A recent report reveals that over 3,500 websites have been compromised by cryptojacking malware that covertly utilizes visitors' browsers to mine Monero, a privacy-centric cryptocurrency. Unlike traditional malware, this script does not steal data or lock files; instead, it discreetly converts browsers into Monero mining tools, consuming processing power without user consent. Discovered by cybersecurity firm c/side, this ongoing campaign employs techniques to minimize CPU usage and disguise its activity within WebSocket streams, making it less detectable than earlier methods. Cryptojacking, which gained notoriety in 2017 with Coinhive, has evolved from overt, resource-draining scripts to more subtle operations. Current tactics leverage previously hacked WordPress sites and e-commerce platforms, allowing attackers to integrate mining scripts seamlessly. The new approach focuses on maintaining long-term access and generating passive income while avoiding detection. This shift highlights the need for updated security measures, as traditional detection methods may no longer suffice against these stealthy mining operations targeting server and web application owners. Read more AI-generated news on: https://app.chaingpt.org/news