Loading
Serviceteam IT
  • Infrastructure
  • Consultancy
  • Research
  • Case Studies
  • Contact Us
  • Blog
  • 0121 468 0101
  • Search
  • Menu Menu
  • Twitter
  • LinkedIn
  • Youtube
News

U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner

More than 4,200 websites, including many run the U.K. and U.S. governments, were infected on Feb. 11 by a Monero cryptocurrency miner delivered through Browsealoud, a hosted accessibility service that can read website content aloud for people with visual impairments.

Browsealoud developer Texthelp has taken the service offline temporarily while it works on a fix. The exploit was active for four hours and Texthelp had been preparing for such an attack for a while, CTO and data security officer Martin McKay said in a statement.

“Texthelp has in place continuous automated security tests for Browsealoud, and these detected the modified file and as a result the product was taken offline,” he wrote. “This removed Browsealoud from all our customer sites immediately, addressing the security risk without our customers having to take any action.”

No customer data was compromised or lost, and an investigation is underway, according to McKay. A list of the affected websites, which stands at 4,275, is available here.

The infection was first reported by security researcher Scott Helme. A friend of Helme’s told him that his antivirus software was issuing a warning when he visited the site of the U.K. Information Commissioner’s office, prompting Helme to investigate.

“They’re the people we complain to when companies do bad things with our data,” Helme wrote. “It was pretty alarming to realize that they were running a crypto miner on their site, their whole site, every single page. … I quickly realized though that this script, whilst present on the ICO website, was not being hosted by the ICO, it was included by a 3rd party library they loaded.”

That turned out to be Browsealoud, which had been compromised by attackers that altered one of its hosted JavaScript files, Helme said.

“This is not a particularly new attack and we’ve known for a long time that CDNs or other hosted assets are a prime target to compromise a single target and then infect potentially many thousands of websites,” Helme added.

The attack could have been averted if the sites had employed a simple technique called subresource integrity, Helme said. This tells web browsers to run an integrity check on anything being loaded from a third-party source.

Helme explained the technique in a previous blog post.

“By embedding the base64 encoded cryptographic hash digest that we expect for the asset into the script or link tag, the browser can download the asset and check its cryptographic hash digest against the one it was expecting,” he wrote. “If the hash of the downloaded asset matches the hash that we provided, then the content is what we were expecting to receive and the browser can safely include the script or style. If the hash doesn’t match then we know we can’t trust the data and it must be discarded.”

It’s not clear how much Monero the managed to generate, but crypto mining schemes have been coming into vogue among cybercriminals. The Smominru botnet, which infected more than half a million machines, has made up to $3.6 million worth of Monero since May, Proofpoint reported.

Last week, a Monero botnet showed up in China and South Korea, infecting Android devices through port 5555, which is associated with the OS’s Debug Bridge tool.

Source: ThreatPost

With over 20 years of experience, Serviceteam IT design and deliver sophisticated connectivity, communication, continuity, and cloud services, for organisations that need to stay connected 24/7. We take the time to fully understand your current challenges, and provide a solution that gives you a clear understanding of what you are purchasing and the benefits it will bring you.

To find out how we can help you, call us on 0121 468 0101, use the Contact Us form, or why not drop in and visit us at 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

We’d love to hear from you!

12 February, 2018/by serviceteamit
Tags: Browsealoud, crypto mining, Cryptocurrency, Hacks, Monero, Security News, Texthelp, Vulnerabilities, Web Security
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
http://51.132.39.250/wp-content/uploads/2017/04/Squarelogotemplate.png 250 250 serviceteamit /wp-content/uploads/2020/05/ServiceteamITLogo250.png serviceteamit2018-02-12 18:00:182018-02-12 18:00:18U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner
You might also like
Serviceteam IT Security News Insurance Customers’ Personal Data Exposed Due to Misconfigured NAS Server
Serviceteam IT Security News Hacked London NHS hospitals data allegedly published online
Serviceteam IT Security News Australia politics live: Bowen confirms dozens of east coast petrol stations experiencing shortages; One Nation only about ‘stunts and the vibe’, Marles says
Serviceteam IT Security News Major breach found in biometrics system used by banks, UK police and defence firms
Serviceteam IT Security News Jira security review
Serviceteam IT Security News Northern Ireland police data breach is second in weeks, force reveals

Serviceteam IT Research

Serviceteam IT ResearchServiceteam IT Research

Recent Posts

  • Booking.com warns customers of hack that exposed their data
  • Almost half a million Lloyds customers had personal data exposed in IT glitch
  • Google warns quantum computers could hack encrypted systems by 2029
  • Australia politics live: Bowen confirms dozens of east coast petrol stations experiencing shortages; One Nation only about ‘stunts and the vibe’, Marles says
  • ‘Exploit every vulnerability’: rogue AI agents published passwords and overrode anti-virus software
  • Stone, parchment or laser-written glass? Scientists find new way to preserve data
  • A Victorian school teacher was applying for ‘heaps of rentals’ online – then someone accessed his bank account
  • Why should renters like me have to trade away our privacy just to get a roof over our heads? | Samantha Floreani
  • Real estate agents in Australia using apps that leave millions of lease documents at risk, digital researcher says
  • Burner phones and lead-lined bags: a history of UK security tactics in China
  • ‘All brakes are off’: Russia’s attempt to rein in illicit market for leaked data backfires
  • ‘Mortified’ OBR chair hopes inquiry into budget leak will report next week
  • London councils enact emergency plans after three hit by cyber-attack
  • Personal details of Tate galleries job applicants leaked online
  • Knee-jerk corporate responses to data leaks protect brands like Qantas — but consumers are getting screwed

Categories

  • 2FA
  • 5G
  • Active Directory
  • Active Directory Federated Services (ADFS)
  • Amazon Web Services
  • Apple Mac
  • Artificial Intelligence (AI)
  • AWS Direct Connect
  • Azure
  • Azure AD
  • Azure ExpressRoute
  • Backup
  • Big Data
  • Blockchain
  • Blockchain as a Service
  • Brexit
  • Business Continuity
  • Calendar App
  • Case Study
  • Cloud
  • Cloud Analytics
  • Cloud Connect
  • Collaboration
  • Communication
  • Compliance
  • Connectivity
  • Consultancy
  • Continuity
  • Cyber Fraud
  • Cyber Security
  • Data Centre
  • Data Sovereignty
  • Desktop-as-a-Service
  • Digital Transformation
  • Disaster Recovery
  • DNS
  • Edge Computing
  • EOL
  • Exchange Online
  • Exchange Online Protection
  • GDPR
  • Glossary
  • Google Cloud
  • High Availability
  • HowTo
  • HP Helion
  • Hybrid-Cloud
  • IBM
  • Identity and Access Management
  • Internet of Things (IoT)
  • IONOS
  • IP Telephony
  • Leased Line
  • Lock down client IP source
  • MFA
  • Microsoft Teams
  • Multi-Factor Authentication
  • MX Fallback
  • Networks
  • News
  • O365
  • OData
  • Office 365
  • Oracle
  • Outlook 2011 for Mac
  • Outlook 2016 for Mac
  • Outsourcing
  • Password Management
  • Phishing
  • PowerShell
  • Reporting
  • Research
  • Restricted Access
  • Robotic Process Automation (RPA)
  • Salesforce
  • Scam Emails
  • Security
  • Self-service
  • SharePoint Online
  • Single Sign-On
  • Skype for Business
  • Smart Network
  • Spoof Emails
  • SSO
  • Supplier Selection
  • Teams Direct
  • Unified Threat Management
  • VoIP

Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • November 2015
  • October 2015

Categories

  • 2FA
  • 5G
  • Active Directory
  • Active Directory Federated Services (ADFS)
  • Amazon Web Services
  • Apple Mac
  • Artificial Intelligence (AI)
  • AWS Direct Connect
  • Azure
  • Azure AD
  • Azure ExpressRoute
  • Backup
  • Big Data
  • Blockchain
  • Blockchain as a Service
  • Brexit
  • Business Continuity
  • Calendar App
  • Case Study
  • Cloud
  • Cloud Analytics
  • Cloud Connect
  • Collaboration
  • Communication
  • Compliance
  • Connectivity
  • Consultancy
  • Continuity
  • Cyber Fraud
  • Cyber Security
  • Data Centre
  • Data Sovereignty
  • Desktop-as-a-Service
  • Digital Transformation
  • Disaster Recovery
  • DNS
  • Edge Computing
  • EOL
  • Exchange Online
  • Exchange Online Protection
  • GDPR
  • Glossary
  • Google Cloud
  • High Availability
  • HowTo
  • HP Helion
  • Hybrid-Cloud
  • IBM
  • Identity and Access Management
  • Internet of Things (IoT)
  • IONOS
  • IP Telephony
  • Leased Line
  • Lock down client IP source
  • MFA
  • Microsoft Teams
  • Multi-Factor Authentication
  • MX Fallback
  • Networks
  • News
  • O365
  • OData
  • Office 365
  • Oracle
  • Outlook 2011 for Mac
  • Outlook 2016 for Mac
  • Outsourcing
  • Password Management
  • Phishing
  • PowerShell
  • Reporting
  • Research
  • Restricted Access
  • Robotic Process Automation (RPA)
  • Salesforce
  • Scam Emails
  • Security
  • Self-service
  • SharePoint Online
  • Single Sign-On
  • Skype for Business
  • Smart Network
  • Spoof Emails
  • SSO
  • Supplier Selection
  • Teams Direct
  • Unified Threat Management
  • VoIP

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Privacy
  • Resources
  • Terms
  • Portal
  • Fibre
  • Smart Network
  • Cloud Connect
  • IP Telephony
  • Teams Calling
  • Microsoft Teams
  • Office 365 Plans
Blockchain Utilities: Revolution in the Energy Sector Blockchain Utilities & Energy Sector Serviceteam IT Security News 4,500 young women race to complete CyberFirst Girls online challenge
Scroll to top