Government websites fall prey to a plugin injected with a digital coin miner

government monero
Image used with permission by copyright holder

Thousands of websites relying on the Browsealoud plugin developed by U.K.-based Texthelp recently fell prey to a hack that secretly ran a cryptocurrency mining script in the background of visiting PCs. Websites use this specific plugin for visually impaired visitors so they can hear content, but on Sunday, February 11, someone managed to alter the plugin’s code to run Coinhive’s controversial JavaScript-based Monero digital currency miner. 

Because it’s based on JavaScript, administrators can easily insert Coinhive’s miner into a webpage. It runs in the background while visitors browse the website, silently mining digital coins using their PC’s processor. The CPU use can be extremely apparent if you know what’s going on, otherwise, the average web surfer may simply shrug off the slow performance as typical Windows or web-based processes slowing down the machine. The mining stops once web surfers leave the offending page. 

Recommended Videos

The altered Browsealoud plugin began mining Monero Sunday morning on more than 4,200 websites spanning the globe, including governments, organizations, and schools. Among them was the State of Indiana, the U.S. court information portal, the City University of New York, the U.K.’s National Health Service, the U.K.’s Student Loans Company, and many more. 

Most websites typically rely on plugins to pull content and tools from third-party developers. These can include translators, shopping baskets and ecommerce, menus, and so on. But the discovery of Coinhive’s miner in Browsealoud points to the possibility that if a hacker could gain access to one plugin for malicious purposes, thousands of websites could suffer. 

Plugin content typically resides on a remote server and sent to the target web page using a secure connection. The problem is that there is no real system to authenticate the actual content. Thus, someone with access to the content could easily inject malicious code, and the resulting websites using the plugin would serve up the malicious content despite registering the server as secure. 

One method to fix this problem is called Subresource Integrity. It comprises of two HTML elements with an “integrity” attribute that relies on a cryptographic hash. If the number provided to the website doesn’t match the number associated by the content, then the website can catch and block the malicious code. Unfortunately, this isn’t a widely used technique, but the recent issue with Browsealoud may convince more websites to utilize the Subresource Integrity method. 

Coinhive’s miner was reportedly only active in the Browsealoud plugin for a few hours before Texthelp pulled the plug. And although the outcome was apparently only to generate digital coin, the company still considers the hack as a criminal act. 

“Texthelp has in place continuous automated security tests for Browsealoud — these tests detected the modified file and as a result, the product was taken offline,” Texthelp Chief Technical Officer Martin McKay said in a statement. “This removed Browsealoud from all our customer sites immediately, addressing the security risk without our customers having to take any action.” 

Texthelp is currently working with the National Crime Agency and the National Cyber Security Agency to hunt down the hacker(s). 

Editors' Recommendations

Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
How to create a bibliography in Word on Windows and Mac

A bibliography is an important part of any well-structured college essay, dissertation, article, or other researched writing sample. It lets your readers know what sources you used as building blocks for your work, and isn’t too difficult to make without a template tool. Still, if you’d like to skip a few steps, there’s a terrific bibliography generator built right into Microsoft Word.

Read more
The unsung hero behind the modernization of Windows laptops

The large, multitouch trackpad was once synonymous with the MacBook. And starting in 2015, that has also included a haptic feedback trackpad, which simulates a physical click via a motorized engine under the surface. It was quite the revelation, and despite some initial skepticism, it really took off.

As you would expect, Apple held a patent on the technology, enjoying a five-year start ahead of other laptops. The first attempts at haptic feedback trackpads on Windows laptops weren't promising either.

Read more
How to create a Memoji on a Mac

Using emojis is a great way to add flair and personality to what would just be a plain ole’ text message. But if you’re an Apple devotee, you’ll also be able to liven your chats up with Memojis. Introduced on iOS 12, Memojis are custom avatars that you make in your likeness. Choose from numerous clothing, facial hair, and other cosmetic filters to dial in your appearance. When finished, your Memojis can be used with a few iOS apps, including Messages and FaceTime.

Read more