
The Coinhive crypto code has been recently detected on more than 300 government and university websites worldwide, cyber security researcher Troy Mursch Saturday, May 5. According to the report, all the affected websites are using a vulnerable version of the Drupal content management system.
As the researcher May 4, he was alerted to this particular campaign via the attack on the websites of the San Diego Zoo, and the government of Chihuahua, Mexico. Both websites reportedly had Coinhive injected into their Javascript libraries in the same way.
Coinhive is a JavaScript program created to mine (XMR) via a web browser. It is to website owners as an alternative form of monetization, instead of online advertising.
According to Mursch, this recent “high-profile” case of – the use of another’s device to mine crypto without their knowledge – infected 348 websites, including such websites as The National Labor Relations Board, a U.S. federal agency, and the Lenovo user account website.
As Mursch discovered, most of affected sites’ domains were in the U.S. and mainly hosted on . The full list of infected websites is to the original report.
Since its creation in 2017, of the Coinhive miner have led to it becoming the number one , according to a Jan. 2018 report.
Coinhive has in fact been used as an alternative for online ads, which can be less malicious but still misleading, by high-profile brands such as and .
Back in January, Cointelegraph a massive cryptojacking incident that caused 55 percent of online businesses, including Youtube, to unknowingly run crypto miners on websites via the Google DoubleClick advertising platform. According to the report, 90 percent of the ads were using the Coinhive miner.
Published at Tue, 08 May 2018 14:22:03 +0000
Altcoin[wpr5_ebay kw=”bitcoin” num=”1″ ebcat=”” cid=”5338043562″ lang=”en-US” country=”0″ sort=”bestmatch”]