Reserved IP Address°C
03-07-2025
BSV
$36.57
Vol 38.51m
-2.11%
BTC
$88068
Vol 60161.83m
-3.88%
BCH
$404.65
Vol 608.9m
1.36%
LTC
$101.19
Vol 1094.81m
-4.48%
DOGE
$0.19
Vol 2004.59m
-4.23%
Getting your Trinity Audio player ready...

NSA cyberweapon leak: when will this nightmare end?

If you find your computer lagging for no clear reason, check the open pages on your web browser—one of them might be mining for someone else.

The booming cryptocurrency industry has been attracting a new generation of crime, along with new breeds of malware. Last year’s leak of high-grade hacking tools—from no less than the National Security Agency (NSA) itself—is not making life any easier for the field of cybersecurity.

According to the Guardian, over 5,000 websites—including government websites have been infected by mining malware over the weekend. In what is now known as “cryptojacking,” the malware triggers a script that secretly uses visitors’ computers to mine cryptocurrencies for the attackers, effectively using up their bandwidth and processing power. In this instance, the attackers were mining Monero (XMR).

The attackers deployed the coin-mining malware known as Coinhive by slipping it through a usability plugin called BrowseAloud, which primarily assists people with dyslexia, visual impairments, and those with low English literacy by providing speech and translation to websites.

The government websites that have been infected include the UK’s National Health Services (NHS), and a range of Australian government websites including the Victorian parliament’s, the Queensland Civil and Administrative Tribunal, the Queensland ombudsman, the Queensland Community Legal Centre homepage, and the Queensland legislation website.

Brace yourselves. There may be more.

Last year, a Pandora’s box of cyberweapons capable of different types of hacks were unleashed from the NSA’s artillery. It has been wreaking havoc worldwide-web-wide since, which is why it’s not surprising that only two days ago, reports have been circulating stating that US intelligence officials have been making (paid) attempts to retrieve the cyberweapons from a mysterious Russian peddler.

What’s even more troubling about the news is that what’s already out on the internet can never be “retrieved.” This only insinuates that there’s more to be unleashed, hence the attempts to “retrieve” them before they are circulated. And even if they succeed at paying someone off in exchange for the tools, it’s very logical to assume that these tools have been copied. Paying someone not to circulate such files is pretty much a Hail Mary pass at this point.

Recommended for you

Nigeria launches eNSC; Lagos puts up digital fight vs malaria
Known as eNSC, the new stablecoin is pegged 1:1 with the naira and the eNaira, but issuer ProsperaVest says that...
March 6, 2025
Public blockchains can create ‘unprecedented efficiency’: ECB
European Central Bank's Ulrich Bindseil is correct: scalable public blockchains are superior, and CBDCs could be minted on them.
March 6, 2025
Advertisement
Advertisement
Advertisement