16 thoughts on “U.S., UK government websites infected with crypto-mining malware

  1. DankeyKong64 February 12, 2018 / 9:50 am

    How can you tell if a website is using your CPU for mining?

  2. Antonshka February 12, 2018 / 9:50 am

    Goverment websites mining Monero. At least they are being transparent about this, oh irony.

  3. Spudtron98 February 12, 2018 / 9:50 am

    God, crypto is an absolute cancer on this earth.

  4. DistortoiseLP February 12, 2018 / 9:50 am

    I think the more hilarious thing here is that if it was a malware version of a commercial product like Browsealoud, that means the governments very likely pirated it.

  5. LeapingLupine February 12, 2018 / 9:50 am

    Who you gonna blame for this?? Wait, I know…

  6. Hongcouver February 12, 2018 / 9:50 am

    Sort of ‘undermining’ government authority? Had to be said.

  7. fifa129347 February 12, 2018 / 9:50 am

    I wouldn’t be surprised if they allowed the malware to infect the sites through neglect of security, the government will do anything that encourages public resentment toward a currency they have no means of control over.

  8. therealautomoderator February 12, 2018 / 9:50 am

    This would be a good replacement for ad revenue, I’d imagine most people would have no issues agreeing to lend their cpu cycles while using their favorite websites. Not that this has much to do with the story here.

  9. Fancyplateoffosh February 12, 2018 / 9:50 am

    Are these the ones made possible by the CIA malware?

  10. FuuuckTrump February 12, 2018 / 9:50 am

    Dumbfucks, cryptomining PUPs are not adware. It had nothing to due with about ads, so “Mr. I-think-ublock-can-block-cpu-abuse” has NO clue what he’s talking about.

    You need to baseline a known good filesystem, and then monitor for unauthorized changes. That’s like Security 101. Or maybe you want a more feature rich platform, like TripWire or OSSEC HIDS.

    Really, anything other than nothing, or guessing.

Leave a Reply