In-Browser Cryptocurrency Miner
Coinhive mining scripts run inside your browser as a site-embedded miner. They are not a traditional virus, but they can severely impact performance and power usage if a site uses them without consent.
coinhive is a browser-based cryptocurrency miner that injected JavaScript into websites to mine Monero using visitors' CPU cycles. It operated as an inline miner in websites during its peak years, allowing site operators to monetize visitors without buying ads, though it sparked controversy over consent and performance.
Coinhive runs as a JavaScript/WebAssembly miner loaded by a web page. It delegates hashing work to the browser, communicates with a mining pool, and adjusts workload based on tab focus and CPU availability. It does not install a traditional executable on the PC.
Quick Fact: Coinhive popularized in-browser mining for Monero, prompting extensive debate about user consent and device performance.
In-browser Coinhive mining scripts are not a traditional virus when loaded from legitimate sites that you visit. However, Coinhive’s architecture has been exploited by malware to mine without consent, so vigilance is required.
The legitimate Coinhive miner is not a virus, but malware authors have impersonated mining capabilities. If you find a Windows executable named coinhive.exe, it is likely malicious.
In-browser Coinhive mining scripts are not a traditional virus when loaded from legitimate sites that you visit. However, Coinhive’s architecture has been exploited by malware to mine without consent, so vigilance is required.
In-browser Coinhive mining scripts are not a traditional virus when loaded from legitimate sites that you visit. However, Coinhive’s architecture has been exploited by malware to mine without consent, so vigilance is required.
In-browser Coinhive mining scripts are not a traditional virus when loaded from legitimate sites that you visit. However, Coinhive’s architecture has been exploited by malware to mine without consent, so vigilance is required.