Loading cryptocurrency prices...

Stealth Monero Mining Scripts Infect 3,500+ Websites Worldwide

Over 3,500 Websites Compromised in Ongoing Monero Cryptojacking Campaign Using Stealthy Mining Scripts

  • Over 3,500 websites have hidden Monero mining scripts installed through a malicious injection chain.
  • Hackers are reusing old access points, mainly on unpatched and e-commerce servers, to deliver these scripts.
  • The mining Malware limits the use of system resources to avoid detection by standard security tools.
  • The campaign is ongoing and was first discovered by Cybersecurity company c/side.
  • The scripts convert visitors’ browsers into Monero mining engines without stealing passwords or funds.

Attackers have compromised more than 3,500 websites to secretly run Monero mining scripts. The malicious software hijacks visitors’ browsers to mine Monero, a privacy-focused cryptocurrency, without user consent.

- Advertisement -

Cybersecurity researchers at c/side discovered the attack, which is still active. The Hackers delivered the mining script through a chain of malicious injections, often targeting unpatched websites and e-commerce servers.

The mining malware is designed to operate quietly. It limits CPU (computer processing unit) usage and hides network traffic using WebSocket streams to reduce the chances of being noticed by security tools. According to c/side, “By throttling CPU usage and hiding traffic in WebSocket streams, it avoided the telltale signs of traditional crypto jacking,” as disclosed in their recent blog post.

An unnamed security researcher stated to Decrypt that the hackers are leveraging infrastructure from previous campaigns, including access gained during past Magecart attacks. Magecart is a tactic involving the injection of code into online checkout pages to steal payment information. The attackers reportedly placed the Monero miner by adding an extra script to already-compromised sites: “Planting the miner was trivial, they simply added one more script to load the obfuscated JS, repurposing existing access.”

Unlike past attacks that overloaded users’ CPUs, the current approach uses WebAssembly code, which allows efficient mining, paired with WebSockets for constant, low-key server communication. The new scripts are designed to remain undetected, capping resource use so browsers do not show abnormal behavior.

- Advertisement -

The primary goal appears to be long-term, Passive income for attackers. The malware does not currently steal passwords or drain crypto wallets, although it could potentially be adapted to do so. The main targets are web server and app owners, not end users.

Cryptojacking, the hidden mining of cryptocurrency on someone else’s device, became widely known in 2017 with the rise of Coinhive, a service that was shut down in 2019. Since then, reports on its frequency have been mixed, but this new low-profile campaign points to a shift in how attackers are operating. For more background or technical analysis, visit the official disclosure from c/side.

âś… Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Crypto Fear Fuels Potential for Unexpected November Rally

Crypto market sentiment is showing extreme fear, the lowest since March, amid ongoing declines....

IBM Unveils 120-Qubit Nighthawk Chip, Aiming for Quantum Advantage by 2026

IBM unveiled the Nighthawk and Quantum Loon quantum processors, marking significant progress toward verified...

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...

JPMorgan Expands JPM Coin to Base, Eyes Retail and Multi-Currency Use

JPMorgan has launched its dollar-backed stablecoin, JPM Coin (JPMD), for institutional transfers on the...

Report: 16 Blockchains Have Built-in Fund Freezing Mechanisms

Sixteen blockchains have built-in fund freezing features, while 19 more can add this with...
- Advertisement -

Must Read

The 13 Best Crypto Advertising Networks to Grow Your Project

TABLE OF CONTENTSWhy Traditional Ad Networks (Like Google & Facebook) Fail CryptoQuick-View Comparison TableHow to Choose the Right Crypto Ad Network for Your ProjectBest...