Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the hreflang-tags-pro domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6121
[www-stage.newsbtc.com/news/ai-and-tech/uk-australian-government-websites-cryptojacked-by-mining-malware/amp/]
[wp-includes/functions.php:6121 trigger_error(), wp-includes/functions.php:6061 wp_trigger_error(), wp-includes/l10n.php:1371 _doing_it_wrong(), wp-includes/l10n.php:1409 _load_textdomain_just_in_time(), wp-includes/l10n.php:195 get_translations_for_domain(), wp-includes/l10n.php:307 translate(), wp-content/plugins/hreflang-tags-for-wordpress/includes/variables.php:24 __(), wp-content/plugins/hreflang-tags-for-wordpress/hreflang-tags-pro-main.php:45 include_once('wp-content/plugins/hreflang-tags-for-wordpress/includes/variables.php'), wp-content/plugins/hreflang-tags-for-wordpress/hreflang-tags-pro.php:40 require_once('wp-content/plugins/hreflang-tags-for-wordpress/hreflang-tags-pro-main.php'), wp-settings.php:545 include_once('wp-content/plugins/hreflang-tags-for-wordpress/hreflang-tags-pro.php'), wp-config.php:53 require_once('wp-settings.php'), wp-load.php:50 require_once('wp-config.php'), wp-blog-header.php:13 require_once('wp-load.php'), index.php:17 require('wp-blog-header.php')]

UK, Australian Government Websites Cryptojacked by Mining Malware

UK, Australian Government Websites Cryptojacked by Mining Malware

Hacked

Mining malware is spreading like wildfire, every week now we run another story on some platform or other falling victim to it. As cryptocurrencies become far more lucrative than ransomware or identity theft incidents of exploits will only increase. Various governmental departments in Australia and the UK were found frantically calling the tech guys over the weekend as their websites were compromised.

According to the Guardian as many as 5,000 websites were infected with a variant of the Coinhive mining malware. In the UK they included websites of National Health Services, the Student Loans Company, and several English councils in addition to the UK’s data protection watchdog, the Information Commissioner’s Office. They have all been taken offline to deal with the issue.

Compromised plugin

The malicious miner came from a compromised plugin called BrowseAloud which enables blind and partially sighted people read content on websites. The script had the same operation as has been seen many times before; hijacking the machine’s hardware to mine for Monero. XMR is the number one crypto currency for criminals now since it is encrypted and anonymous leaving no trace to the destination wallets.

Plugin authors, Texthelp, took their own website offline to patch the compromised software;

“The company has examined the affected file thoroughly and can confirm that it did not redirect any data, it simply used the computers’ CPUs to attempt to generate cryptocurrency, The exploit was active for a period of four hours on Sunday. The Browsealoud service has been temporarily taken offline and the security breach has already been addressed,” 

The security consultant who documented the attack told media;

“This type of attack isn’t new – but this is the biggest I’ve seen. A single company being hacked has meant thousands of sites impacted across the UK, Ireland and the United States. There were ways the government sites could have protected themselves from this. It may have been difficult for a small website, but I would have thought on a government website we should have expected these defence mechanisms to be in place.”

Australian government websites using the same plugin were also compromised. They included the Victoria parliament, the Queensland Civil and Administrative Tribunal, the Queensland ombudsman, the Queensland Community Legal Centre, and the Queensland legislation website.

Porn perps

According to researchers at China’s 360Netlab porn websites are responsible for the majority of mining malware on the internet.  It analyzed the relationship between domain names and prevalence of malware that hijacks computer hardware. Unsurprisingly 49% of those domain names containing the malware were porn sites.

Cyber security firm Symantec predicted that in-browser mining would turn into an “arms race” in 2018, brought about as attackers devise even more inventive and invasive ways of mining cryptocurrencies using other people’s hardware and energy.

Exit mobile version