U.S. & UK Govt Sites Injected With Miners After Popular Script Was Hacked

Faybert

Level 24
Thread author
Verified
Top Poster
Well-known
Jan 8, 2017
1,318
Thousands of sites were injected with a in-browser Monero miner today after a popular accessibility script was compromised. With 4,275 sites affected, this included government websites such as uscourts.gov, ico.org.uk, & manchester.gov.uk.

This was first noticed earlier this morning by infosec consultant Scott Helme when he saw that UK government site ico.org.uk was utilizing the the Coinhive in-browser mining (cryptojacking) script. This caused any visitors to the site to use their CPU to mine for the digital currency called Monero.

When Helme investigated further he saw that it wasn't just this site that started injecting a Coinhive miner, but many other government sites from numerous countries such as uscourts.gov, gmc-uk.gov, nhsinform.scot, manchester.gov.uk, and many more.


https://twitter.com/Scott_Helme/status/962684239975272450
Scott Helme

✔@Scott_Helme


Ummm, so yeah, this is *bad*. I just had @phat_hobbit point out that @ICOnews has a cryptominer installed on their site...
1f62e.png


11:46 AM - Feb 11, 2018
Twitter Ads info and privacy


The one thing all of these sites had in common was that they utilized a popular text-to-speech accessibility script called BrowseAloud by TextHelp.com. When Helme examined the BrowseAloud script, he saw that this script contained obfuscated code that was injecting the Coinhive miner into all of these websites.

obfuscated-script.jpg

Obfuscated BrowseAloud Script
When decoded, this script injects the Coinhive cryptojacking script, runs it at 40% CPU utilization, and mines for the 1GdQGpY1pivrGlVHSp5P2IIr9cyTzzXq Coinhive account.

Knowing that it was a compromised BrowseAloud script that was injecting the miner, Helme was able to quickly track the script to 4,275 sites that were affected in the incident.

After alerting TextHelp.com about their compromised script, the CTO of TextHelp stated that the script was taken down and would not be enabled again until after an investigation took place.

taken-down-script.jpg

Disabled BrowseAloud Script
BleepingComputer reached out to TextHelp for more information but had not heard back from them at the time of publishing this article. According to a recently published post by TextHelp, the company has stated that an attacker compromised the BrowseAloud script, but no other TextHelp services were affected.

At 11:14 am GMT on Sunday 11th February 2018, a JavaScript file which is part of the Texthelp Browsealoud product was compromised during a cyber attack. The attacker added malicious code to the file to use the browser CPU in an attempt to illegally generate cryptocurrency. This was a criminal act and a thorough investigation is currently underway.

CSP + SRI can protect sites from these types of attacks
Helme told BleepingComputer that a good way for sites to protect themselves from attacks like this is to use CSP+SRI.

SRI, or Subresource Integrity, is when a site owner specifies a hash for a particular script that they are loading on a site. Before the browser loads the script, it checks the hash of the script and compares it to the one listed on the site. If it matches, then the script is loaded. If the script has been modified, though, then the script will be blocked from loading.

If you use CSP, or Content Security Policy, you can take it one step further by forcing the browser to require all scripts to have a SRI hash associated with them. If a script does not have an assigned hash, it will simply be blocked from loading by the browser.

Helme has an article on this subject and how to use it for those who are interested.

The only downside with this approach is that it could cause a bit more administration for a web site owner as they would need to keep track of external scripts that they use and when they get modified. If a 3rd party script is being used and is commonly modified, then you will need to make sure to update your SRI hashes for each new update.

While some may not want to deal with the extra work required to securing scripts like this, it is always important to remember that security is hard, but repairing a tarnished reputation is harder.

UK National Cyber Security Centre (NCSC) have also started an investigation into the incident.

This is also not the first incident where a hacked website widget has been used to spread a cryptojacking script. Last November, miscreants compromised the LiveHelpNow live chat widget to deploy Coinhive on 1,500+ sites.
 
Last edited:
D

Deleted member 65228

They're lucky it was only crypto-currency mining, this could have played out drastically worse. Imagine if ransomware was pushed via the compromised websites, that'd be ridiculously atrocious for innocent viewers seeking guidance/help/general research on such high-value websites.

Whichever people were responsible, they are in some deep manure now - whether they directly or indirectly meant for a government website to become compromised, and regardless of the damage, I am sure they'll be punished severely for it if they are caught.

There's a huge rise in crypto-currency mining attacks, with Win32-based malware as we as online websites.

Nasty.
 

MeltdownEnemy

Level 7
Verified
Well-known
Jan 25, 2018
300
The same thing happened to me, myself have discovered dozens of my favorite websites doing dirty coinhiver script, later I bring them to light through within his their social space meeting point (FB-TW) in front of the cyber-comunity, People have to be wise up, do not overlook. run the alert voice in streaming portals, and social websites. severals people it's being naive, believing that the pc is drowned by other causes. accuse them, because this is an offence.
 

upnorth

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,459
Samsung’s now making chips designed for cryptocurrency mining

Quote : " Samsung has confirmed it’s in the process of making hardware specially designed for mining cryptocurrencies like Bitcoin and Ethereum. A spokesperson for the firm told TechCrunch: “Samsung’s foundry business is currently engaged in the manufacturing of cryptocurrency mining chips. "

WZnUNLMo_o.jpg
 

Mahesh Sudula

Level 17
Verified
Top Poster
Well-known
Sep 3, 2017
818
Crypto mining may get much more powerful if Eugene join them ;)

Russian Stealers:ROFLMAO:
I already suspect they might be in back Ground:barefoot:
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top