How ISPs Hijack Video Sites to Run Hidden Crypto‑Mining Scripts

Recent reports show that some Chinese ISPs inject obfuscated cryptocurrency‑mining JavaScript into popular video‑streaming pages, using network hijacking to exploit browsers' CPU cycles without noticeable slowdown, and security tools like 360 Safe Guard now offer anti‑mining protection.

ITPUB
ITPUB
ITPUB
How ISPs Hijack Video Sites to Run Hidden Crypto‑Mining Scripts

Background

Users in several Chinese provinces reported that visiting major video platforms (Youku, iQiyi, Sohu Video, Tencent Video) sometimes triggered alerts from 360 Security Guard. The alerts were caused by malicious cryptocurrency‑mining code injected into the pages.

Cause

Investigation confirmed the mining code was not part of the video sites. It was inserted by a few network operators via ISP‑level traffic hijacking, modifying the JavaScript delivered to browsers and embedding a mining script that runs in the background.

Geographic Scope

The hijacking is concentrated in Liaoning province, with smaller occurrences elsewhere.

Technical Analysis

Case study of Youku shows the original video‑playback script ykDanmuLoad.js is replaced with a malicious main.js that loads the CoinHive mining library. The replacement adds a line to load main.js after decoding.

De‑obfuscated main.js reveals key parameters:

sitekey : identifier for the mining account, different keys for Windows, Android, iPhone.

throttle : CPU usage limit (30%) to keep mining hidden.

autothreads : flag controlling automatic thread adjustment.

Two additional scripts, main1.js and main2.js, are encrypted copies of the official CoinHive library ( coinhive.min.js).

Impact

The script consumes up to 30% of CPU cycles, which is generally unnoticed by users. Monitoring data shows a steady increase in hijacked pages, indicating expanding scope.

Mitigation

End users should use security software with real‑time anti‑mining protection (e.g., 360 Security Guard). Service providers should avoid inserting profit‑driven code and adopt HTTPS to prevent traffic manipulation.

Source: Cloud Tencent (Yun Toutiao)
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Browser SecurityVideo Streamingcrypto miningISP hijackingCoinHivemalicious scripts
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.