Over this past weekend, US and UK government websites and reportedly, thousands of others worldwide, have been exploited by a malware that hijacks visitors’ computers to mine cryptocurrency.
The hacked websites included the UK Information Commissioner’s Office (ico.org.uk), UK Student Loans Company, Barnsley Hospital, and the website for the American court system (uscourts.gov).
The malware has been first detected by Scott Helme, an Information Security Consultant from the UK. In an online post, Helme said the malware had now been disabled.
The malware, called Coinhive, leveraged the victims’ devices to generate the cryptocurrency Monero by performing mining calculations.
The Monero startup subsequently closed its website, and was in maintenance mode. The site seems to be operational at the time of writing this post.
The maker of the plug-in, Texthelp, confirmed that its product was breached for four hours by the mining malware.
Recently, there has been a noticeable uptick in cyberattacks focused on cryptocurrency-mining malware that without authorization takes advantage of available CPU resources to make money.
Just last month, cybersecurity firm CrowdStrike highlighted the rise of malicious cryptocurrency mining, a relatively new type of crypto attacks. The startup wrote that it “expects to see much more” of this activity in 2018.
According to a November 2017 report, Coinhive has become the sixth most common form of malware. It has previously been discovered in Google ads, the Ultimate Fighting Championship website, and TV network Showtime, among many others.
Image credit: Scott Helme. White text is the original code and purple text is the code injected by the attacker
Sign up for our newsletter
and don't miss out great opportunities to monotize on your bitcoin