The cryptocurrency mining malware infectious is getting out of hand:
nearly 50,000 sites have been surreptitiously infected with
crypto-jacking scripts, according to security researcher Troy Mursch
from Bad Packets Report.
Relying on source-code search engine PublicWWW to scan the web for pages running crypto-jacking malware, Mursch was able to identify at least 48,953 affected websites. He adds that at least 7,368 of the compromised sites are powered by WordPress.
The researcher notes that Coinhive continues to be the most widespread crypto-jacking script out there, accounting for close to 40,000 infected websites – a stunning 81 percent of all recorded cases.
It is worth pointing out that Mursch was able to find at least 30,000 websites running Coinhive back in November last year.
The researcher has also published a Cryptojacking campaign targeting WordPress sites document on PasteBin file
https://badpackets.net/how-to-find-cryptojacking-malware/
https://publicwww.com/
Relying on source-code search engine PublicWWW to scan the web for pages running crypto-jacking malware, Mursch was able to identify at least 48,953 affected websites. He adds that at least 7,368 of the compromised sites are powered by WordPress.
The researcher notes that Coinhive continues to be the most widespread crypto-jacking script out there, accounting for close to 40,000 infected websites – a stunning 81 percent of all recorded cases.
It is worth pointing out that Mursch was able to find at least 30,000 websites running Coinhive back in November last year.
The researcher has also published a Cryptojacking campaign targeting WordPress sites document on PasteBin file
Reference
https://pastebin.com/gYkbVP8bhttps://badpackets.net/how-to-find-cryptojacking-malware/
https://publicwww.com/
0 comments:
Post a Comment