There were thousands of UK and US government websites mining Monero including UK’s NHS and US’s Court.
It has been raining on cryptocurrency in 2018 especially Bitcoin whose value touched the sky and made people millionaires in days.
It also encouraged hackers and cybercriminals to take advantage of the situation and make easy money but the price for it is being paid by unsuspected users.
UK and US government sites hacked to mine Monero
On February 11th, an IT security researcher Scott Helme discovered that there are over 4,000 government websites that have been hacked to mine Monero cryptocurrency including the official website of American court system (uscourts.gov), the website of U.K.’s Information Commissioner’s Office (ico.org.uk), U.K.’s General Medical Council (GMC), National Health Service (NHS) and United States Social Security Administration.
According to Helme’s blog post, the targeted websites were infected with a malware that has been using the computing power of sites visitors to mine Monero.
Remember, the technique in which websites are compromised to mine cryptocurrency is also known as in-browser cryptojacking in which CPU power of unsuspected website visitors is secretly used by hackers to generate cryptocurrency while users end up with expensive electricity bills.
Hackers hacked Browsealoud plugin to infect govt websites
Upon further digging, Helme found that hackers compromised a popular Browsealoud plugin to make their way into the government websites and infected them with cryptocurrency mining malware.
The Browsealoud plugin helps visitors access content on websites including dyslexia patients, users not familiar with the English language and mild visual impairments.
Hey @texthelp you've been compromised, you need to address this ASAP.
Their site also has the crypto miner running: pic.twitter.com/fl0U9ssZRr
— Scott Helme (@Scott_Helme) February 11, 2018
At the time of publishing this article, HackRead noticed that the Browsealoud plugin was closed on 11th February and itsofficial pageon WordPress now shows the message “This plugin was closed on February 11, 2018, and is no longer available for download.”
Authorities are examining the situation
The British National Cyber Security Centre (NCSC) said that they are familiar with the situation.
According to theirofficial statement:“NCSC technical experts are examining data involving incidents of malware being used to illegally mine cryptocurrency.
The affected service has been taken offline, largely mitigating the issue. Government websites continue to operate securely.
At this stage, there is nothing to suggest that members of the public are at risk.”
Now that the authorities are aware of the situation Helme fears hackers can pull a similar stunt in the future which could be devastating. The news came as a shock since the general perception about government owned websites is that they are secured and scanned for malware and malicious codes by their administrators on regular bases.
Brandon Dixon, VP at digital threat management firm RiskIQ told HackRead “We are seeing threat actors around the world exploiting what is already a hostile currency in a lawless digital world.
Get the Latest from CoinDesk
Threat actors hack vulnerable sites or spin up fake, illegitimate websites to siphon money off of major brands, often with typosquatting domains and fraudulent branding.
By leveraging domains or subdomains that appear to belong to major brands, these actors trick people into visiting their sites running cryptocurrency mining scripts to monetize their content. When we looked at domains running the cryptocurrency mining script Coinhive, we found many examples of typosquatting and domain infringement,”
Cryptocurrency mining is increasing
The IT security community is rightly worried about the sudden surge in cryptocurrency mining attacks.
Digital Coin Miners Hack Plugin That Reads Websites To The Blind
Some are evenconsidering itas a replacement for ransomware. Lately, some high-profile websites and institutions have been found infected with cryptocurrency mining malware includingYouTube, Oracle, BlackBerry, Starbucksand even the Russia based world’s largest oil pipeline companyTransneft.
Screenshot shows YouTube ads were hacked to mine Monero
In December last year, Sucuri security firmidentified 5,000 WordPress websiteswere infected with CoinHive cryptocurrency miner scripts and generating Monero through visitors computing power.
In some cases, researchers have also identified that hackers are using leaked NSA exploits EternalBlue, EsteemAuditandEternalSynergyin their cryptocurrency mining malware which means the worse is still to come.
The full list of infected sites isavailable here.