Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday January 09 2020, @08:02PM   Printer-friendly
from the noscript dept.

From ZDNet:

Around half of the websites that use WebAssembly, a new web technology, use it for malicious purposes, according to academic research published last year.

WebAssembly is a low-level bytecode language that was created after a joint collaboration between all major browser vendors.

[...] However, while the vast majority of samples were used for legitimate purposes, two categories of Wasm code stood out as inherently malicious.

The first category was WebAssembly code used for cryptocurrency-mining. These types of Wasm modules were often found on hacked sites, part of so-called cryptojacking (drive-by mining) attacks.

The second category referred to WebAssembly code packed inside obfuscated Wasm modules that intentionally hid their content. These modules, the research team said, were found [as] part of malvertising campaigns.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Friday January 10 2020, @02:16AM

    by Anonymous Coward on Friday January 10 2020, @02:16AM (#941742)
    But a JS or WebAssembly ad piece isn't an action.