Hackers use 200,000 insecure Brazilian routers to mine cryptocurrencies

The attack exploits a flaw that was previously patched

CoinHive is a tool that allows web browsers to mine for cryptocurrencies in the background

Hackers are using a network of vulnerable routers to spread crypto-mining malware to unsuspecting users, security researchers have discovered.

An unknown cyber criminal (or possibly a network of cyber criminals) is using a flaw in more than 170,000 routers manufactured by MikroTik to run scripts on the computers of unsuspecting victims which mine cryptocurrencies for the hacker, according to TrustWave researcher Simon Kenin.

The attack uses a previously-discovered flaw - which has since been patched by MikroTik - to inject a mining script from CoinHive into the browser of anyone connected to an infected router. Most of the affected devices are located in Brazil, but Kenin warned that the attack has been observed in other places as well.

Another researcher, Troy Mursch, also observed a similar case in Moldova involving more than 25,000 MikroTik routers running CoinHive scripts. It is currently unknown whether the two attacks are connected.

The security flaw that allows the routers to be exploited has now been addressed by MikroTik, but numerous devices remain unpatched. This is a big problem, Kenin explains, as MikroTik manufacture high-end equipment that is often used by ISPs, web companies and businesses.

"Let me emphasize how bad this attack is," he said. "The attacker wisely thought that instead of infecting small sites with few visitors, or finding sophisticated ways to run malware on end user computers, they would go straight to the source; carrier-grade router devices."

"There are hundreds of thousands of these devices around the globe, in use by ISPs and different organizations and businesses, each device serves at least tens if not hundreds of users daily."

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Hackers could use new Wslink malware in highly targeted cyber attacks
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

1 Nov 2021
FBI raids Chinese POS business following cyber attack claims
malware

FBI raids Chinese POS business following cyber attack claims

27 Oct 2021
Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021