Attacks/Breaches

2/21/2018
10:14 AM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

7 Cryptominers & Cryptomining Botnets You Can't Ignore

Cryptominers have emerged as a major threat to organizations worldwide. Here are seven you cannot afford to ignore.
2 of 8

Coinhive
Coinhive is a cryptocurrency miner deployed on thousands of websites around the world - some with the knowledge and permission of the site owners, but often without their knowledge. It is designed to mine for the Monero cryptocurrency by surreptitiously hijacking the computing resources of the systems being used by visitors to these sites.
Coinhive by itself is not malicious. In fact, Coinhive.com has been making the miner available to website owners so they can run it in the browsers of users to their sites and make some Monero in return for giving users an ad-free experience. But multiple security vendors have begun blocking Coinhive because many site owners have been running the miner without informing users about it.
Cybercriminals too have been indiscriminately embedding the miner on thousands of websites without the knowledge of the site owners. Check Point Software Technologies has estimated that in January 2018 a staggering 23% of organizations worldwide were impacted by Coinhive.
Coinhive's in-browser JavaScript mining code was also secretly loaded into 19 Android apps sold on the Google Play store. One was installed on 100,000 to 500,000 devices, says Taylor Armerding, senior security strategist at Synopsys.
'RiskIQ crawling data found upwards of 50,000 websites with Coinhive either embedded directly into them or injected via a compromised third-party component, such as Texthelp, in the past year,' says Vamsi Gullapalli, product manager at RiskIQ, citing recent data. Many of them were likely embedded without the original owner's knowledge, he says.

Image Source: JK21 via Shutterstock

Coinhive

Coinhive is a cryptocurrency miner deployed on thousands of websites around the world - some with the knowledge and permission of the site owners, but often without their knowledge. It is designed to mine for the Monero cryptocurrency by surreptitiously hijacking the computing resources of the systems being used by visitors to these sites.

Coinhive by itself is not malicious. In fact, Coinhive.com has been making the miner available to website owners so they can run it in the browsers of users to their sites and make some Monero in return for giving users an ad-free experience. But multiple security vendors have begun blocking Coinhive because many site owners have been running the miner without informing users about it.

Cybercriminals too have been indiscriminately embedding the miner on thousands of websites without the knowledge of the site owners. Check Point Software Technologies has estimated that in January 2018 a staggering 23% of organizations worldwide were impacted by Coinhive.

Coinhive's in-browser JavaScript mining code was also secretly loaded into 19 Android apps sold on the Google Play store. One was installed on 100,000 to 500,000 devices, says Taylor Armerding, senior security strategist at Synopsys.

"RiskIQ crawling data found upwards of 50,000 websites with Coinhive either embedded directly into them or injected via a compromised third-party component, such as Texthelp, in the past year," says Vamsi Gullapalli, product manager at RiskIQ, citing recent data. Many of them were likely embedded without the original owners knowledge, he says.

Image Source: JK21 via Shutterstock

2 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/27/2018 | 7:48:20 PM
Mining Resources-Not Surprised
As someone who mines as a hobby I am not surprised. Resources to generate sustainable profit require heavy resources. GPU rigs, that are inflating the prices of dedicated GPU's, mine those hash values somewhat slowly. Utilizing botnets you can maximize your resources even if the targeted hosts have sub-optimal specificiations. Also, since the price of BTC is above 10K currently utilizing the malicious method can be effective from a mining perspective, though deplorable from an ethics perspective. But something tells me those individuals do not care too much in that regard.
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.
CVE-2018-18377
PUBLISHED: 2018-10-16
goform/setReset on Orange AirBox Y858_FL_01.16_04 devices allows attackers to reset a router to factory settings, which can be used to login using the default admin:admin credentials.
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.