Cryptocurrency mining service Coinhive is again in the news for misuse by a customer, this time involving handset maker Blackberry. Apparently, someone hacked into the company’s global operations website and used it to steal visitors’ computing power to mine Monero – a digital currency.
Cryptocurrencies like Bitcoin, Ethereum and Monero are digital currencies whose numbers and / or value grows as new transactions are validated by solving complex mathematical problems. Lending your computing power to keep the blockchain alive increases the currency’s value, and also fattens your personal crypto wallet, but only if you can mine quickly enough – which requires immense computing resources, especially for the likes of Bitcoin.
Coinhive sells a cryptocurrency mining tool that allows users to embed it in a desired platform – such as a website – and mine Monero using visitors’ computing power. It advertises the tool as a more elegant alternative to displaying intrusive ads. Currently, one Monero unit is valued at around $400.
But there’s a problem with Coinhive. The service is apparently so alluring to fast-buck aficionados that it has become a one-stop-shop for bad actors. The latest such incident was reported on Reddit, where a user nicknamed “Rundvleeskroket” revealed that Blackberry was hacked for cryptocurrency mining.
A friend of Rundvleeskroket discovered the hack, and shared a screenshot of the Blackberry site’s source code where Coinhive is clearly referenced. A spokesperson for Coinhive soon joined the discussion and confirmed that someone indeed had hacked Blackberry, and a number of other sites, and used their tool for the reported nefarious purpose.
“We’re sorry to hear that our service has been misused. This specific user seems to have exploited a security issue in the Magento web shop software (and possibly others) and hacked a number of different sites,” the representative said.
Ironically, Blackberry claims to be offering the “world’s most trusted mobile security software.”
Security vendors, including Bitdefender, classify cryptocurrency miners as malware, and block them. Although Coinhive states that customers should warn their end-users of the practice, many prefer to keep their mining a secret.
The past year has seen several reports of concealed cryptocurrency mining – almost all of them involving Coinhive.
In September last year, The Pirate Bay notably ran what it called a “test pilot program” to see if mining Monero worked as an alternative to displaying ads. A month later, an engineer discovered a hidden cryptocurrency miner inside a popular Google Chrome URL shortening extension.
Oslo-based Opera Software AS recently rolled out a new version of its web browser, featuring an anti-Bitcoin mining tool. Browser extensions serving the same purpose are available for Google Chrome users as well.
This is a Security Bloggers Network syndicated blog post authored by Filip Truta. Read the original post at: HOTforSecurity