Saturday, April 12, 2025
HomeCryptocurrency hackMalware Abuse Google Ads to Injecting Coinhive Cryptocurrency Miner

Malware Abuse Google Ads to Injecting Coinhive Cryptocurrency Miner

Published on

SIEM as a Service

Follow Us on Google News

Cyber Criminals using Malvertising Campaign to inject coinhive Cryptocurrency Miner using Google DoubleClick Ads and deployed it on legitimate websites.

coinhive is a Cryptocurrency miner that mainly using Javascript to the mine cryptocurrency like Menero that runs on user systems while they visit a website.

Attackers now Abusing google DoubleClick ads and running Malvertising Champaign into high traffic website to run the coinhive crypto miner and other web-based miners that connect to some private tools.

- Advertisement - Google News

This Malware detected as JS_COINHIVE.GN and it mainly affected countries include Japan, France, Taiwan, Italy, and Spain.

Security researchers had a close look at 5 malicious domain where the traffic has dramatically increased and finally they confirmed that the traffic coming from DoubleClick advertisements.

Also, There are 2 web miners scripts are running in the malicious webpage and the script displays in the advertisement from DoubleClick.

These affected web pages are showing legitimate Google ads at the time of two web miners performing their task.

Also Read: Coincheck Cryptocurrency Exchange Hacked & Stolen More than $500 Million Worth Currency

How does  Coinhive Cryptocurrency Miner Works

Google Doubleclick advertisement contains javascript code that can generate a random code form 1 to 101.

When Random numbers generate a variable and it will be more than 10, then it will call the script called coinhive.min.js.

It will help to mine almost 80% of CPU Power and later a private web miner will be launched.

According to Trend Micro, after de-obfuscating the private web miner called mqoj_1.js, there will be a JavaScript code that is still based on Cognitive. The modified web miner will use a different mining pool at wss[:]//ws[.]l33tsite[.]info[:]8443. This is done to avoid Coinhive’s 30% commission fee.

So Blocking the JavaScript-based applications from running on browsers can prevent Coinhive miners from using CPU resources.

IOC

SHA256

e72737a8cf29eeae795a3918e56c07b4efa2e9ce241ec56053d6a95f878be231
296d081b6b0a6d1a09b5c54c35392a4d2ea0bec9a0c99e6351374628b713d8ed

 

Malicious domainsAttribution
doubleclick1[.]xyzMalvertising Domain
doubleclick2[.]xyzMalvertising Domain
doubleclick3[.]xyzMalvertising Domain
doubleclick4[.]xyzMalvertising Domain
doubleclick5[.]xyzMalvertising Domain
doubleclick6[.]xyzMalvertising Domain
api[.]l33tsite[.]infoPrivate Webminer Domain
ws[.]l33tsite[.]infoPrivate Webminer Domain

 

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...