Tap to Trade in Gate Square, Win up to 50 GT & Merch!
Click the trading widget in Gate Square content, complete a transaction, and take home 50 GT, Position Experience Vouchers, or exclusive Spring Festival merchandise.
Click the registration link to join
https://www.gate.com/questionnaire/7401
Enter Gate Square daily and click any trading pair or trading card within the content to complete a transaction. The top 10 users by trading volume will win GT, Gate merchandise boxes, position experience vouchers, and more.
The top prize: 50 GT.
 (Additional context: Brazil’s Central Bank’s $140 million reserve was hacked! The stolen funds were exchanged for Bitcoin, with hacker costs only $2,760, and service providers as the weak link) The moment you open a shopping page or news website, you think your computer is only working for you, but little do you realize that the CPU behind the scenes is quietly working for strangers. According to security research organization c/side, earlier this month, up to 3,500 websites have been hacked and implanted with “in-browser mining” programs, with attack traffic spread globally, but users are almost oblivious. Hacker attack methods revealed c/side researchers uncovered mining scripts hidden in obfuscated JavaScript, which evaluate the device’s computing power and generate backend Web Workers to run mining tasks in parallel without raising any alarms. More importantly, this activity was also found to use WebSockets to obtain mining tasks from external servers, allowing dynamic adjustments of mining intensity based on device capabilities, and correspondingly limiting resource consumption to maintain stealth. The end result of this method is that users mine Crypto Assets while browsing compromised websites, turning their computers into hidden Crypto Assets mining rigs without the user’s knowledge or consent. Security researcher Himanshu Anand stated: This is an invisible mining program designed to evade detection by users and security tools. Personal cost: The quiet loss of network resources, electricity, and privacy For the average user, the immediate loss may not be the deposits in their bank account, but it can lead to serious computer sluggishness, prolonged fan activity, and accelerated battery drain of mobile devices. Long-term computational load may shorten hardware lifespan and increase electricity bills. More seriously, websites implanted with mining scripts often spread other malicious programs simultaneously, such as credit card data theft scripts, ultimately exposing personal data and payment information to risk. Corporate impact: Brand trust and compliance costs surge For website operators, being hacked not only damages their brand image but may also trigger regulatory investigations and even lawsuits. Additionally, to combat hacker hijacking, operational teams need to fix servers, update plugins, and trace the sources of malicious scripts, all of which require manpower and time. Once user data is leaked, companies also face additional fines. Defense path: Tools, processes, and education are all essential On a personal level, one can block known mining scripts through antivirus software and browser plugins while being mindful of abnormal heat and power consumption of devices. Regularly updating operating systems and applications also helps to close exploited vulnerabilities. Companies should conduct a comprehensive inventory of this issue and establish rapid patching mechanisms, possibly introducing behavioral analysis or AI detection systems to instantly flag abnormal network traffic. Finally, continuous education and learning are key to combating online threats. Cybersecurity issues resemble a marathon; only by upgrading the “digital immune system” together can users and businesses effectively safeguard computing resources and maintain trust systems. Related reports Microsoft collaborates with FBI to combat North Korean hacker fraud! Freezing 3,000 accounts, capturing US “accomplices” Iran announces “ban on Crypto Assets at night,” Israeli hackers destroy Nobitex’s $100 million, triggering on-chain warfare MicroStrategy releases Proof of Reserve on-chain, Michael Saylor: Public addresses are too foolish, making it easy for hackers to target “Your computer is helping hackers mine Bitcoin! 3,500 websites implanted with mining scripts, invisible hijacking leaves users unaware” This article was first published in BlockTempo, the most influential Blockchain news media.