Jump to content

Invite Scene - #1 to Buy, Sell, Trade or Find Free Torrent Invites

#1 TorrentInvites Community. Buy, Sell, Trade or Find Free Torrent Invites for Every Private Torrent Trackers. HDB, BTN, AOM, DB9, PTP, RED, MTV, EXIGO, FL, IPT, TVBZ, AB, BIB, TIK, EMP, FSC, GGN, KG, MTTP, TL, TTG, 32P, AHD, CHD, CG, OPS, TT, WIHD, BHD, U2 etc.

LOOKING FOR HIGH QUALITY SEEDBOX? EVOSEEDBOX.COM PROVIDES YOU BLAZING FAST & HIGH END SEEDBOXES | STARTING AT $5.00/MONTH!

Hijacking for cryptocurrency mining: coming to a public Wi-Fi hotspot near you


Len

Recommended Posts

Connecting to public Wi-Fi networks has always come with a certain level of risk, but in a new twist, the next time you connect at your local cafe, it could be hijacked to mine for cryptocurrencies.

Initially published as a proof of concept but possibly now being used in the wild, the “CoffeeMiner” exploit uses public Wi-Fi networks to inject cryptocurrency mining scripts in the browsing sessions of anyone connected to the Wi-Fi point.

The attack works using a “man-in-the-middle” method in which the attacker sends spoofed Address Resolution Protocol messages using the “dSniff” library to the targeted network. Once access been obtained, the attacker can intercept all traffic on the public network and then use so-called Mitmproxy software to insert Javascript into the web pages visited by users.

The Javascript code, not surprisingly, comes from Coinhive and similar cryptocurrency mining services that have popped up in recent months. The Coinhive code, first detected in September when The Pirate Bay and then Showtime were found to be using it, hijacks the processor of a site visitor’s device to mine for Monero, a cryptocurrency favored by cybercriminals thanks to its high level of anonymity.

Although no one using the CoffeeMiner method has yet been officially detected, the idea of Wi-Fi networks being hijacked to mine for cryptocurrencies isn’t a new one. In December, a network in a Starbucks in Buenos Aires was found to be hijacking “connected computers to use their processing power to create digital cash,” according to the BBC. That same report noted that it’s not clear how the hijacking took place, but the attackers could, in theory at least, have used the same methodology.

Regardless of the how or why, some suggest there are other lessons to take away. “We don’t even touch public doorknobs without a paper towel or a squirt of Purell, why on earth would anyone freely connect to a public wifi network?” Scott Petry, co-founder and chief executive officer of Authentic8 Inc., told SiliconANGLE. “There’s no surprise in this story — it’s how the internet works. The surprise is that people are still exposing themselves to these exploits. Someday soon we’ll look back in shock on how careless we were on the internet.”

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Check out what our members are saying

  • Our picks

×
×
  • Create New...