Compromised websites used to mine bitcoins

Posted by   Virus Bulletin on   Dec 13, 2011

In-the-browser botnet turns victims' CPU cycles into cash for the attackers.

Researchers have discovered a compromised website where a piece of JavaScript has been included that is used to mine bitcoins for the attacker.

Bitcoins are a digital currency whose popularity and value have increased significantly in recent years. Bitcoins can be used to make online payments and exchanged for real currency, while new bitcoins can be 'mined' using large amounts of CPU time.

Unsurprisingly, this has attracted the interest of botherders: via the botnets they control, they have access to a lot of CPU time, which can be turned into cash via bitcoin mining. Indeed, in recent months a number of malware samples have been discovered that are capable of using a compromised machine's CPU cycles to mine bitcoins.

In this particular case, however, the mining software is programmed in JavaScript and runs inside the browser of those visiting a compromised website. This in-the-browser botnet does not infect the victim's computer, but it does use their CPU time, which could significantly slow down the machine. The advantage for the attacker is that the mining code is browser- and platform-independent and is less likely to be blocked by security software.

More at the MailChannels blog here.

Posted on 13 December 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.