Saturday, May 24, 2025
HomeCryptocurrency hackWikipedia Page Linked with "Minr" Cryptojacking Malware Infected 3rd Party Website

Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website

Published on

SIEM as a Service

Follow Us on Google News

Cryptojacking Malware called Minr infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR).

Wikipedia visitors who visiting the concern page and once a user clicks the link that pointed to the Malware infected website, the malicious script will be executed and visitor infected with “Minr” crypto-jacking malware.

Researchers found that many of the websites are running with an obfusticated script that infected to perform various malicious activities.

- Advertisement - Google News

One of the infected site using a malicious HTML code that was generated by the well-known JJEncode obfuscator which is one of the popular for encrypting malicious code.

A few months ago, researchers discovered that  JJEncode obfuscator was once again in use: Minr cryptominer.

Description of the cryptojacking malware

Also, it begins used with many of the websites including web.clod[.]pw and Stati[.]bid.

Once the injected script was deobfuscated and analysis done by the sucuri Security researchers Reveals that malware had begun loading the Minr Malware from   web.stati[.]bid.

Past few years Cryptocurrency mining is a very easy method for cybercriminals to Generating the huge revenue by hijacking the Web- browser and injecting the malicious script and taking control of the CPU Usage from the Victims.

Mining cryptocurrencies in a legitimate way are quite resource consuming process, so attackers demanding ransom payments and infecting other computers to mine the cryptocurrencies.

Also Read:  Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents

Cryptojacking Malware Linked With Wikipedia Page

Recently a Wikipedia page reverting a series of edits that was linked with the 3rd party site which infected with Minr malware.

One of the Wikipedia users Discovered that two serious of Wikipedia Edits was intended to link with malware site and he discussed whether the incident required the attention of Wikipedia administrators.

A Wikipedia User Edit the page about ‘Feminist views on transgender topics” and added a malicious third party link that involved to mining Monero.

This Incident has occurred on February 2nd and the same day  Minr cryptominer used  stati[.]bid the domain was registered.

According to Sucuri, The third-party site happened to be infected with the stati[.]bid malware, and another user who reviewed the edits a few hours later noticed the infection, reverted the changes, contacted the author of the changes and solicited advice in the Wikipedia:Teahouse.

Later it was concluded that there was no intention to linked with infected third party site and the pointed Wikipedia Page.

this type of attack primarily impacts WordPress sites where the obfuscated Minr miner is injected at the very top of the active theme’s header.php file. Sucuri Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by...

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...