Japanese Police Investigate Cryptojacking Case Involving Coinhive Monero Mining Software

Published at: June 13, 2018

Japanese police are investigating a case of cryptojacking that involves Monero-mining software Coinhive, sources familiar with the matter told local news outlet Mainichi June 12.

Investigators suspect that the alleged culprits are in violation of the law banning the use of computer viruses. According to the sources, the suspects involved in the case set up websites that installed the Coinhive crypto mining software on visitors’ computers without their consent or “clear notices about mining.”

So far, Japanese police have investigated three individuals, including a web designer, one of whom was ordered by the Yokohama Summary Court to pay 100,000 yen ($904) for illegal placement of a computer virus. The individuals involved in the case reportedly set up websites in autumn of 2017. According to Mainichi, one of the defendants claims that the software was not a virus but a method of traffic monetization similar to online ad distribution. The case will be brought to trial at the Yokohama District Court.

The case is being pursued by several different police departments including those in Kanagawa, Chiba, and Tochigi in central Japan. Officials judged that the case may be pursued criminally because the installation and operation of Coinhive was done without the owner's’ consent, making the machines function in a manner not intended by the original owners. This will reportedly be the first criminal case involving cryptocurrency mining in Japan.

Coinhive, which was created in 2017, has become one of the most widespread online tools to mine Monero on websites using visitors’ CPU power and electricity, and has been used to target computers via YouTube, as well as on government and university websites.

According to a January report from software security firm Check Point, 55 percent of business worldwide are affected by cryptojacking. The report called Coinhive the number one “Most Wanted Malware.”

Tags
Related Posts
South Korea Looks to Track Crypto Transactions in Light of Recent Scandal
The Korea Internet and Security Agency, or KISA, plans to develop an artificial intelligence-based software to trace cryptocurrency transactions on the dark web in response to the Telegram Nth Room sexual ring case. According to New Daily, the government has been working on solutions since January, as authorities faced difficult obstacles amid the investigation of the child porn case in South Korea, where people could buy access to videos with sexually explicit content containing minors. The KISA says that such software relies on machine-learning technology, which automatically traces inside South Korean’s dark web sites that process crypto transactions. The authority …
Blockchain / June 27, 2020
New Linux-Targeting Crypto-Mining Malware Combines Hiding and Upgrading Capabilities
Japanese multinational cybersecurity firm Trend Micro has detected a new strain of crypto-mining malware that targets PCs running Linux, according to a report published Nov. 8. The new strain is reportedly able to hide the malicious process of unauthorized cryptocurrency-mining through users’ CPU by implementing a rootkit component. The malware itself, detected by Trend Micro as Coinminer.Linux.KORKERDS.AB, is also reportedly capable of updating itself. According to the report, the combination of hiding and self-upgrading capabilities gives the malware a great advantage. While the rootkit fails to hide the increased CPU usage and the presence of a running crypto-mining malware, it …
Blockchain / Nov. 13, 2018
Report: Number of Compromised Routers in India Doubled, Reaching Almost 30,000
A recent report by security company Banbreach has found that in the past month, the number of routers compromised by cryptojacking software in India has doubled. The report indicates that hackers have cracked over 30,000 routers within the country, Hard Fork reported Oct. 5. Banbreach managed to track Internet traffic and detect all devices on the Internet with public IP addresses, which made it possible to examine traffic passing through routers. In the course of its research, Banbreach grouped populated areas of India into three categories from most to least dense. According to the report, 45 percent of the infected …
Blockchain / Oct. 6, 2018
Malwarebytes' Cybercrime Q2 2018 Report: Cryptojacking is Plateauing in Response to Markets
Interest in cryptojacking is potentially waning among cybercriminals in response to lower cryptocurrency market valuations, according to a report from MalwareBytes Labs released July 17. Cryptojacking is the practice of using a computer’s processing power to mine for cryptocurrencies without the owner’s consent or knowledge. The data and analysis laid out in Malwarebytes Labs’ “Cybercrime Tactics and Techniques: Q2 2018” report shows that while cryptojacking remains popular, decreases in detections of the activity across the board suggest that the trend may be beginning to decline: “We are not certain which [cybercrime] threat is going to take over as the top …
Bitcoin / July 18, 2018
Monero Implements Hard Fork, Including New ASIC-Resistant Mining Algorithm
The Monero (XMR) network has been successfully upgraded to RandomX, a new mining algorithm that aims to be ASIC-resistant. On Nov. 30, the Monero community workgroup did a live stream on YouTube in which the upgrade took place at around the 58 minute mark. The new upgrade also introduced proof-of-work (PoW) algorithm, RandomX, which uses random code execution together with memory-focussed techniques to be resistant to application-specific integrated circuits (ASIC) — devices optimized for professional mining operations. The upgrade is also reportedly optimized for general-purpose central processing units (CPU) in order to make the network more decentralized. As a result, …
Blockchain / Dec. 2, 2019