- Beto O’Rourke was ‘born’ to run for president, but what about actually governing? Today 7:30 AM
- How to stream the 2019 Stanley Cup for free Today 7:00 AM
- Swipe This! My needy coworker won’t stop texting me Today 7:00 AM
- How to watch ‘The Hot Zone’ for free Today 7:00 AM
- Witness the wholesome magic of inter-generational conversations on r/AskOldPeople Today 6:30 AM
- How to watch Paramount Network online for free Today 5:30 AM
- People are sharing how serving in the military has ruined their lives with #WhyIServe Sunday 5:31 PM
- Gillette ad showing a dad teaching his trans son how to shave has the internet in tears Sunday 4:34 PM
- 4chan’s new troll campaign aims to make the hashtag a white supremacist symbol Sunday 2:49 PM
- Here’s what that ‘cliff wife’ meme is all about Sunday 12:58 PM
- Artist suspended from Facebook, Instagram after posting anti-MAGA artwork Sunday 12:04 PM
- How to watch Serie A online for free Sunday 7:30 AM
- What does ‘uwu’ mean? Sunday 7:00 AM
- How to uninstall the Epic Games Launcher (for real) Sunday 6:30 AM
- How to watch the Indianapolis 500 online for free Sunday 6:00 AM
The add-on was leeching off its 105,000 users.
Is your computer running slower than normal? Perhaps its battery is draining? You might want to check if it’s being used to mine cryptocurrency.
Another Chrome extension was caught cryptojacking, or hijacking users’ computers without consent and using their processing resources to mine cryptocurrency. The extension Archive Poster has been stealthily taking advantage of its 105,000 users for the past few weeks, Bleeping Computer reports.
Marketed as an easier way to “reblog, queue, draft, and like posts right from another blog’s archive” on Tumblr, the extension was using the well-known Coinhive miner without telling users. The Coinhive script has been deployed on numerous sites, including CBS’s Showtime and Pirate Bay as a way to inconspicuously mine cryptocurrency, or digital money. In the case of Archive Poster, it was used to harvest Monero, the same currency mined by “Digmine,” a malware that recently spread through Facebook Messenger.
The code was hidden in at least four versions of the Archive Poster plugin from 126.96.36.1994 to 188.8.131.528. Furious users flooded the extension’s product page with one-star reviews after the intrusive code was discovered. Some even reported the extension to the Google Chrome Help Forum, but the search giant told them to “get in touch with the extension developer for further assistance.”
As the value of cryptocurrency continues to boom, websites and services are finding inventive ways to mine more digital coin, often at the expense of customers. In November, a researcher documented more than 2,500 sites that actively run cryptocurrency mining code in popular browsers. While technically not illegal—they don’t steal your information like malware—cryptominers can have a negative impact on the performance of your computer and present a serious ethical dilemma.
A few ways to protect yourself from cryptocurrency mining code include downloading antivirus protection software and keeping it up to date. For suggestions, you can check out our list of the top security software for Mac and Windows. Other methods for protecting your devices include installing an ad-blocker (AdBlock Plus and AdGuard both block Coinhive’s JS library) or installing a cryptomining blocker extension onto your browser.
Google has removed Archive Poster from its store, but it appears a new version with the same description is already live. It’s not clear if this version includes the same mining code or if it was reapproved by Google. Whatever the case, we strongly recommend you avoid downloading it to be safe.
We have reached out to Google and will update this article if we find out more.
Phillip Tracy is a former technology staff writer at the Daily Dot. He's an expert on smartphones, social media trends, and gadgets. He previously reported on IoT and telecom for RCR Wireless News and contributed to NewBay Media magazine. He now writes for Laptop magazine.