Another case of "cryptojacking" was detected on YouTube and resolved by Google this week reported Ars Technica Friday. 26. According to the report, anonymous hackers have been successful in delivering YouTube ads that consume the processor power and electricity of visitors in order to exploit cryptocurrencies for attackers.

Users have begun to publish complaints on social networks this week, antivirus programs have detected cryptocurrency extraction code in the advertisements that were shown to them by Youtube.

According to the Trend Micro IT security company report, attackers have successfully reached YouTube through the Google DoubleClick advertising platform. Advertisements disproportionately targeted users in Japan, France, Taiwan, Italy, and Spain.

The vast majority (90%) of ads used JavaScript provided by Coinhive, a controversial cryptocurrency exploration platform. earn income by using the computing power of others in an unauthorized manner.

As Trend Micro discovered on Friday, YouTube commercials have tripled internet-based child detections worldwide.

In response to user complaints, Google – which owns YouTube – announced that the situation had been resolved in a few hours. According to an email from the company, " ads were blocked in less than two hours and malicious actors were quickly removed from our platforms ."

However, there is still no accurate information about the duration of the events because Google provided no additional data, while Trend Micro claims that Warnings regarding abusive advertising began to appear as early as 18 January.

Earlier this month, Check Point, a software security company, reported on a sharp rise in the prevalence of crypto-mining malware, stating that 55 percent of businesses worldwide are affected by the attacks. The report stated that Coinhive was the number 1 " Most Wanted Malware ."