Coinhive Code has Been Involved in Another Cryptojacking Campaign

Another case of Cryptojacking

0 368

A cryptocurrency mining code belonging to Coinhive has been detected in more than 300 websites mainly belonging to governments and Universities worldwide. The detection was reported by a cyber-security researcher Troy Mursch on May 5th. The report indicated that all the affected websites use a vulnerable version of the Drupal content management system.

The researcher said that he was alerted to this campaign through an attack on the websites of San Diego Zoo and also the government of Chihuahua, Mexico. Both websites were attacked on the same day with Coinhive being injected into their JavaScript.

Coinhive was created to mine Moreno through web browser, and it’s marketed to website owners as a form of monetization instead of the online advertising. This is a very serious case of cryptojacking where other people’s devices are used to mine cryptocurrency without their knowledge. This specific case had affected 348 websites including websites of The National Labor Relations Board, the Lenovo user account website and that of US federal agency.

According to the discovery the affected site domains are mainly in the United States and are mainly hosted by Amazon. Since 2017 when Coinhive was created, it has had many malicious deployments making it the most wanted malware according to a report published in January this year. The miner has also been used as an alternative doe online ads which make it less malicious but still misleading by well-known brands like Salon and The Pirate Bay.

Cryptojacking is becoming very common. The biggest incidence was in January this year, and it affected 55 percent of the online businesses including YouTube to unknowing run crypto miners on websites through the Google DoubleClick ads platform. The January report also indicated that 90 percent of the ads were using the Coinhive miner. The miner is said to be a threat to the cryptocurrency market.

You might also like