Share this article

Google's DoubleClick Ads Used to Distribute Crypto Mining Malware

Security firm TrendMicro stated in a new report that Google's DoubleClick ad services were used to distribute cryptocurrency mining malware.

Updated Sep 13, 2021, 7:30 a.m. Published Jan 29, 2018, 10:20 p.m.
Malware

Security firm TrendMicro stated in a new report that Google's DoubleClick ad services were used to distribute cryptocurrency mining malware to a number of users in Europe and Asia.

On its Security and Intelligence Blog, the company outlined how CoinHive – a JavaScript program that works in the background of a website and uses a computer's processing power to mine monero – was distributed by attackers who appropriated Google's DoubleClick. Significantly, miners like CoinHive operate without a user's consent or knowledge.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the Crypto Daybook Americas Newsletter today. See all newsletters

Google's DoubleClick ad services are also used by YouTube, the world's most popular video sharing service, and the miner impacted a number of users on the site, according to ArsTechnica.

A "separate web miner that connects to a private pool" was also involved in the scheme, according to TrendMicro's report.

The "malvertisement" incorporated two different web miner scripts in addition to the actual advertisement, according to the report.

It continued:

"The affected webpage will show the legitimate advertisement while the two web miners covertly perform their task. We speculate that the attackers’ use of these advertisements on legitimate websites is a ploy to target a larger number of users, in comparison to only that of compromised devices. The traffic involving the abovementioned cryptocurrency miners has since decreased after January 24".

As much as 80 percent of an affected computer's processing power can be taken over when exposed, reducing the machine's performance, according to the report.

Clandestine cryptocurrency mining has been on the rise in recent months, as previously reported. Companies such as oil pipeline giant Transneft have seen their systems affected by the malware, and a report from November suggested that CoinHive has become one of the more common pieces of malware in circulation today.

Malware image via Shutterstock

More For You

Protocol Research: GoPlus Security

GP Basic Image

What to know:

  • As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
  • GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
  • Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.

More For You

Bitcoin’s Deep Correction Sets Stage for December Rebound, Says K33 Research

(Unsplash)

K33 Research says market fear is outweighing fundamentals as bitcoin nears key levels. December could offer an entry point for bold investors.

What to know:

  • K33 Research says bitcoin’s steep correction shows signs of bottoming, with December potentially marking a turning point.
  • The firm has argued that the market is overreacting to long-term risks while ignoring near-term signals of strength, like low leverage and solid support levels.
  • With likely policy shifts ahead and cautious positioning in futures, K33 sees more upside potential than risk of another major collapse.