Test your web browser's cryptojacking protection - gHacks Tech News

Test your web browser's cryptojacking protection

Cryptojacking is a relatively new threat on the Internet. It refers to websites abusing computing resources of visitors to mine cryptocurrency.

Internet users notice that something is wrong when the computer they use slows down to a crawl suddenly and when fans speed up in an attempt to cool down components of the device that get hammered.

The main issue with cryptojacking is that it is done behind the backs of users. Sites load cryptomining scripts on load to mine cryptocurrency using the resources of the computer of the user visiting the site. There is no opt-in process or information on what is going on.

Sites run these scripts to generate revenue. One of the advantages of running mining operations in the browser is that it happens in the background. It does not interfere with the site's layout or content.

Browser extensions may load crypto mining scripts as well. These work in the background just like scripts loaded by sites.

Cryptojacking Test

cryptojacking test

Opera Software was the first browser-making company that implemented anti-crypto mining protections in the browser natively.

While Opera was the first browser, content-blocking lists added cryptomining scripts before Opera did so.

Opera Software engineers created a site that you may visit to test whether you are protected against cryptojacking.

Visit the website and click on the start button on it to run the test. It won't take longer than a couple of seconds to complete and the result is either that the browser that you are using is protected or unprotected.

Opera Software displays aggregate ratings on the site as well. 73.6% of all users are protected from cryptojackingat the time of writing according to the statistics on the page.

Users who run browsers that are not protected have several options at their disposal to protect their browsers against crypto mining attacks.

  1. Use a browser extension that protects against JavaScript mining scripts.
  2. Use the Opera browser with ad-blocking enabled.
  3. Use a security software that protects against mining scripts.
  4. Install an anti-mining browser extension.
  5. Disable JavaScript on untrusted sites.

Closing Words

Opera tests the protection against a Coin Hive script only which leaves the possibility that the browser is vulnerable to these scripts. It is only a matter of time usually before new scripts or URLs do get blocked though.

Now You: Did you run into cryptomining sites in the past?

Related articles

Summary
Test your web browser's cryptojacking protection
Article Name
Test your web browser's cryptojacking protection
Description
Cryptojacking is a new threat on the Internet. It refers to sites loading scripts that mine cryptocurrency using visitor's devices. Take the Cryptojacking Test to find out if you are protected.
Author
Publisher
Ghacks Technology News
Logo
Advertisement

We need your help

Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.

We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.

If you like our content, and would like to help, please consider making a contribution:


Previous Post: «
Next Post: »

Comments

  1. SCBright said on January 23, 2018 at 2:41 pm
    Reply

    My setup at Firefox and Edge browser (no Opera for me):
    – uBlock origin with No Coin Filter list installed
    – Malwarebytes with all protections enabled

    That’s it! No slowdown and no coin miners until now.

  2. Bobby Phoenix said on January 23, 2018 at 2:43 pm
    Reply

    I take it we just type “cryptojackingtest.com”? I can’t find a link anywhere to the test.

    1. Martin Brinkmann said on January 23, 2018 at 3:04 pm
      Reply

      Yes, link added.

      1. Bobby Phoenix said on January 23, 2018 at 3:09 pm
        Reply

        Thank you.

  3. Kubrick said on January 23, 2018 at 2:45 pm
    Reply

    This is just a ploy to entice people to use opera browser.Opera is a good browser but an adblocking extension can be installed on any browser not just opera.
    This is a test to see if you have an adblock installed and is not browser specific.

  4. Richard Allen said on January 23, 2018 at 2:48 pm
    Reply

    I’m not seeing a link for the test Martin.

    I’m curious how it would fare against the “Resource abuse” filter list in uBlock Origin, which is now bigger than the No Coin filter list.

    As it turns out, with uBO’s Resource abuse filter and without No
    Coin the browser passed the test

    1. Martin Brinkmann said on January 23, 2018 at 3:04 pm
      Reply

      Sorry for that, link is here: https://cryptojackingtest.com/

      1. Richard Allen said on January 23, 2018 at 3:25 pm
        Reply

        Thank you sir. ;)

  5. R said on January 23, 2018 at 3:13 pm
    Reply
  6. AnorKnee Merce said on January 23, 2018 at 3:32 pm
    Reply

    I added the NoCoin filter list to Adblock Plus = my browser is protected, according to the test.

  7. Timson said on January 23, 2018 at 3:57 pm
    Reply

    All this methods won’t protect you against custom made mining scripts. In the end tou run someones code in you browser all the time.
    I just monitor my CPU usage by Process Explorer tray icon graph constantly so if my CPU usage spikes on page I will notice that immediately.

    1. John Fenderson said on January 24, 2018 at 1:16 am
      Reply

      “All this methods won’t protect you against custom made mining scripts”

      If you aren’t allowing scripts to run in your browser, then you’re protected from all scripts, custom or otherwise. That’s one of the reasons why I haven’t allowed scripts to run in my browser for years (aside from hand-picked exceptions). It’s too risky.

  8. Šime Vidas said on January 23, 2018 at 4:06 pm
    Reply

    It seems that Firefox with Tracking Protection enabled (a built-in feature) passes the test (I disabled Ghostery during the test, and it still passed). This would make sense, since cryptojacking is performed by third parties, which are probably identified as trackers by Mozilla.

    1. Richard Allen said on January 23, 2018 at 5:33 pm
      Reply

      Nice find!
      Didn’t think of running that test. I disabled uBlock Origin, ran the test, and saw the same results. I’ve been using Tracking Protection for a while now and I’m a big fan. It’s very light on resources and when it’s working on a site, if anything, it lowers ram usage, from what I’ve seen. I’ve always been of the opinion that a lot of people aren’t aware of how aggressive “Tracking Protection” actually is.

      I just looked on github and Disconnect added bitcoin miners back on Nov 15, 2017. If someone is not using uBlock Origin which has the default “Resource abuse” filter I would recommend using the No Coin Filter list, the list in Disconnect isn’t as comprehensive as the other two. Still, it’s pretty nice that Tracking Protection includes what it does.

  9. Tom Hawack said on January 23, 2018 at 7:09 pm
    Reply

    Protected here on Firefox 58 even with ‘uBlock Origin’ disabled for the testing page.
    Firefox’s native tracking protection option is disabled. No dedicated anti-cryptojacking Firefox extension.
    No idea though if the protection is that of Firefox or of my system-wide defense which I’ve fed with cryptojacking addresses and domains. I could find out but I’d have to start logging. No problem, thanks to God or the army or the cops or my settings, as long as I’m safe …

  10. Chuck Williamson said on January 23, 2018 at 7:19 pm
    Reply

    I’m always amused when I visit test sites like this and they say “Oops! It seems you have JavaScript disabled in your browser”. Yes, that’s why I use the NoScript extension, silly billies!

  11. St. Iggy Zardust said on January 23, 2018 at 7:27 pm
    Reply

    If someone’s interested, here’s a blocklist that looks more comprehensive than NoCoin:
    https://github.com/ZeroDot1/CoinBlockerLists

    1. Tom Hawack said on January 24, 2018 at 12:33 am
      Reply

      Thanks

  12. John in Mtl said on January 23, 2018 at 7:54 pm
    Reply

    I ran the test with NoScript disabled because it would not run otherwise.

    Kaspersky (KIS 2017) immediately caught the crypto script testing code and flagged it as malware ;-)

    Then the test page reported that I wasn’t protected… but I’m sure I am; I just think the test page does not account for protection software doing its thing. Its not a thorough test on the part of Opera.

  13. RossN said on January 23, 2018 at 8:02 pm
    Reply

    Protected – using the Brave browser.

  14. Eljuno said on January 23, 2018 at 10:03 pm
    Reply

    “Opera Software was the first browser-making company that implemented anti-crypto mining protections in the browser natively.”

    But I’m pretty sure Brave Browser is the first browser that implemented it. https://twitter.com/brianbondy/status/909867392750297090 :)

    1. Richard Allen said on January 24, 2018 at 2:35 pm
      Reply

      I’m pretty sure my install of Firefox came with uBO which had filters for bitcoin miners when it was updated to version 56 so it definitely beat Opera and Brave. ;)

      1. Richard Allen said on January 24, 2018 at 2:42 pm
        Reply

        Just to be clear, that was a joke. :)

  15. Lurks About said on January 25, 2018 at 5:47 am
    Reply

    Brave passes with its default configuration.

  16. Sophie said on February 2, 2018 at 10:01 am
    Reply
  17. ge950 said on February 7, 2018 at 3:36 am
    Reply

    Interestingly, Avast detects that cryptojackingtest.com leaves a js:miner-c in my browser’s cache.

  18. notaoperafan said on February 22, 2018 at 12:11 am
    Reply

    https://cryptojackingtest.com/
    fake on chrome as mineblock recognizes that its running while you testing
    opera pretty fooling people to check while they mine lol

  19. Jason Meaden said on March 12, 2018 at 12:11 am
    Reply

    Never mind Opera’s fantasies, does Opera pass Panopticlick’s test?

    https://panopticlick.eff.org/

    Nobody does out of the box except for this browser…

    http://theclassictools.com/

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

Please note that your comment may not appear immediately after you post it.