There are more and more people wanting to make money through hidden mining every day. Thus, the extraction of digital currencies using the CoinHive service has already reached the websites of government agencies.
A JavaScript miner installed in the website code in order to mine digital currency secretly from users was discovered on the website of the Ukrainian Hydrometeorological Center.
The most interesting thing is that no one hid the presence of the miner; the script was installed at the very beginning of the HTML code. That is, it is not hidden in any masking files, it is not obfuscated and is not covered at all.
Any hidden mining script is recognized by the antivirus program as malware. If they run in a browser, it may cause your computer to freeze. CoinHive ranks sixth on the list of most malicious programs.
It is likely that the site was hacked, like government sites in the US and UK in February, for example.
Recall that then, due to a hacker attack, 4200 sites in the US and UK mined the Monero cryptocurrency from user accounts computers.
On the other hand, perhaps the employees of the Ukrainian Hydrometeorological Center themselves are engaged in hidden mining of digital currencies.
Representatives of the organization have not yet commented on this situation. We follow the news.
You May Also Like
Cloud mining is currently causing losses
The Internet is replete with stories about the super-profitability of cloud mining and offers to participate in this enterprise. If we exclude from this the banal scam of gullible citizens, then what will be the bottom line?
Marathon will raise $500 million to buy BTC and miners
Marathon Digital Holdings, one of the largest American mining corporations, will attract debt financing to replenish the balance sheet of the BTC and purchase ASICs.
