Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
More than 300 websites that use the Drupal content management system were infected with Coinhive, a JavaScript software used to remotely mine Monero through a website visitorâs browser. Among others, the afflicted websites were those for the San Diego Zoo, the government of Chihuahua, Mexico, UCLA, Lenovo, and the U.S. Equal Employment Opportunity Commission. You can find a comprehensive list of affected websites here.
As of May 8, Coinhive has terminated the site key used to infect the websites and the cryptojacking campaign has since subsided.
Troy Mursch, security researcher at Bad Packets, unearthed the widespread infestation. He first found evidence of the cryptojacking on the San Diego Zooâs website, discovering a trace of the same JavaScript library (jquery.once.js?v=1.2) embedded in the Chihuahuan governmentâs website code, as well. Mursch followed this breadcrumb trail back to vuuwd.com, the domain used to inject the malware.
After further investigation, Mursch found that the same domain and the Coinhive site key, KNqo4Celu2Z8VWMM0zfRmeJHIl75wMx6, were used to infect a total of 348 websites. To pair down his search, Mursch used proprietary tools developed by Dan Snider and PublicWWW.com, âa source code search engine that allows you to quickly locate potentially affected websites,â he told CoinCentral.
âGiven that Coinhive is just JavaScript (that youâll find in the source code of websites), PublicWWW is an excellent resourceâ for snuffing out the software, he continued.
Over 300 websites found in active #cryptojacking campaign targeting vulnerable Drupal sites. Government and university sites affected. Even the San Diego Zoo!https://t.co/dmFXyJZGwD
â Bad Packets Report (@bad_packets) May 6, 2018
All of the affected sites were running the same vulnerable versions of Drupalâs content management system. As such, Mursch implores entities and websites that run Drupalâs system to update to a more robust option immediately.
Cryptojacking, as itâs been branded, the act of infecting websites with mining malware to permisionlessly use visitorsâ computing power to mine cryptocurrencies, has become an increasing topic of cyber security concern. Coinhive, which has been deployed for consensual browser mining by the likes of Salon and UNICEF for charity, specifically mines Monero and has been the go-to for hackers looking to make a quick buck.
While âthe number of sites using Coinhive has declined somewhat since [last year],â Mursch tells us, he and the Bad Packets team âstill find Coinhive being utilized in cryptojacking campaigns as we see with this one targeting vulnerable Drupal sites.â
It can be difficult to tell if a computer has been infected by Coinhive or a related mining malware, but a sluggish operating system and spikes in your computerâs processing power can be sure signs. Downstream fixes can come in the forms of virus scans and wiping your computer of malicious software, but as a preventative measure, you can download the minerBlock browser extension for Chrome to reinforce your computer against cryptojacking attempts.
You can find Troy Murschâs original report on the findings here.
Â
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.