So the miner is gone? I see no difference from when it was here and when it isn't. Yesterday I was running 80%, never had any problems of any kind., never had any alarms.
I prefer to use the KISS technique. What's the simplest explination? That would probably be some adblocker or AV with webshield feature detected something on the page eating a boatload of CPU cycles, and went "oh they're hijacking brower cpu cycles for coins" and it propagated from there. Because this kind of thing is done constantly on many sites suffering from ad revenue problems now, just they don't TELL you they're doing it and ask your permission. And an automated flagging system isn't gonna read the TOS.
Hell I've seen poorly coded flash players trigger some of the more aggressive heuristics just because how shitty and bloated they are. Just as I've seen homebrew dwarf fortress plugins do it because they technically function the way a hijacker would to inject changes into the game.
Had to completely Whitelist the site through uBlock Origin. Which means that it's gonna be blocked by Adblock Plus and all the apps that use that framework. Someone did a hell of a smear-job on the site.
For people having trouble understanding what happened...
Basically, some butthurt lolcow somewhere got the site added to a ton of "Master Lists" of malware-sites-to-block. They cited the bitcoin miner as "Malicious Code Injection" to justify it, even though the miner is harmless and optional.
Stefan from hpHosts/US-CERT who added the initial entry doesn't seem like a lolcow.
I help manage cybercrime-tracker.net but we did not include this entry as we don't yet track domains for mining. Just don't start controlling any botnets using this domain as a callback server and we're gucci.
Stefan from hpHosts/US-CERT who added the initial entry doesn't seem like a lolcow.
I help manage cybercrime-tracker.net but we did not include this entry as we don't yet track domains for mining. Just don't start controlling any botnets using this domain as a callback server and we're gucci.
Depends. This entry appeared on the first day alongside MalwareDominList which are both high up there on the totem pole. MalwareDomainList accepts tips/suggestions, hpHosts does not. He's the actual employee who performed the analysis and made the entry. So it's his job.
Depends. This entry appeared on the first day alongside MalwareDominList which are both high up there on the totem pole. MalwareDomainList accepts tips/suggestions, hpHosts does not. He's the actual employee who performed the analysis and made the entry. So it's his job.
They consider mining without 'informed consent' to be malware. Null needs some kind of redirect page that makes ppl click "Okay I understand" before they're allowed to use KF, because these aren't false positives ; it's getting flagged as malware because it fits the definition of malware these services are using.
Depends. This entry appeared on the first day alongside MalwareDominList which are both high up there on the totem pole. MalwareDomainList accepts tips/suggestions, hpHosts does not. He's the actual employee who performed the analysis and made the entry. So it's his job.
Because I have. It was a correct verdict. Since the script was pulled off recently they've reevaluated their entry on hpHosts. So the latest evaluation date is now 10-20.
However the classification remains the same.
Database Record
IP On Record: 104.24.17.94
IPOR PTR: Resolution failed ASN: 13335 104.24.16.0/20 CLOUDFLARENET - CloudFlare, Inc., US
Added: 18-10-2017
Added By: Stefan
Updated: 20-10-2017
Classification: EMD (What is this?)
Given that the Admin here is saying the script is coming back in essentially the same implementation code-wise, I guess it doesn't matter. Was not interested in code I provided.
They consider mining without 'informed consent' to be malware. Null needs some kind of redirect page that makes ppl click "Okay I understand" before they're allowed to use KF, because these aren't false positives ; it's getting flagged as malware because it fits the definition of malware these services are using.
And this is why. Thread title could use an update.
I emailed Admin here initially a few days ago reiterating this exact point. This is why CoinHive released their new 'AuthedMine' variation after consulting with AV vendors. Non-AuthMine implementations were open season for malware classification following that Oct 17th release. I advised this too but was told in reply by Admin that it was not possible because of some sort of cyberbully?