Story image

EITest hijacks tech support scam pages to mine cryptocurrency

26 Sep 2017

Tech support scams are now being used as social engineering tools as part of EITest’s campaign to deliver Coinhive’s Monero cryptocurrency miner, researchers at Trend Micro Labs report.

EITest has been around since at least 2014 and uses compromised websites to inject malicious scripts and divert browsers to fraudulent websites.

Tech support scams, which scare users into believing there is a problem or infection in their computer, often use websites to con users into paying for services and handing over financial information.

The EITest campaign’s latest moves have involved adding the Coinhive JavaScript (JS) cryptocurrency miner to take over computers and turn them into cryptocurrency miners themselves through the Google Chrome browser.

The phishing script is coded to notify the user to download the Hoefler Text font to properly display the page, but it actually downloads a malicious executable file. EITest takes this up a notch: If the user’s browser is Internet Explorer, he is redirected to a tech support phishing page containing the Coinhive Monero-mining JS script,” researchers continue.

The cryptocurrency miner is the same one that is embedded in The Pirate Bay’s website, researchers state.

The tech support scam asks users to call ‘Microsoft Technical Department’ to apparently fix the issue. However while this is happening, the page loads script from the Coinhive server and launches the JavaScript cryptocurrency miner.

“Users won’t notice that their system has been affected apart from system lags or performance issues,” researchers state.

87% of the infections are hitting Japan, while Australia accounts for 2%. Attacks are also hitting the United States, France, Canada and other countries.

Cryptocurrency mining is becoming a bigger issue for security, as criminals can profit without investing much in their own malware creations.

“For end users, however, the impact isn’t just about system wear-and-tear or performance issues. From January 1 to June 24, for instance, our sensors noted that 20% of cryptocurrency-mining activities entailed web- and network-based attacks. From cross-site scripting and remote code execution to brute force attacks and SQL injection, intrusive and malicious cryptocurrency miningcan threaten the availability and security of a network or system, and the data stored on them. Worse, victims become part of the problem,” researchers state.

Trend Micro recommends the following best practices to prevent and mitigate cryptocurrency mining attacks:

- Update and patch operating systems and browsers - Be wary of suspicious websites and email attachments - Consider using JavaScript-blocking applications that prevent scripts like Coinhive from running - In this case, closing the browser or website will stop the Coinhive script from running.

Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
D-Link hooks up with Alexa and Assistant with new smart camera
The new camera is designed for outdoor use within a wireless smart home network.
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."