visitors to pay a cryptocurrency ransomAttack.Ransomhas changed its course . Instead of demanding paymentAttack.Ransomvia Bitcoin , Ethereum , Bitcoin Cash or Litecoin in exchange for not leaking your password on the internet , the site now hijacks your computer ’ s processing power to mine cryptocurrency in the background . Designed as a copy of the Have I Been Pwned attack , the site began by asking users to enter their emails to see if their password has been compromisedAttack.Databreach. Unfortunately , if your password was breachedAttack.Databreach, the site demandedAttack.Ransoma “ donation ” of $ 10 by cryptocurrency to not publish your password in plain text on the web . Up to 1.4 billion passwords may have been breachedAttack.Databreach, but it ’ s unclear how accurate that figure is . However , because it may be easier — and safer — to change your password than pay the ransomAttack.Ransom, as The Next Web noted , the site shifted its focus from demanding ransomware paymentsAttack.Ransomto taking over your PC ’ s processing power to mine for cryptocurrency in the background . The publication also confirmed that the malicious site did “ have a database with legitimate passwords , ” but that not all compromised passwords were stored in plain text . The Next Web did not reveal the site ’ s address in its report , citing security reasons , but noted that it doesn ’ t appear that any user had made payment . This is the latest ransomware in recent months that demandAttack.Ransomcryptocurrency as a form of payment . Prior to this incidentAttack.Ransom, Thanatos encrypted files on a user ’ s PC by hijacking it using a brute force method . If you want to regain access to those files , you had to send paymentAttack.Ransomvia cryptocurrency to get a key to decrypt your files . However , at the time , there didn ’ t appear to be a proper decryption key even if you paid . According to a recent Google report , extortionists made out with $ 25 million in just two years , and cryptocurrency was the preferred way to get paidAttack.Ransom. Hackers are also changing the game when it comes to data theftAttack.Databreach. Rather than leakingAttack.Databreachthe information to the dark markets , an IBM X-Force Intelligence Index report revealed that hackers prefer to hold files hostage in exchange for a ransom paymentAttack.Ransom.