HomeCyber BalkansCryptojacking Attack Spreads to Online Thesaurus

Cryptojacking Attack Spreads to Online Thesaurus

Published on

spot_img

A recent cybersecurity investigation conducted by Group-IB has uncovered a cryptojacking campaign targeting users of a popular Thesaurus website. The campaign involved infecting visitors with malware, which allowed threat actors to mine cryptocurrency and potentially deploy more harmful software.

Thesaurus, a well-known platform with approximately 5 million monthly visitors, has been utilized by students, authors, and many others looking to enhance their vocabulary and language abilities. However, it appears that even trusted websites can be vulnerable to cyber attacks.

Group-IB’s 24/7 monitoring detected malicious archives flagged by their MXDR (Multi-Extended Detection and Response) technology. These archives contained malware and were found across multiple customer companies. The files had unusual names such as “chromium-patch-nightly.00.[0-9]{3}.[0-9]{3}.zip,” which indicated a potential shared source and unconventional attack.

To analyze the archives, Group-IB used their Malware Detonation Platform, which creates a secure virtual environment for examination. It was discovered that the archives contained a dropper, which installed XMRig Coinminer. This coinminer is commonly used for Monero cryptocurrency mining due to its anonymity features.

Investigators used Group-IB’s EDR (Endpoint Detection and Response) module to determine the source of the archives. They found that the malicious files were downloaded to the Downloads folder on affected workstations. This is a common location for downloads, so specialists examined browser history using Group-IB’s built-in EDR feature. This allowed them to trace the source of the malware.

It was determined that the infection chain involved automatic downloads of the malicious archives when visiting the Thesaurus website. Interestingly, the attack seemed to avoid the antonyms section of the website. Despite finding evidence of dropper activity, no actual launches were detected.

Prompt action was taken by Group-IB to protect their customers. They notified affected organizations and provided context and prevention tips within the MXDR system’s incident comments section.

By confirming the threat through the Malware Detonation Platform, Group-IB was able to neutralize the archived files. Their EDR agent automatically blocked and quarantined the malicious files, and shared the file hashes with other customers to update their blocklists.

This campaign serves as a reminder that even popular and trusted websites can be compromised. Threat actors utilized well-known tactics such as drive-by downloads and social engineering through fake error pages. It is crucial for users to stay vigilant and implement security measures to protect themselves.

As a result of this investigation, Group-IB has provided several recommendations to help users protect themselves from similar attacks. Users are advised to keep their operating systems and software updated and only download software and updates from official sources. Monitoring workstation resource usage for signs of cryptominers and employing EDR solutions are also important steps to prevent attacks.

In conclusion, the discovery of a cryptojacking campaign on a popular Thesaurus website highlights the vulnerability of even trusted platforms. The investigation by Group-IB serves as a reminder to users to stay cautious and implement security measures to protect themselves from such attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...