Reserved IP Address°C
03-16-2025
BSV
$33.6
Vol 13.88m
-1.61%
BTC
$82971
Vol 13505.55m
-1.6%
BCH
$327.16
Vol 141.94m
-3.63%
LTC
$89.43
Vol 346.45m
-4.61%
DOGE
$0.16
Vol 776.32m
-4.29%
Getting your Trinity Audio player ready...

Cybercriminals are at it again, this time setting their sights on a charity foundation.

Last week, researchers at security firm Trustwave reported that they have found a CoinImp crypto mining script has been injected into the official website of Make-A-Wish Foundation. In a blog post, the Trustwave researchers said the malware has been mining cryptocurrencies since May 2018. CoinImp has been using the website visitors’ computing power to mine cryptocurrencies.

Upon further investigation, researchers discovered that the foundation’s website became vulnerable earlier this year when its domain host, Drupal, became vulnerable to CVE-2018-7600, a remote code execution bug popularly known as “Drupalgeddon 2.” Drupal, an open source content management system, claimed that the vulnerability allowed hackers to inject malicious malware into specific websites that had failed to add in their security patch.

The CoinImp miner is based on the JavaScript and is generally used by individuals who secretly want to mine Monero currency using visitor’s phone, tablet or computer.

This particular cryptojacking incident was difficult to find because it used different techniques to avoid detection, according to Trustwave’s Simon Kenin. First, the malware changes the domain name that hosts the JavaScript miner. In addition, the WebSocket proxy also used different domains and IPs to avoid blacklist solutions.

Researchers have warned that Drupal-based websites need to be updated to avoid attacks from these and other malicious malware. Just this spring, the Drupalgeddon 2 bug, Remote Code Execution (RCE) vulnerability in the older versions of Drupal, affected more than 100,000 sites.

Meanwhile, McAfee Labs, an Internet security provider warned the public to watch out for a new cryptojacking malware called WebCobra. The company stated that unlike previous malware, the new cryptojacking malware could not be traced in the victim’s computer. The malware will slow down the user computer and consume a lot of power during its operations.

Recommended for you

China’s quantum leap: Unraveling the Zuchongzhi 3.0
Nations are on edge as China advances its quantum computing power with Zuchongzhi 3.0, raising the question of whether it's...
March 14, 2025
Building a solid ecosystem: Babbage to host BSV Hackathon in Texas
The US$55,000 prize money is up for grabs at the inaugural BSV Hackathon in Austin, Texas, which Babbage will host...
March 3, 2025
Advertisement
Advertisement
Advertisement