Sunday, April 13, 2025
HomecryptocurrencyHackers Сovertly Mining Cryptocurrency on Government Websites in India

Hackers Сovertly Mining Cryptocurrency on Government Websites in India

Published on

SIEM as a Service

Follow Us on Google News

Almost all government sites in India have been infected by malware that uses the power of visitors’ computers to extract cryptographic material using the CoinHive script.

India’s official government sites have become the primary target for cryptocurrency, The Economic Times reports. The attack on the computers leads to malware that uses the processing power to extract the cryptocurrency in favor of the attacker, without the knowledge of the computer owner.

A new study by cybersecurity analysts shows that government sites with very high levels of trust have been subjected to web-based injections (code injection), including one of the latter that infected the Andhra Pradesh administration page.

- Advertisement - Google News

The experts identified the infected sites as one of the most visited resources in the country. The government of India confirmed that the attack actually took place, but so far the problem has not been resolved. The volumes of tokens on government sites have also not been disclosed yet.

“Hackers are targeting government sites because these pages have extremely high traffic, which facilitates mining, plus visitors trust the content of the website. It wouldn’t occur to anyone that a provincial or state administration website would contain malicious code. Previously, we watched such sites being cracked; now web injections are in fashion because that’s how an attacker can make a lot of money,” the research authors say.

Along with government domains, CoinHive have infected 119 more Indian sites. The researchers warn that, in addition to these government sites, of particular interest to hackers are sites of illegal video streaming, because while the user watches a movie or series script has the ability to fully load the processor machine. This original idea only confirms that outsourcing in India is not a bad idea.

Hidden mining brings a noticeable profit to cybercriminals. Only a month ago, researchers from RWTH Aachen University, Germany, calculated that the script CoinHive, which infected sites around the world, mines more than 250 thousand USD per month in Monero.

This is mainly done through the process of the hidden use of computing resources on people’s computers without their consent.

Since browser extensions do not require user rights, the software can simply operate in a hidden mode. This results in attackers adding mining functionality to their websites as a means of generating additional revenue.

Although CoinHive is not the only mining extension for a browser, it has been found to have the highest usage share – over 75% of browser usage.

CoinHive does a lot of damage to the industry. The fact that CoinHive is widely used among website owners has a bad impact on the cryptographic industry as a whole. CoinHive script itself is not officially a virus – the authors of this software suggest using extensions as a way to monetize those resources where there is no advertising.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted...

20-Year-Old Scattered Spider Hacker Pleads Guilty in Major Ransomware Case

A 20-year-old Noah Urban, a resident of Palm Coast, Florida, pleaded guilty to a...

Malicious Python Packages Target Popular Cryptocurrency Library to Steal Sensitive Data

In a recent development, the ReversingLabs research team has uncovered a sophisticated software supply...