EITest hijacks tech support scam pages to mine cryptocurrency
Tech support scams are now being used as social engineering tools as part of EITest’s campaign to deliver Coinhive’s Monero cryptocurrency miner, researchers at Trend Micro Labs report.
EITest has been around since at least 2014 and uses compromised websites to inject malicious scripts and divert browsers to fraudulent websites.
Tech support scams, which scare users into believing there is a problem or infection in their computer, often use websites to con users into paying for services and handing over financial information.
The phishing script is coded to notify the user to download the Hoefler Text font to properly display the page, but it actually downloads a malicious executable file. EITest takes this up a notch: If the user’s browser is Internet Explorer, he is redirected to a tech support phishing page containing the Coinhive Monero-mining JS script,” researchers continue.
The cryptocurrency miner is the same one that is embedded in The Pirate Bay’s website, researchers state.
“Users won’t notice that their system has been affected apart from system lags or performance issues,” researchers state.
87% of the infections are hitting Japan, while Australia accounts for 2%. Attacks are also hitting the United States, France, Canada and other countries.
Cryptocurrency mining is becoming a bigger issue for security, as criminals can profit without investing much in their own malware creations.
“For end users, however, the impact isn’t just about system wear-and-tear or performance issues. From January 1 to June 24, for instance, our sensors noted that 20% of cryptocurrency-mining activities entailed web- and network-based attacks. From cross-site scripting and remote code execution to brute force attacks and SQL injection, intrusive and malicious cryptocurrency miningcan threaten the availability and security of a network or system, and the data stored on them. Worse, victims become part of the problem,” researchers state.
Trend Micro recommends the following best practices to prevent and mitigate cryptocurrency mining attacks: