Compromised websites used to mine bitcoins

Posted by   Virus Bulletin on   Dec 13, 2011

In-the-browser botnet turns victims' CPU cycles into cash for the attackers.

Researchers have discovered a compromised website where a piece of JavaScript has been included that is used to mine bitcoins for the attacker.

Bitcoins are a digital currency whose popularity and value have increased significantly in recent years. Bitcoins can be used to make online payments and exchanged for real currency, while new bitcoins can be 'mined' using large amounts of CPU time.

Unsurprisingly, this has attracted the interest of botherders: via the botnets they control, they have access to a lot of CPU time, which can be turned into cash via bitcoin mining. Indeed, in recent months a number of malware samples have been discovered that are capable of using a compromised machine's CPU cycles to mine bitcoins.

In this particular case, however, the mining software is programmed in JavaScript and runs inside the browser of those visiting a compromised website. This in-the-browser botnet does not infect the victim's computer, but it does use their CPU time, which could significantly slow down the machine. The advantage for the attacker is that the mining code is browser- and platform-independent and is less likely to be blocked by security software.

More at the MailChannels blog here.

Posted on 13 December 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.