<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>coinhive Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/coinhive/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 02 Aug 2018 14:59:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Cryptojacking Campaign Infected 170,000 MikroTik Routers</title>
		<link>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/</link>
					<comments>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Thu, 02 Aug 2018 14:59:06 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[coinhive]]></category>
		<category><![CDATA[coinhive script]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[mikrotik]]></category>
		<category><![CDATA[mikrotik routers]]></category>
		<category><![CDATA[mikrotik vulnerability]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=5104</guid>

					<description><![CDATA[<p>Cryptocurrencies have to be mined before they’re added in the system. In this attempt, there are a number of people who invest on a large amount of hardware and mine for themselves. Hackers are also in need of money, so they also choose mining as a great source for their income. Unfortunately, in most cases, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/">Cryptojacking Campaign Infected 170,000 MikroTik Routers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptocurrencies have to be mined before they’re added in the system. In this attempt, there are a number of people who invest on a large amount of hardware and mine for themselves. Hackers are also in need of money, so they also choose mining as a great source for their income.</p>
<p>Unfortunately, in most cases, the hackers use others’ hardware for making money for themselves. Recently, security researchers discovered a massive cryptojacking campaign that targets and infects MikroTik routers with a copy of the Coinhive in-browser mining script. As you can tell, Coinhive mining script is one of the most popular in-browser mining scripts of all times.</p>
<p>The campaign appears to have started this week and at the first stage, was mainly active in Brazil. However, as its next target, it started infecting MikroTik routers all over the world.</p>
<p>A Brazilian researcher (<a href="https://twitter.com/malwarehunterbr?lang=en">@MalwareHunterBR</a>) identified the attacks first. The attack continued growing infecting more and more routers and got the attention of Simon Kenin – a security researcher from Trustwave’s SpiderLabs division.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">another mass exploitation against <a href="https://twitter.com/mikrotik_com?ref_src=twsrc%5Etfw">@mikrotik_com</a> devices (<a href="https://t.co/4MxQbnNStA">https://t.co/4MxQbnNStA</a>)<br />
hxxp://170.79.26.28/<br />
CoinHive.Anonymous(&#8216;hsFAjjijTyibpVjCmfJzlfWH3hFqWVT3&#8217;, <a href="https://twitter.com/hashtag/coinhive?src=hash&amp;ref_src=twsrc%5Etfw">#coinhive</a> <a href="https://t.co/Nr8MA0TbzY">pic.twitter.com/Nr8MA0TbzY</a></p>
<p>— MalwareHunterBR (@MalwareHunterBR) <a href="https://twitter.com/MalwareHunterBR/status/1023893755974352896?ref_src=twsrc%5Etfw">July 30, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<h1>Numbers of infected routers</h1>
<p><img loading="lazy" class="wp-image-5107 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/200000.gif" alt="" width="621" height="242" /></p>
<p>In a <a href="https://www.trustwave.com/Resources/SpiderLabs-Blog/Mass-MikroTik-Router-Infection-%E2%80%93-First-we-cryptojack-Brazil,-then-we-take-the-World-/">report from Trustwave</a>, Kenin mentioned that the hacker(s) behind the campaign successfully compromised at least 72,000 MikroTik routers at the first stage of attack in Brazil.</p>
<p>But at the second stage, it attacked and infected more and the total number rose up to 170,000.</p>
<p><em><strong>Update</strong></em>: Using a different Coinhive key, a new campaign of similar type was ongoing. It&#8217;s not sure whether the attacker is the same or another one. In total, the number is about 200,000 of infected routers.</p>
<h1>Infection method</h1>
<p><img loading="lazy" class="size-full wp-image-5106 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/router-infected.png" alt="" width="768" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/08/router-infected.png 768w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-696x696.png 696w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-420x420.png 420w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>Kenin also said that the hacker(s) take the advantage of a zero-day vulnerability in the Winbox component of MikroTik routers. This vulnerability was first discovered back in April this year and MikroTik fixed the problem within 24 hours. However, this doesn’t mean that all the owners of the routers took the necessary steps to apply the required patch.</p>
<p>The zero-day was dissected by a number of security researchers and in GitHub, there are public proof-of-concept codes available. Check out proof-of-concept <a href="https://github.com/mrmtwoj/0day-mikrotik">1</a> and <a href="https://github.com/BasuCert/WinboxPoC">2</a>.</p>
<p>According to Kenin, the attacker(s) took the advantage of the public codes for altering traffic passing through the router and inject a copy of Coinhive library inside all the pages that passed through the router.</p>
<p>It’s only one threat actor, according to what information was found about the attacking. All the script shared the same Coinhive key.</p>
<h1>Other users infected</h1>
<p>Kenin says that he was able to identify where some non-MikroTik users were also impacted. It happened because some Brazilian ISPs were using MikroTik as their main network and thus, the attacker(s) successfully injected malicious Coinhive mining script in a massive amount of web traffic.</p>
<p>The attacker is also smart enough to decrease the surface of the attack. If users would get a lot of trouble visiting sites, both the ISPs and users would perform investigation on what’s going on. Recently, the attacker(s) switched tactics and only injecting the scripts in error pages returned by routers.</p>
<p>This doesn’t have a downfall for the attacker as it seems. Kenin said that in recent days, he noticed the attack spreading all over the world and infected nearly as much as 170,000 MikroTik routers.</p>
<p>Thus, even if the attacking surface is only limited to error pages, there are potentially millions of daily pages for the attacker.</p>
<h1>How to stay safe</h1>
<p>If you own a MikroTik router, it’s a must that you have to <a href="https://wiki.mikrotik.com/wiki/Manual:Upgrading">upgrade your router’s firmware</a>. Don’t forget to apply all the available patches as well.</p>
<p>It’s also recommended to reset the router to system default beforehand so that it will remove any possible malicious code present in the system.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/">Cryptojacking Campaign Infected 170,000 MikroTik Routers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Stop Hackers from Mining Cryptocurrency on Your PC</title>
		<link>https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/</link>
					<comments>https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Sat, 03 Feb 2018 05:45:04 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[coinhive]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[miner]]></category>
		<category><![CDATA[zealot]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1709</guid>

					<description><![CDATA[<p>Cryptocurrency is a critical system of currency that works completely digital. The system is open-source and available for all but also ensures anonymity very easily. Recently, cryptocurrency miners are being loaded into web browsers that use your CPU power to mine different cryptocurrencies. What is cryptocurrency mining Before you understand how serious this issue is, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/">How to Stop Hackers from Mining Cryptocurrency on Your PC</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptocurrency is a critical system of currency that works completely digital. The system is open-source and available for all but also ensures anonymity very easily. Recently, cryptocurrency miners are being loaded into web browsers that use your CPU power to mine different cryptocurrencies.</p>
<h3>What is cryptocurrency mining</h3>
<p>Before you understand how serious this issue is, you have to realize how cryptocurrency works. Let’s start with Bitcoin, the most popular cryptocurrency of all. The total possible number of available Bitcoin is 21 million – nothing more. But not all the coins currently exist – they have to be mined by solving different math puzzles with the help of computers. This method requires a huge hardware resource to calculate and solve all the puzzles. The solver gets Bitcoin as a reward. Mining requires an algorithm and a computer to run the algorithm.</p>
<p>Websites now use your web browser to run that algorithm and your hardware to perform the heavy job. This process is called “cryptojacking”. Many websites are using this method to earn some extra money. The perfect example is CoinHive. It uses a JavaScript tool to mine on your browser.</p>
<h3>Cryptojacking</h3>
<p>Why is cryptojacking bad? Well, it’s a controversial topic. Some think it’s okay, some think it’s bad. However, it’s a bad trait overall. Normally, cryptocurrency mining methods are HEAVILY resource-hungry. It forces your processor to work on overload and using more power. This overload work is dangerous for hardware like CPU – the more work, the more heat generation that gradually leads to permanent damage. Moreover, when browsing the website, your other works will become very slow as your CPU is busy in mining.</p>
<p>There are different websites that use such mining tool on their website. For example, The Pirate Bay (caution – it’s a torrent website with illegal content) is a torrent site. They integrated the CoinHive JavaScript to run in the web browsers of its viewers. They claim that it’s their alternative method to earn some extra money instead of showing the annoying ads. It’s the first popular website that took this measure.</p>
<p>Why would you burn your PC? There’s no need for such an overload on your computer. Cryptocurrency mining is so resource-hungry that there are numerous different mining hardware available that are specially designed for mining. PC is never a suitable solution for mining.</p>
<h3>How to stay secured</h3>
<p>By far, CoinHive is the most popular miner that websites use. However, other mining tools are always floating in websites. For blocking such heinous tools, you can use several methods.</p>
<ul>
<li><strong>Install Adblock</strong> – It’s one of the most popular extensions for all the browsers. There’s a default cryptocurrency blocking method available. The extension is available for Chrome, Firefox, Opera, Safari, and Edge. <a href="https://getadblock.com/">Get Adblock</a>.</li>
<li><strong>Use a security solution</strong> – Security vendors are always checking the web for cyber issues. By default, a security software will block the mining tool from the web. CoinHive successfully fooled a few security software, but all the companies are always evolving to defend the latest threats. Check out the <a href="https://www.osradar.com/best-antivirus-software-2018/">top 10 security solutions</a>.</li>
<li><strong>Block CoinHive</strong> – CoinHive is the most popular one in such actions. The file that is used can be blocked using custom filters. Block “coin-hive.com/lib/coinhive.min.js” <a href="https://adblockplus.org/en/filters#basic">using Adblock Plus</a>.</li>
</ul>
<h3>The bottom line</h3>
<p>Fortunately, the tool doesn’t steal sensitive info. Recently, other malicious miner tools are affecting PCs. Zealot is one of them. Learn more <a href="https://www.osradar.com/zealot-new-spooky-cryptocurrency-miner/">how to stay protected from Zealot</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/">How to Stop Hackers from Mining Cryptocurrency on Your PC</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
