US and UK government computers hijacked by cryptocurrency-mining malware

Over this past weekend, US and UK government websites and reportedly, thousands of others worldwide, have been exploited by a malware that hijacks visitors’ computers to mine cryptocurrency.

The hacked websites included the UK Information Commissioner’s Office (ico.org.uk), UK Student Loans Company, Barnsley Hospital, and the website for the American court system (uscourts.gov).

The malware has been first detected by Scott Helme, an Information Security Consultant from the UK. In an online post, Helme said the malware had now been disabled.

The malware, called Coinhive, leveraged the victims’ devices to generate the cryptocurrency Monero by performing mining calculations.

The Monero startup subsequently closed its website, and was in maintenance mode. The site seems to be operational at the time of writing this post.

As an article on TechCrunch explains, “In order to get the crypto-mining software onto unsuspecting computers, the hack targeted an accessibility plugin called Browsealoud that makes the web easier to use for people with dyslexia or low English comprehension. After compromising Browsealoud, the hackers altered the plugin’s code, injecting malicious JavaScript in order to secretly run the mining software known as Coinhive on unsuspecting machines.”

The maker of the plug-in, Texthelp, confirmed that its product was breached for four hours by the mining malware.

Recently, there has been a noticeable uptick in cyberattacks focused on cryptocurrency-mining malware that without authorization takes advantage of available CPU resources to make money.

Just last month, cybersecurity firm CrowdStrike highlighted the rise of malicious cryptocurrency mining, a relatively new type of crypto attacks. The startup wrote that it “expects to see much more” of this activity in 2018.

According to a November 2017 report, Coinhive has become the sixth most common form of malware. It has previously been discovered in Google ads, the Ultimate Fighting Championship website, and TV network Showtime, among many others.

Image credit: Scott Helme. White text is the original code and purple text is the code injected by the attacker

Related News

Use Secure and Private ProtonMail for Bitcoin

Users who truly care about their privacy online will find a new offer from Proton Technologies AG an attractive option. ProtonMail is an email

Read-more

MyDFS to change how daily fantasy sports are played, token sale live

With the number of fantasy sports players in North America heading past 60 million, and the industry said to be worth more than $7 billion,

Read-more

BCT – Bridging hedge funds and cryptocurrency with the help of blockchain

Questions about security and regulation have been big pains for the blockchain industry since day one and prevented many institutional

Read-more

Amagi Metals & AnthemVault: precious metals married with cryptocurrency

Amagi Metals is an online precious metals dealer with offices located in Austin, Texas; Bartlesville, Oklahoma

Read-more