Saturday, April 5, 2025
HomeCyber AttackCryptojacking Campaign Infected Online Thesaurus With Over 5 Million Visitors

Cryptojacking Campaign Infected Online Thesaurus With Over 5 Million Visitors

Published on

SIEM as a Service

Follow Us on Google News

Students, authors, and anybody else wishing to improve their vocabulary and language abilities frequently utilize Thesaurus, one of the well-known platforms with 5 million monthly visitors.

Cybersecurity analysts at Group-IB recently found a cryptojacking scheme on a popular Thesaurus site, infecting visitors with malware to mine cryptocurrency and potentially deploy more harmful software.

Group-IB’s 24/7 monitoring spotted malicious archives flagged by Group-IB MXDR, revealing a surge in malware across multiple customer companies with unusual archive names like ‘chromium-patch-nightly.00.[0-9]{3}.[0-9]{3}.zip.’ 

However, the commonality suggested a shared source and unconventional attack.

Cryptojacking Campaign

The malicious archives were sent to Group-IB’s Malware Detonation Platform, where they were analyzed in a secure virtual environment. The archives contained a dropper installing XMRig Coinminer, used for Monero cryptocurrency mining, known for its anonymity features.

Analysts used MXDR’s EDR module to pinpoint the archive source, discovering they were downloaded to the Downloads folder on affected workstations.

Full path to the downloaded archive (Source – Group-IB)

Since the Downloads folder is commonly used for downloads, specialists examined browser history using a built-in Group-IB EDR feature, extracting artifacts to trace the malicious sample’s source.

Forensic data collection (Source – Group-IB)

Group-IB analysts traced a sneaky infection chain, where visiting the thesaurus website led to automatic malicious archive downloads. Intriguingly, the mischief avoided the antonyms section. 

After analyzing with Group-IB Malware Detonation, they checked for dropper activity using Header.ImageFileName filter, finding traces but no actual launch.

Group-IB found no host launches for the downloaded dropper and promptly alerted customers, offering context and prevention tips in the MXDR system’s incident comments section.

Specialist’s comment (Source – Group-IB)

Confirmation from the Malware Detonation Platform instantly neutralizes the threat of the archived file, with Group-IB MXDR’s EDR agent auto-blocking and quarantining malicious files. It also shares malicious file hashes, impacting other customers’ blocklists, even if they never had the file.

Millions trusted the renowned thesaurus site, but it housed a miner, exposing the myth that popular sites are safe. Threat actors used well-known tactics, including drive-by downloads and social engineering via a fake error page.

Recommendations

Here below we have mentioned all the recommendations:-

  • Make sure to keep the operating system and other software updated.
  • Always stick to official sources for software and updates.
  • Monitor workstation resource usage for cryptominer signs through Task Manager or similar tools when CPU/GPU usage spikes unusually.
  • Employ EDR solutions to stop malicious downloads and prevent attacks at the earliest stage.
  • Safely analyze suspicious files with advanced Malware Detonation Platforms.
Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Use URL Shorteners and QR Codes in Tax-Themed Phishing Attacks

As the United States approaches Tax Day on April 15, cybersecurity experts have uncovered...

Hackers Exploit Fast Flux to Evade Detection and Obscure Malicious Servers

Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed...

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies...