Friday, December 27, 2024
HomeCryptocurrency hackWikipedia Page Linked with "Minr" Cryptojacking Malware Infected 3rd Party Website

Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website

Published on

SIEM as a Service

Cryptojacking Malware called Minr infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR).

Wikipedia visitors who visiting the concern page and once a user clicks the link that pointed to the Malware infected website, the malicious script will be executed and visitor infected with “Minr” crypto-jacking malware.

Researchers found that many of the websites are running with an obfusticated script that infected to perform various malicious activities.

- Advertisement - SIEM as a Service

One of the infected site using a malicious HTML code that was generated by the well-known JJEncode obfuscator which is one of the popular for encrypting malicious code.

A few months ago, researchers discovered that  JJEncode obfuscator was once again in use: Minr cryptominer.

Description of the cryptojacking malware

Also, it begins used with many of the websites including web.clod[.]pw and Stati[.]bid.

Once the injected script was deobfuscated and analysis done by the sucuri Security researchers Reveals that malware had begun loading the Minr Malware from   web.stati[.]bid.

Past few years Cryptocurrency mining is a very easy method for cybercriminals to Generating the huge revenue by hijacking the Web- browser and injecting the malicious script and taking control of the CPU Usage from the Victims.

Mining cryptocurrencies in a legitimate way are quite resource consuming process, so attackers demanding ransom payments and infecting other computers to mine the cryptocurrencies.

Also Read:  Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents

Cryptojacking Malware Linked With Wikipedia Page

Recently a Wikipedia page reverting a series of edits that was linked with the 3rd party site which infected with Minr malware.

One of the Wikipedia users Discovered that two serious of Wikipedia Edits was intended to link with malware site and he discussed whether the incident required the attention of Wikipedia administrators.

A Wikipedia User Edit the page about ‘Feminist views on transgender topics” and added a malicious third party link that involved to mining Monero.

This Incident has occurred on February 2nd and the same day  Minr cryptominer used  stati[.]bid the domain was registered.

According to Sucuri, The third-party site happened to be infected with the stati[.]bid malware, and another user who reviewed the edits a few hours later noticed the infection, reverted the changes, contacted the author of the changes and solicited advice in the Wikipedia:Teahouse.

Later it was concluded that there was no intention to linked with infected third party site and the pointed Wikipedia Page.

this type of attack primarily impacts WordPress sites where the obfuscated Minr miner is injected at the very top of the active theme’s header.php file. Sucuri Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches...

New Meeten Malware Attacking macOS And Windows Users To Steal Logins

A sophisticated crypto-stealing malware, Realst, has been targeting Web3 professionals, as the threat actors...

Beware Of Malicious PyPI Packages That Inject infostealer Malware

Recent research uncovered a novel crypto-jacking attack targeting the Python Package Index (PyPI), where...