
Caution: Miners on JavaScript can now be embedded in advertisements that YouTube and other ad networks show you. This was reported by
several sources .
The first to report a problem on Twitter were users whose antiviruses were able to detect crypto miners.
The attackers used the services of the Coinhive service, which provides the ability to use public JavaScript code from the site for mining on other people's computers. At the same time, user processors were loaded with miner up to 80%.

The attack was made through the advertising service Google DoubleClick. According to Trend Micro, due to the shown advertising, the number of web miners in the network for a while has tripled. In some cases, users in addition to the JS Miner also displayed ads for fake anti-virus - and the Coinhive user with the
h7axC8ytzLJhIxxvIHMeC0Iw0SPoDwCK key is responsible for this advertisement.
')
Google representatives admitted that recently, unscrupulous partners have been trying to regularly put up such advertising, but I’m trying to fight it actively, and it was this malicious ad that was removed just two hours after launch. However, user testimonies indicate that advertising was shown for at least a week - according to Trend Micro, the miner code has been actively working since January 18.
The idea of attacking YouTube is related to the fact that users spend a long time on the site, so in the near future we can expect similar on other services aimed at content consumption.