Cryptojacking Code Discovered in Eleven Open Libraries

By Tyler Smith – Crypto Broker

Over 11 open-source code libraries written in Ruby were found to have a cryptojacking code in them which had been downloaded over a thousand times. On August 21, industry news outlet Decrypt reported that hackers downloaded the software, infected it with malware and then reposted it on the RubyGems platform.

Any user that downloaded the infected software would unknowingly download the malware and their device would mine cryptocurrency. This would be sent to the group or malicious individual who infected the libraries, selling crypto to the markets. The malware also sends the infected host’s address to the attacker, along with other variables that could have included credentials.

A GitHub user posted about the issue regarding the malicious code on August 19. The user said that when the code is executed, the library downloads additional code from Pastebin, a text-hosting service, which would ultimately initiate malicious mining.

A handful of RubyGems users have suggested the platform enable two-factor authentication on accounts to reduce or prevent hacks in which GitHub is to establish security practices expected of maintainer. Event such as these can have an impact sentiment and could result in some seeking to cash out crypto.

Five of the infected libraries were crypto-based, with names like bitcoin_vanity, blockchain_wallet, coin_base and doge_coin. Blockchain_wallet was downloaded 423 times, while coin_base was downloaded 424 times.

According to Cointelegraph’s recent report, cybersecurity company Varonis, discovered a new cryptojacking virus known as “Norman” which mined the cryptocurrency Monero (XMR). Like with most crypto jacking software, the malicious entity would then sell crypto generated back to the markets to fund their activities.

Don’t forget to head over to our platform to sell Bitcoin UK through your trusted Bitcoin broker.

We use cookies to better provide our services. By using our services, you agree toour use of cookies.