Hackers Target Government Websites For Cryptocurrency Mining

PARIS, FRANCE - FEBRUARY 06: In this photo illustration, a visual representation of digital cryptocurrencies, Bitcoin, Ripple, Ethernum and Litecoin is displayed on February 6, 2018 in Paris, France. The cryptocurrency market has been in trouble since the beginning of the year, because of the fear of a crackdown on regulators and the decline in the volume of trade in Asia. Bitcoin collapses and falls below US Dollars 8,000, half its peak in December, when it exceeded US dollars 19,000 in November 2017. (Photo by Chesnot/Getty Images)

I can see hackers hijacking a LOT of computers this year … for the sole purpose of crypto-mining. 

It’s not just private companies’ websites falling victim to cryptocurrency mining hijacks. Security consultant Scott Helme and the Register have discovered that intruders compromised over 4,200 sites with Coinhive’s notorious Monero miner, many of them government websites from around the world. This includes the US court info system, the UK’s National Health Service and Australian legislatures, among others. The intruders spread their JavaScript code by modifying an accessibility plugin for the blind, Texthelp’s Browsealoud, to inject the miner wherever Browsealoud was in use.

The mining only took place for several hours on February 11th before Texthelp disabled the plugin to investigate. Government sites like the UK’s Information Commissioner’s Office also took pages down in response. As with most of these injections, your system wasn’t facing a security risk — you would have just noticed your system bogging down while searching for government info. The mining goes away the moment you visit another page or close the browser tab. The biggest hassle was for the site operators, who are now discovering that their sites are vulnerable to intruders slipping in rogue code without verification.

It’s not certain who’s behind the attempt, but these hijacks tend to be the work of criminals hoping to make a fast profit.

The big problem: this might continue to happen for a while. Although antivirus tools can catch Coinhive, a more definitive solution would be to use a fingerprinting technique (subresource integrity) that verifies of outside code and blocks any modifications. And there’s no indication that many websites, whether government or private, are in a rush to implement it.

More at Enagdget

Source:  Scott Helme (Twitter)PublicWWW via RegisterTelegraph

 

Videos

00:00
57:52
1/191

Latest Headlines