Qualys Malware Research Labs is announcing the release of Qualys BrowserCheck CoinBlocker Chrome extension to detect and block browser-based cryptocurrency mining, aka cryptojacking.

Cryptojacking

Cryptojacking attacks leverage the victim system's resources via malicious JavaScript to mine certain cryptocurrencies. Attackers carry out these attacks by infecting popular sites with JavaScript that enables cryptojacking. Any visitor to such sites will download the JavaScript and unknowingly contribute its system resources to mine a cryptocurrency that is added to the attacker's wallet. The resource-intensive mining process is carried out on victim systems typically consumes more than 70% of CPU, that reduces system performance, increases power consumption and can cause possible permanent damage to the system.

Because cryptojacking helps attackers earn cryptocurrency without spending a dime on mining infrastructure, it is very profitable. The overall cryptocurrency market capitalization has reached more than $250 billion as of June 2018 with more than 1700 active projects! There is a lot of money to be made for attackers leveraging these projects, and cryptomining is gradually moving to the center stage of threat landscape as an even more attractive option compared to the recent favorite ransomware campaigns.

Cryptojacking has also gone mainstream recently because it is safer for cyber criminals and webmasters than ransomware, which requires interaction with the victim to collect payment. And because cryptojacking is browser based, it is easier to infect victims than hacking into servers. As cryptomining becomes more resource-intensive over time in terms of compute power and electricity consumption required, stealing those resources is becoming more enticing to attackers.

Cryptojacking and Monero

Monero (XMR), a relatively new cryptocurrency, is becoming a more common target of cryptojacking attackers because its mining algorithm (CryptoNight) is designed for easy integration and because its privacy and anonymity features also benefit hackers. Monero's proof-of-work mining algorithm can be used with desktop- or server-grade CPUs rather than custom-built specialized ASIC or GPU hardware that is required for traditional coin mining algorithms. This is an important aspect of new generation cryptocurrency, as it tries to be decentralized and avoid enabling a small set of users with access to specialized hardware from creating a mining monopoly. From an attacker's standpoint, the possibility of making sizable profits off desktop-grade CPUs with added privacy is a lucrative option.

WebAssembly, which is a binary executable format for the web, is a popular supporting technology among cryptojacking attackers, because it makes JavaScript execution within the browser quite efficient.

Fig. 1 CryptoNight based cryptocurrencies market capitalization, June 2018. Source: https://coinmarketcap.com

Infections

Recently, Bad Packet Reports published an article that stated the presence of more than 100,000 sites that are currently infected with cryptojacking malware. Most of these sites seem to be compromised using an exploit for the Drupalgeddon 2 vulnerability (CVE-2018-7600), even with the availability of a patch for several months already. Side note: Always patch regularly! There are reports of malware campaigns leveraging a recently released exploit for this vulnerability to compromise victims and inject coin mining scripts. Once a user visits these compromised sites, their system unwittingly contributes towards solving a crypto puzzle that benefits attackers.

To protect users from their computing resources being drained via unauthorized coin mining scripts running on your machine, one needs to block access to following popular coin mining services:

  • coinhive[.]com
  • load[.]jsecoin[.]com
  • crypto-loot[.]com
  • coin-have[.]com
  • ppoi[.]org
  • cryptoloot[.]pro
  • papoto[.]com
  • coinlab[.]biz

Qualys BrowserCheck CoinBlocker Extension for Google Chrome

Based on extensive research from Qualys Malware Research Labs, we are announcing Qualys BrowserCheck CoinBlocker Extension, a new Google Chrome browser extension to protect users from browser-based coin mining attacks.

Here are a few screenshots of Qualys BrowserCheck CoinBlocker Extension in action:

Fig. 2 Qualys BrowserCheck CoinBlocker

Fig. 3 Qualys BrowserCheck CoinBlocker Detection Logs

Qualys BrowserCheck CoinBlocker Extension relies not only on the domain blacklist but also uses heuristics to identify underlying cryptomining algorithms like CryptoNight (used for mining Monero) and its various artifacts.

Detecting Traditional Cryptomining Threats

Additionally, cryptomining is not just limited to browser-based scripts as we have seen certain attackers infect systems with a persistent malware that runs outside of a browser to perform cryptomining. To help detect such malware, security professionals can use Qualys Indication of Compromise (IOC) solution to gain 2-second visibility into coin mining and other malware across their entire organization. Qualys IOC includes behaviour-based malware family detection for the following coin mining threats:

  • CryptoMinerA
  • CryptoMinerB
  • CryptoMinerC
  • CryptoMinerD
  • CryptoMinerE
  • Neksminer

Qualys BrowserCheck Business Edition

Qualys BrowserCheck Business Edition continuously monitors which browsers, plugins, OS settings and patches are on your users' computers and shows you when they need updating. It even prompts users to fix out-of-date software, so you don't have to. It frees you from having to guess whether your machines are vulnerable to the latest problems in Java, Flash, Adobe Reader or other browser-based plugins.

Get Qualys BrowserCheck Business Edition.

Attachments

  • Original document
  • Permalink

Disclaimer

Qualys Inc. published this content on 25 July 2018 and is solely responsible for the information contained herein. Distributed by Public, unedited and unaltered, on 25 July 2018 17:13:03 UTC