1
0
Форкнуть 0
This commit is contained in:
Vivian Jin 2018-04-13 15:08:12 -07:00
Родитель c6e067a5c0
Коммит de957ea139
1 изменённых файлов: 1 добавлений и 1 удалений

Просмотреть файл

@ -47,7 +47,7 @@
"### Results: Summary\n",
"\n",
"Less than 0.02% of script calls are detected with cryptojacking. \n",
"However, it is important to note that cryptojacking code can be executed in order ways than by including the host .js script in a script tag. It can be disguised, stealthily executed in iframes, or directly used in a function of a first party script. Users may also face redirect loops that eventually lead to a page with a mining script. Another reason for the low detection rate could be that the prominence/popularity of the analysed sites from the web crawl is enough to dissuade site owners from implementing obvious cryptojacking script usage. \n",
"However, it is important to note that cryptojacking code can be executed in other ways than by including the host .js script in a script tag. It can be disguised, stealthily executed in iframes, or directly used in a function of a first party script. Users may also face redirect loops that eventually lead to a page with a mining script. Another reason for the low detection rate could be that the prominence/popularity of the analysed sites from the web crawl is enough to dissuade site owners from implementing obvious cryptojacking script usage. \n",
"It is likely that the actual rate of cryptojacking is higher. \n",
"\n",
"The majority of domains that were detected with cryptojacking are streaming sites. This is unsurprising as users will have streaming sites open for longer as they are watching shows/movies, and mining scripts can be executed longer. \n",