October 17, 2018 By Shane Schick 2 min read

Security researchers recently observed threat actors burying crypto-mining malware inside compromised websites to hijack victims’ computing resources.

Victims who visited a site infected with the malicious JavaScript code unwittingly unleashed a payload that was hidden within a header file of a WordPress theme, according to researchers from Sucuri.

Although the file itself was legitimate, the code obfuscated the crypto-mining malware and kept it at bay until it confirmed that:

  • The malware wouldn’t be detected via automated scans; and
  • The victim’s device had the central processing unit (CPU) power necessary to mine cryptocurrencies such as bitcoin and Monero.

After the malware confirmed that the infected device met these criteria, it began the mining process.

What Is Crypto-Mining Malware?

Cybercriminals have been using banking Trojans and other tools to mine cryptocurrency since at least 2013, according to the “IBM X-Force Threat Intelligence Index 2018.” One of the most common methods to date has involved mobile apps and websites laden with malicious code hidden inside ads, otherwise known as malvertising.

Coin-stealing has traditionally involved very basic pieces of malware that work over time on a victim’s endpoint. In this recent case, however, researchers were only able to discover the crypto-mining malware after refactoring the code and examining it in detail. Meanwhile, such attacks can drain smartphones, desktops and other systems to enrich the attackers.

How to Keep Crypto-Miners Away From Your Devices

To protect enterprise networks from crypto-mining malware, security experts recommend creating an inventory of all applications in use across the enterprise, then categorizing them by risk attributes, such as whether they are internal or customer-facing.

Security teams should also evaluate applications based on criticality, impact, reputational damage and loss of personally identifiable information (PII), for example. As this incident suggests, however, the impact of a crypto-mining attack could also include loss of computing resources to stealthy cryptocurrency miners.

Source: Sucuri

More from

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything.But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists in…

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

14 min read - This article was made possible thanks to the hard work of writer Charlotte Hammond and contributions from Ole Villadsen and Kat Metrick. IBM X-Force researchers have been tracking developments to the WailingCrab malware family, in particular, those relating to its C2 communication mechanisms, which include misusing the Internet-of-Things (IoT) messaging protocol MQTT. WailingCrab, also known as WikiLoader, is a sophisticated, multi-component malware delivered almost exclusively by an initial access broker that X-Force tracks as Hive0133, which overlaps with TA544. WailingCrab…

Operationalize cyber risk quantification for smart security

4 min read - Organizations constantly face new tactics from cyber criminals who aim to compromise their most valuable assets. Yet despite evolving techniques, many security leaders still rely on subjective terms, such as low, medium and high, to communicate and manage cyber risk. These vague terms do not convey the necessary detail or insight to produce actionable outcomes that accurately identify, measure, manage and communicate cyber risks. As a result, executives and board members remain uninformed and ill-prepared to manage organizational risk effectively.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today