Cryptojacking Malware called “Minr“ infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR).
Wikipedia visitors who visiting the concern page and once a user clicks the link that pointed to the Malware infected website, the malicious script will be executed and visitor infected with “Minr” crypto-jacking malware.
Researchers found that many of the websites are running with an obfusticated script that infected to perform various malicious activities.
One of the infected site using a malicious HTML code that was generated by the well-known JJEncode obfuscator which is one of the popular for encrypting malicious code.
A few months ago, researchers discovered that JJEncode obfuscator was once again in use: Minr cryptominer.
Description of the cryptojacking malware
Also, it begins used with many of the websites including web.clod[.]pw and Stati[.]bid.
Once the injected script was deobfuscated and analysis done by the sucuri Security researchers Reveals that malware had begun loading the Minr Malware from web.stati[.]bid.
Past few years Cryptocurrency mining is a very easy method for cybercriminals to Generating the huge revenue by hijacking the Web- browser and injecting the malicious script and taking control of the CPU Usage from the Victims.
Mining cryptocurrencies in a legitimate way are quite resource consuming process, so attackers demanding ransom payments and infecting other computers to mine the cryptocurrencies.
Also Read: Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents
Recently a Wikipedia page reverting a series of edits that was linked with the 3rd party site which infected with Minr malware.
One of the Wikipedia users Discovered that two serious of Wikipedia Edits was intended to link with malware site and he discussed whether the incident required the attention of Wikipedia administrators.
A Wikipedia User Edit the page about ‘Feminist views on transgender topics” and added a malicious third party link that involved to mining Monero.
This Incident has occurred on February 2nd and the same day Minr cryptominer used stati[.]bid the domain was registered.
According to Sucuri, The third-party site happened to be infected with the stati[.]bid malware, and another user who reviewed the edits a few hours later noticed the infection, reverted the changes, contacted the author of the changes and solicited advice in the Wikipedia:Teahouse.
Later it was concluded that there was no intention to linked with infected third party site and the pointed Wikipedia Page.
this type of attack primarily impacts WordPress sites where the obfuscated Minr miner is injected at the very top of the active theme’s header.php file. Sucuri Said.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…