Wednesday, November 13, 2024
HomeCryptocurrency hackWikipedia Page Linked with "Minr" Cryptojacking Malware Infected 3rd Party Website

Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website

Published on

Malware protection

Cryptojacking Malware called Minr infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR).

Wikipedia visitors who visiting the concern page and once a user clicks the link that pointed to the Malware infected website, the malicious script will be executed and visitor infected with “Minr” crypto-jacking malware.

Researchers found that many of the websites are running with an obfusticated script that infected to perform various malicious activities.

- Advertisement - SIEM as a Service

One of the infected site using a malicious HTML code that was generated by the well-known JJEncode obfuscator which is one of the popular for encrypting malicious code.

A few months ago, researchers discovered that  JJEncode obfuscator was once again in use: Minr cryptominer.

Description of the cryptojacking malware

Also, it begins used with many of the websites including web.clod[.]pw and Stati[.]bid.

Once the injected script was deobfuscated and analysis done by the sucuri Security researchers Reveals that malware had begun loading the Minr Malware from   web.stati[.]bid.

Past few years Cryptocurrency mining is a very easy method for cybercriminals to Generating the huge revenue by hijacking the Web- browser and injecting the malicious script and taking control of the CPU Usage from the Victims.

Mining cryptocurrencies in a legitimate way are quite resource consuming process, so attackers demanding ransom payments and infecting other computers to mine the cryptocurrencies.

Also Read:  Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents

Cryptojacking Malware Linked With Wikipedia Page

Recently a Wikipedia page reverting a series of edits that was linked with the 3rd party site which infected with Minr malware.

One of the Wikipedia users Discovered that two serious of Wikipedia Edits was intended to link with malware site and he discussed whether the incident required the attention of Wikipedia administrators.

A Wikipedia User Edit the page about ‘Feminist views on transgender topics” and added a malicious third party link that involved to mining Monero.

This Incident has occurred on February 2nd and the same day  Minr cryptominer used  stati[.]bid the domain was registered.

According to Sucuri, The third-party site happened to be infected with the stati[.]bid malware, and another user who reviewed the edits a few hours later noticed the infection, reverted the changes, contacted the author of the changes and solicited advice in the Wikipedia:Teahouse.

Later it was concluded that there was no intention to linked with infected third party site and the pointed Wikipedia Page.

this type of attack primarily impacts WordPress sites where the obfuscated Minr miner is injected at the very top of the active theme’s header.php file. Sucuri Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Automating Identity and Access Management for Modern Enterprises

Keeping track of who has access and managing their permissions has gotten a lot...

Finding The Right E-Commerce Platform – Comparing Reselling Solutions

If you’re looking to make some extra cash or to start a business, you...

Fortinet Patches Critical Flaws That Affected Multiple Products

Fortinet, a leading cybersecurity provider, has issued patches for several critical vulnerabilities impacting multiple...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their...

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...