January 28, 2026

Capitalizations Index – B ∞/21M

Hackers Injected Cryptocurrency Mining Malware into 4,275 Government Websites — They Only Made $24

Hackers injected cryptocurrency mining malware into 4,275 government websites — they only made $24

Hackers Injected Cryptocurrency Mining Malware into 4,275 Government Websites — They Only Made $24

Hackers injected cryptocurrency mining malware into 4,275 government websites — they only made $24
Advertisement

Get Trading Recommendations and Read Analysis on Hacked.com for just $39 per month.

Earlier this week, hackers infiltrated Browsealoud, a free text-to-translation tool, and injected the Coinhive cryptocurrency mining malware script into the tool’s JavaScript codebase.

Consequently, the estimated 4,275 websites using Browsealoud — including some operated by government agencies in the US and UK — became unwitting pawns in a cryptocurrency mining malware gambit, believed to be the largest-scale attack of its kind.

When users visited the website, the Coinhive mining script automatically began harnessing the visitor’s computer processing power to mine anonymity-centric cryptocurrency Monero.

However, perhaps due to the massive scale of the breach — and the fact that it targeted prominent government websites — the exploit was quickly discovered, and by the end of the day, Browsealoud creator Texthelp had suspended the service.

“In light of other recent cyber attacks all over the world, we have been preparing for such an incident for the last year. Our data security action plan was actioned straight away and was effective, the risk was mitigated for all customers within a period of four hours,” said Martin McKay, CTO of Texthelp, in a statement.

Because the malware was deployed for such a brief period, the hackers made off with an incredibly paltry sum. Coinhive’s creators told Motherboard that only 0.1 XMR was mined as a result of the hack, netting the hackers a grand total of $24.

Despite all the negative press, Coinhive’s developers maintain that plugin was developed for the legitimate purpose of allowing website owners to replace advertising revenue with in-browser mining, and it claims that its most prolific users are not using it for nefarious purposes.

“Our strongest users have all embedded Coinhive in a meaningful way. They incentivise their users to run the miner and grant rewards for it,” the tool’s creator told Motherboard.

Yesterday, for instance, progressive news outlet Salon began serving ad-blocking readers with the option to either disable the ad-blockers or allow the website to run Coinhive in their browsers.

However, other website operators have quietly added Coinhive without their users’ consent, and many more have adopted it unwittingly through incidents similar to the Browsealoud hack.

Just this week, anti-malware software developer Malwarebytes uncovered a scheme in which millions of Android devices were hijacked and served with Coinhive’s cryptocurrency mining malware scripts.

Featured image from Shutterstock.

Follow us on Telegram.
Advertisement

Published at Fri, 16 Feb 2018 13:01:50 +0000

bitcoin Crime

Previous Article

RT @BitfuryGeorge: Its ironic to see 99% of those attacking bitcoin come from the 1% “priviledged class” … My sense they understand for m…

Next Article

Cheap Cryptocurrency Coin with MASSIVE potential

You might be interested in …

Remember kodakcoin? Ico fundraising to kick off this month

Remember KodakCoin? ICO Fundraising to Kick Off This Month

Remember KodakCoin? ICO Fundraising to Kick Off This Month Advertisement Join our community of 10 000 traders on Hacked.com for just $39 per month. The team behind Kodak’s blockchain-based image rights management platform has announced […]