Popular Web Browser Firefox to Start Blocking Cryptojacking Malware

  • Firefox is set to start blocking cryptocurrency mining malware
  • The moves comes as the browser attempts to "give users a voice" when browsing the web.

Firefox, one of the world’s most popular web browsers, is set to start blocking cryptojacking malware by default in order to improve user experience and enhance its performance, in an anti-tracking initiative.

Through a blog post, the organization behind the open-source browser revealed it plans on blocking trackers and other harmful practices to “give users a voice.” Some of its new features, per the blog post, are already available in its Firefox Nightly beta version.

The post, written by Mozilla’s vice president of product Nick Nguyen, details Firefox will mitigate deceptive practices that include fingerprinting users – a technique used to “invisibly identify users by their device properties” and cryptojacking. It reads:

Other sites have deployed cryptomining scripts that silently mine cryptocurrencies on the user’s device. Practices like these make the web a more hostile place to be. Future versions of Firefox will block these practices by default.

Cryptojacking essentially consists of websites adding scripts to their code that let them use their visitors’ CPU resources to mine cryptocurrencies. While some websites ask users to use their CPUs instead of showing them ads, most use them without letting users know.

These scripts often ruin browsing experiences and can physically damage devices if they overheat. Over the past few months cryptojacking became a popular trend, as McAfee labs revealed cryptojacking malware cases increased by 629% in the first quarter of this year.

A study commissioned by Citrix and executed by OnePoll earlier this month revealed that 59% of businesses in the UK have, at some point, been hit with cryptojacking attacks. The trend grew so much that the Uk National Cyber Security Center revealed it is seen as a “significant” threat.

Firefox’s features are set to be tested on its Firefox Nightly beta version, and will be rolled out to a stable Firefox release by default if the company’s approach “performs well.” Firefox is notably one of various browser developers blocking cryptojacking malware and addressing the cryptocurrency space.

As CryptoGlobe covered Google has recently removed cryptocurrency mining apps from its Play Store, months after removing extensions from Chrome’s web store. Despite the tech giant’s move, several crypto mining apps were still on its app store after the ban.

Opera, a browser that recently introduced a mobile browser for Android with a built-in crypto wallet, rolled out mining script protection for its mobile users in January of this year. The feature was already featured on its desktop version by default. Notably, Opera is set to add its built-in cryptocurrency wallet to its desktop browser.

The Brave browser, founded by JavaScript creator and Mozilla co-founder Brendan Eich, also blocks trackers and cryptocurrency mining malware by default. Brave, as covered, recently surpassed 10 million downloads on Google’s Play store.

Bitcoin Ransomware Targeting Google Adsense Users

Michael LaVere
  • A new crypto ransomware scam is targeting users of Google's AdSense.
  • Website owners are being threatened with bot traffic in exchange for paying a bitcoin ransom. 

A new email-based form of crypto ransomware is targeting website owners using banners from Google’s AdSense program. 

According to the report by KrebsonSecurity, the scam involves criminals threatening site owners with a flood of bot and junk traffic to trigger Google’s automated anti-fraud system, leading the suspension of their AdSense account for suspicious traffic. In exchange, the fraudsters are asking for a ransom paid in bitcoin in order to avoid the potential of losing AdSense revenue. AdSense is a Google program allowing website owners to run ads on their platforms.

The report cites an unnamed website owner targeted by the scam, who shared an excerpt from the ransom email,

This will happen due to the fact that we’re about to flood your site with huge amount of direct bot generated web traffic with 100% bounce ratio and thousands of IP’s in rotation — a nightmare for every AdSense publisher.

The message continues, 

This means that the main source of profit for your site will be temporarily suspended. It will take some time, usually a month, for the AdSense to lift your ad ban, but if this happens we will have all the resources needed to flood your site again with bad quality web traffic which will lead to second AdSense ban that could be permanent!

Google told KrebsOnSecurity that the scam is a “classic” threat of sabotage, and that the company has “extensive” tools in place to protect websites against invalid traffic. 

Featured Image Credit: Photo via Pixabay.com