Javascript-based cryptocurrency mining script injection

While looking closer at the Showtime embedded cryptocurrency miner mini-scandal, I wondered how many other pages had Coinhive embedded. After a quick Google search, I found several sites that seemed to have the crytocurrency mining code embedded, apparently without the page owners' knowledge, based on the content of the page. The code was embedded within an invisible iframe (a red flag) and the intermediate site that redirected to Coinhive has a history of malware activity. Interestingly, the frame was not always present, forcing a visit to Google's cache:

Presumably compromised site:


Injected frame:

recaptcha-in.pw source code, in its entirety:
We see the call to the Coinhive javascript file (coinhive.min.js). A quick search for the script shows expected results for cryptocurrency mining sites, but also a selection of possibly compromised sites:

  • enrollsa.com/locations
  • eduedgepro.com
  • newmarketcomputerservices.com/slide-page/company/
  • sugar-packed.com
  • arifpuglia.it
  • and many others...
There are a few elements that are always, or nearly always, present besides the script to recaptcha-in.pw:
  • An identifier to Coinhive (pool?): beyOOUUa39A4G1SywiY9I2QPZn3rUTpW
  • A second script calling a javascript file from google-statik.pw
Next post I'll go over the second script, and how related google-statik.pw is to recaptcha-in.pw (spoiler: very).

Comments

Popular posts from this blog

Domain siblings and contents of the second javascript file

Apple Phishing email leads to a fake Apple login page