<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cryptocurrency Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/cryptocurrency/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/cryptocurrency/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Tue, 27 Feb 2018 00:41:58 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Cryptocurrency Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/cryptocurrency/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Websites compromised to generate money</title>
		<link>https://www.l2cybersecurity.com/websites-compromised-generate-money/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 13 Feb 2018 11:53:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1137</guid>

					<description><![CDATA[<p>&#8220;Wait, what?!?!?? Websites can generate money? I&#8217;ve got a website. What do I have to do to get my hands on some of that lovely cash?&#8221; Calm yourself, it&#8217;s not the website doing the money generation and you are not the beneficiary. The bad guys are! ? Last weekend a security researcher called Scott Helme noticed&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/">Websites compromised to generate money</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1149" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/mining-1-150x150.jpg" alt="generate money by cryptomining" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/mining-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/mining-1.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />&#8220;Wait, what?!?!?? Websites can generate money? I&#8217;ve got a website. What do I have to do to get my hands on some of that lovely cash?&#8221;</p>
<p>Calm yourself, it&#8217;s not the website doing the money generation and you are not the beneficiary. The bad guys are! <span id="c122" class="notranslate">?</span><span id="more-1137"></span></p>
<p>Last weekend a security researcher called Scott Helme noticed that when he visited some government websites, the processor usage on his machine would suddenly spike. If he went to a normal site (like YouTube) the processor usage would be more normal. Some of the sites that were shown to cause this spike in processor usage were:</p>
<ul>
<li>The United States Court information portal <strong><span style="text-decoration: underline;">www.uscourts.gov</span></strong></li>
<li>The UK&#8217;s Student Loans Company <strong><span style="text-decoration: underline;">www.slc.co.uk</span></strong></li>
<li>The UK&#8217;s data protection body, The Information Commissioner&#8217;s Office <strong><span style="text-decoration: underline;">www.ico.org.uk</span></strong></li>
<li>The Financial Ombudsman Service <strong><span style="text-decoration: underline;">www.financial-ombudsman.org.uk</span></strong></li>
<li>Also some of the UK NHS services</li>
</ul>
<p>Then some detective work revealed that these sites had one thing in common. They were all WordPress sites, but not only that, they all used a specific plug-in called <a href="https://www.texthelp.com/en-gb/products/browsealoud/">BrowseAloud</a>. This plug-in, created by a company called <em>Texthelp</em>, can be used by vision impaired people. It will speak the text on webpages to such individuals. There were <a href="https://publicwww.com/websites/browsealoud.com%2Fplus%2Fscripts%2Fba.js/">over 4,000 sites</a> shown to be affected by this compromise.</p>
<p>So what happened was, the evil doers compromised the plug-in software. When a web user browsed to an affected website and opened it in their browser, even without asking for the page to be read out to them, the plug-in would execute code which would &#8220;mine for monero cryptocurrency&#8221; or in normal language, it would generate money by using the web users processing power to carry out the complex calculations needed to create the cryptocurrency.</p>
<p>You might not think this is a big deal, but it is. Somebody is doing something illegal and using your machine to help them. It&#8217;s not your fault, but it is something to be concerned about. What if, instead of having plug-in execute code to generate money, that they used the processing power of your machine to send spam e-mail or target a particular web site to take it offline?</p>
<p>In fairness to <em>Texthelp</em>, as soon as they became aware of the issue, they took the plug-in offline until they resolved all issues with it. This kind of incident is similar to the <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Petya/NotPetya Ransomware outbreak</a> last year, in that the software that is in use was compromised at it&#8217;s source (also known as a supply-chain attack).</p>
<p>It&#8217;s hard to protect against these types of incidents, particularly where you are browsing a reputable website, which might be using a plug-in that has been compromised. As always I would suggest using an <a href="http://www.l2cybersecurity.com/use-anti-virus/">updated anti-virus</a>, keep your <a href="http://www.l2cybersecurity.com/use-automatic-updates/">software fully updated</a> and also use an ad-blocking extension/add-in on your browser.</p>
<p>The post <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/">Websites compromised to generate money</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
