By André Alves, Trend Micro Brasil technical advisor
At first glance, considered a revolutionary, the digital currency market is highlighted in the headlines for being on the rise and reaching record market value in recent months.
In fact, blockchain enables the elimination of intermediaries and increases the security of transactions that decrease the risk of being forged. The fact that it is an open source database means that anyone can audit the code and test the mechanisms that guarantee the security of the transactions.
Because it is completely processed on computers, blockchain-based transactions introduce a possibility that has been explored by some websites: instead of displaying advertisements and advertisements, receiving indirect revenue for each click, the visitor lends the processing of his computer, throughout the time you are viewing the site, to “mine” digital currencies that would be transferred directly to the site.
This is what happened recently with Pirate Bay, one of the sites with the largest bank of torrents in the world, which assumed to have used the Coinhive miner. This means that when accessing Pirate Bay, visitors unwittingly collaborated to make their machines real “zombies”, generating profits for third parties through the mining of bitcoin coins.
Then another debate arises: is the anonymity of the “donors” involved in the transactions, which become primary sources of funds for websites, legally sustainable?
To worsen the scenario - and make life easier for hackers - with the presence established on the infected machine, the attacker will be able to incorporate remote control functions such as the denial of service attack.
However, a very simple signal can help the user to identify if the machine is infected with a digital coin miner. If the individual notices that the computer is heating up and activating the internal ventilation frequently, even when performing simple functions, it is important to check the Task Manager. Use mistrust as a standard: if the activity at the top of the consumption list is an unknown program, do a complete scan of your antivirus.
The mining of electronic currencies in a sneaky way demonstrates that the good or bad applications of blockchain technologies remain dependent on an immutable component: the human being.
The anonymity made possible by decentralized currencies is unprecedented for financial transactions and is precisely what can attract cybercriminals. Therefore, more than ever, it is necessary to pay attention to this scenario that will still have many developments.