. https://www.incapsula.com/blog/crypto-me0wing-attacks-kitty-cashes-in-on-monero.html (May 2018).
[2]
Kevin Borgolte, Christopher Kruegel, and Giovanni Vigna. Delta: Automatic Identification of Unknown Web-based Infection Campaigns. In Proc. of the ACM Conference on Computer and Communications Security (CCS) (2013).
[3]
Kevin Borgolte, Christopher Kruegel, and Giovanni Vigna. Meerkat: Detecting Website Defacements through Image-based Object Recognition. In Proc. of the USENIX Security Symposium (2015).
[4]
Davide Canali and Davide Balzarotti. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web. In Proc. of the Network and Distributed System Security Symposium (NDSS) (2013).
[5]
Juan Miguel Carrascosa, Jakub Mikians, Ruben Cuevas, Vijay Erramilli, and Nikolaos Laoutaris. I Always Feel Like Somebody's Watching Me: Measuring Online Behavioural Advertising. In Proc. of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) (2015).
[6]
Catalin Cimpanu. Cryptojackers Found on Starbucks WiFi Network, GitHub, Pirate Streaming Sites. https://www.bleepingcomputer.com/news/security/cryptojackers-found-on-starbucks-wifi-network-github-pirate-streaming-sites/ (December 2017).
[7]
Catalin Cimpanu. Firefox Working on Protection Against In-Browser Cryptojacking Scripts. https://www.bleepingcomputer.com/news/software/firefox-working-on-protection-against-in-browser-cryptojacking-scripts/ (March 2018).
[8]
Catalin Cimpanu. Tweak to Chrome Performance Will Indirectly Stifle Cryptojacking Scripts. https://www.bleepingcomputer.com/news/security/tweak-to-chrome-performance-will-indirectly-stifle-cryptojacking-scripts/ (February 2018).
[9]
Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, and Tobias Fiebig. Investigating Operators' Perspective on Security Misconfigurations. In Proc. of the ACM Conference on Computer and Communications Security (CCS) (2018).
[10]
Abeer ElBahrawy, Laura Alessandretti, Anne Kandler, Romualdo Pastor-Satorras, and Andrea Baronchelli. Bitcoin ecology: Quantifying and modelling the long-term dynamics of the cryptocurrency market. arXiv:1705.05334v3 {physics.soc-ph} (November 2017).
[11]
Shayan Eskandari, Andreas Leoutsarakos, Troy Mursch, and Jeremy Clark. A First Look at Browser-based Cryptojacking. In Proc. of the IEEE Privacy and Security on the Blockchain Workshop (IEEE S&B) (2018).
[12]
Amir Feder, Neil Gandal, JT Hamrick, Tyler Moore, and Marie Vasek. The Rise and Fall of Cryptocurrencies. In Proc. of the Workshop on the Economics of Information Security (WEIS) (2018).
[13]
Dan Goodin. Websites use your CPU to mine cryptocurrency even when you close your browser. https://arstechnica.com/information-technology/2017/11/sneakier-more-persistent-drive-by-cryptomining-comes-to-a-browser-near-you/ (November 2017).
[14]
Dan Goodin. Now even YouTube serves ads with CPU-draining cryptocurrency miners. https://arstechnica.com/information-technology/2018/01/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners/ (January 2018).
[15]
Google. Chromium Issue 766068: Please consider intervention for high cpu usage js. https://bugs.chromium.org/p/chromium/issues/detail?id=766068 (September 2017).
[16]
Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker. Manufacturing Compromise: The Emergence of Exploit-as-a-service. In Proc. of the ACM Conference on Computer and Communications Security (CCS) (2012).
[17]
Felix Gröbert, Carsten Willems, and Thorsten Holz. Automated Identification of Cryptographic Primitives in Binary Programs. In Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID) (2011).
[18]
Andreas Haas, Andreas Rossberg, Derek L. Schuff, Ben L. Titzer, Michael Holman, Dan Gohman, Luke Wagner, Alon Zakai, and JF Bastien. Bringing the Web Up to Speed with WebAssembly. In Proc. of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) (2017).
[19]
John J. Hoffman, Steve C. Lee, and Jeffrey S. Jacobson. New Jersey Division of Consumer Affairs Obtains Settlement with Developer of Bitcoin-Mining Software Found to Have Accessed New Jersey Computers Without Users' Knowledge or Consent. https://nj.gov/oag/newsreleases15/pr20150526b.html (May 2015).
[20]
Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon Mccoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, and Kirill Levchenko. Botcoin: Monetizing Stolen Cycles. In Proc. of the Network and Distributed System Security Symposium (NDSS) (2014).
[21]
Simon Kenin. Mass MikroTik Router Infection -- First we cryptojack Brazil, then we take the World? https://www.trustwave.com/Resources/SpiderLabs-Blog/Mass-MikroTik-Router-Infection-First-we-cryptojack-Brazil,-then-we-take-the-World-/ (August 2018).
[22]
Brian Krebs. Who and What Is CoinHive? https://krebsonsecurity.com/2018/03/who-and-what-is-coinhive/ (March 2018).
[23]
McAfee Labs. McAfee Labs Threats Report. https://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1--2014.pdf (June 2014).
[24]
Pierre Lestringant, Frédéric Guihéry, and Pierre-Alain Fouque. Aligot: Cryptographic Function Identification in Obfuscated Binary Programs. In Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS) (2015).
[25]
Shannon Liao. Showtime websites secretly mined user CPU for cryptocurrency. https://www.theverge.com/2017/9/26/16367620/showtime-cpu-cryptocurrency-monero-coinhive/ (September 2017).
[26]
Shannon Liao. UNICEF wants you to mine cryptocurrency for charity. https://www.theverge.com/2018/4/30/17303624/unicef-mining-cryptocurrency-charity-monero/ (April 2018).
[27]
Chaoying Liu and Joseph C. Chen. Cryptocurrency Web Miner Script Injected into AOL Advertising Platform. https://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-web-miner-script-injected-into-aol-advertising-platform/ (April 2018).
[28]
Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, and Vincenzo Ciancaglini. Investigating Web Defacement Campaigns at Large. In Proc. of the ACM Asia Conference on Computer and Communications Security (ASIACCS) (2018).
[29]
Aleecia M. McDonald and Lorrie Faith Cranor. Americans' Attitudes About Internet Behavioral Advertising Practices. In Proc. of the ACM Workshop on Privacy in the Electronic Society (WPES) (2010).
[30]
Andrey Meshkov. Crypto-Streaming Strikes Back. https://blog.adguard.com/en/crypto-streaming-strikes-back/ (December 2017).
[31]
Troy Mursch. Cryptojacking malware Coinhive found on 30,000
[32]
websites. https://badpackets.net/cryptojacking-malware-coinhive-found-on-30000-websites/ (November 2017).
[33]
Troy Mursch. How to find cryptojacking malware. https://badpackets.net/how-to-find-cryptojacking-malware/ (February 2018).
[34]
Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. https://www.bitcoin.org/bitcoin.pdf (2009).
[35]
Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, and Giovanni Vigna. You Are What You Include: Large-scale Evaluation of Remote Javascript Inclusions. In Proc. of the ACM Conference on Computer and Communications Security (CCS) (2012).
[36]
Lindsey O'Donnell. Cryptojacking Attack Found on Los Angeles Times Website. https://threatpost.com/cryptojacking-attack-found-on-los-angeles-times-website/130041/ (February 2018).
[37]
Lindsey O'Donnell. Cryptojacking Campaign Exploits Drupal Bug, Over 400 Websites Attacked. https://threatpost.com/cryptojacking-campaign-exploits-drupal-bug-over-400-websites-attacked/131733/ (May 2018).
[38]
Panagiotis Papadopoulos, Panagiotis Ilia, and Evangelos P. Markatos. Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model. arXiv:1806.01994v1 {cs.CR} (June 2018).
[39]
Panagiotis Papadopoulos, Nicolas Kourtellis, and Evangelos P. Markatos. The Cost of Digital Advertisement: Comparing User and Advertiser Views. In Proc. of the World Wide Web Conference (WWW) (2018).
[40]
Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, and Matthias W"ahlisch. Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics. In Proc. of the USENIX Workshop on Offensive Technologies (WOOT) (2015).
[41]
Pirate Bay. Miner. https://thepiratebay.org/blog/242 (September 2017).
[42]
Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, and Fabian Monrose. All Your iFRAMEs Point to Us. In Proc. of the USENIX Security Symposium (2008).
[43]
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, and Nagendra Modadugu. The Ghost in the Browser Analysis of Web-based Malware. In Proc. of the Workshop on Hot Topics in Understanding Botnets (HotBots) (2007).
[44]
Jan Rüth, Torsten Zimmermann, Konrad Wolsing, and Oliver Hohlfeld. Digging into Browser-based Crypto Mining. In Proc. of the ACM Internet Measurement Conference (IMC) (2018). (Preprint: https://arxiv.org/abs/1808.00811v1).
[45]
Salon. FAQ: What happens when I choose to “Suppress Ads” on Salon? https://www.salon.com/about/faq-what-happens-when-i-choose-to-suppress-ads-on-salon (2018).
[46]
Jérôme Segura. Malicious cryptomining and the blacklist conundrum. https://blog.malwarebytes.com/threat-analysis/2018/03/malicious-cryptomining-and-the-blacklist-conundrum/ (March 2018).
[47]
Jérôme Segura. The state of malicious cryptomining. https://blog.malwarebytes.com/cybercrime/2018/02/state-malicious-cryptomining/ (March 2018).
[48]
Seigen, Max Jameson, Tuomo Nieminen, Neocortex, and Antonio M. Juarez. CryptoNight Hash Function. https://cryptonote.org/cns/cns008.txt (March 2013).
[49]
Denis Sinegubko. Hacked Websites Mine Cryptocurrencies. https://blog.sucuri.net/2017/09/hacked-websites-mine-crypocurrencies.html (September 2017).
[50]
Slushpool. Stratum Mining Protocol. https://slushpool.com/help/manual/stratum-protocol (2016).
[51]
Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl Gunter, Fareed Zaffar, Matthew Caesar, and Nikita Borisov. Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises. In Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID) (2017).
[52]
Iain Thomson. Pulitzer-winning website Politifact hacked to mine crypto-coins in browsers. https://www.theregister.co.uk/2017/10/13/politifact_mining_cryptocurrency/ (October 2017).
[53]
Mircea Trofin. Chromium Code Reviews Issue 2656103003: {wasm} flag for asm-wasm investigations. https://codereview.chromium.org/2656103003/ (January 2017).
[54]
Alejandro Viquez. Opera introduces bitcoin mining protection in all mobile browsers -- here's how we did it. https://blogs.opera.com/mobile/2018/01/opera-introduces-bitcoin-mining-protection-mobile-browsers/ (January 2018).
[55]
Luke Wagner. Turbocharging the Web. IEEE Spectrum (December 2017). (Online version: https://spectrum.ieee.org/computing/software/webassembly-will-finally-let-you-run-highperformance-applications-in-your-browser/).
[56]
Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, and Shuang Hao. SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks. In Proc. of the European Symposium on Research in Computer Security (ESORICS) (2018).
[57]
Web Hypertext Application Technology Working Group. HTML Living Standard: Web workers. https://html.spec.whatwg.org/multipage/workers.html (2018).
[58]
Chris Williams. UK ICO, USCourts.gov... Thousands of websites hijacked by hidden crypto-mining code after popular plugin pwned. http://www.theregister.co.uk/2018/02/11/browsealoud_compromised_coinhive/ (February 2018).
[59]
Dongpeng Xu, Jiang Ming, and Dinghao Wu. Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. In Proc. of the IEEE Symposium on Security and Privacy (S&P) (2017).
[60]
Yandex. Yandex Browser Strengthens Cryptocurrency Mining Protection. https://yandex.com/company/blog/yandex-browser-strengthens-cryptocurrency-mining-protection/ (March 2018).
[61]
Zhang Zaifeng. Who is Stealing My Power III: An Adnetwork Company Case Study. https://blog.netlab.360.com/who-is-stealing-my-power-iii-an-adnetwork-company-case-study-en/ (February 2018).
[62]
Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. In Proc. of the ACM Internet Measurement Conference (IMC) (2014).
[63]
Tianwei Zhang, Yinqian Zhang, and Ruby B. Lee. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. In Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID) (2016).
[64]
Zeljka Zorz. How a URL shortener allows malicious actors to hijack visitors' CPU power. https://www.helpnetsecurity.com/2018/05/23/url-shortener-cryptojacking/ (May 2018).

Cited By

View all
  • (2024)SoK: Analysis Techniques for WebAssemblyFuture Internet10.3390/fi1603008416:3(84)Online publication date: 29-Feb-2024
  • (2024)ESFuzzer: An Efficient Way to Fuzz WebAssembly InterpreterElectronics10.3390/electronics1308149813:8(1498)Online publication date: 15-Apr-2024
  • (2024)CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection methodIntelligent Decision Technologies10.3233/IDT-240319(1-19)Online publication date: 25-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
October 2018
2359 pages
ISBN:9781450356930
DOI:10.1145/3243734
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptocurrency
  2. cryptojacking
  3. drive-by attacks
  4. malware
  5. mining

Qualifiers

  • Research-article

Funding Sources

  • NSF
  • European Union Horizon 2020
  • DARPA
  • MALPAY
  • ONR

Conference

CCS '18
Sponsor:

Acceptance Rates

CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)955
  • Downloads (Last 6 weeks)105
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)SoK: Analysis Techniques for WebAssemblyFuture Internet10.3390/fi1603008416:3(84)Online publication date: 29-Feb-2024
  • (2024)ESFuzzer: An Efficient Way to Fuzz WebAssembly InterpreterElectronics10.3390/electronics1308149813:8(1498)Online publication date: 15-Apr-2024
  • (2024)CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection methodIntelligent Decision Technologies10.3233/IDT-240319(1-19)Online publication date: 25-Jun-2024
  • (2024)How to evade modern web cryptojacking detection tools? A review of practical findingsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670936(1-10)Online publication date: 30-Jul-2024
  • (2024)Multi-modal Learning for WebAssembly Reverse EngineeringProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3652141(453-465)Online publication date: 11-Sep-2024
  • (2024)CryptojackingTrap: An Evasion Resilient Nature-Inspired Algorithm to Detect Cryptojacking MalwareIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335307219(7465-7477)Online publication date: 1-Jan-2024
  • (2024)Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive CryptojackingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330744521:4(2461-2477)Online publication date: Jul-2024
  • (2024)WASMDYPA: Effectively Detecting WebAssembly Bugs via Dynamic Program Analysis2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)10.1109/SANER60148.2024.00037(296-307)Online publication date: 12-Mar-2024
  • (2024)A Two-Stage Encrypted Cryptomining Traffic Detection Mechanism in Campus Network2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)10.1109/ICBC59979.2024.10634446(602-610)Online publication date: 27-May-2024
  • (2024)Wappler: Sound Reachability Analysis for WebAssembly2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00025(249-264)Online publication date: 8-Jul-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media