Skip to main content

CryptoJacking is dead: long live CryptoJacking

Medium
Published: Wed Aug 20 2025 (08/20/2025, 10:50:59 UTC)
Source: AlienVault OTX General

Description

The article discusses the evolution of cryptojacking, from its rise with Coinhive in 2017 to its apparent decline and subsequent resurgence in a more sophisticated form. A new campaign was discovered involving over 3,500 infected websites, using stealthy techniques to mine cryptocurrency without detection. The modern approach involves dropper scripts, environment checks, worker spawning, and C2 communication, prioritizing stealth over resource consumption. This new wave of cryptojacking attacks demonstrates the ongoing cat-and-mouse game between attackers and security measures, highlighting the need for continued vigilance in cybersecurity.

AI-Powered Analysis

AILast updated: 08/20/2025, 12:18:14 UTC

Technical Analysis

This threat describes a resurgence and evolution of cryptojacking campaigns, which initially gained prominence around 2017 with services like Coinhive. Cryptojacking involves unauthorized use of victims' computing resources to mine cryptocurrency, typically Monero, without their consent. The new campaign identified involves over 3,500 infected websites that have been compromised to stealthily mine cryptocurrency. Unlike earlier cryptojacking efforts that were often noisy and resource-intensive, this modern iteration employs sophisticated techniques to evade detection and minimize resource consumption, thereby prolonging the attack's lifespan and reducing the likelihood of user or administrator discovery. Key technical aspects include the use of dropper scripts that deploy the mining payload only after performing environment checks to avoid sandboxed or analysis environments. The mining operations leverage web technologies such as WebAssembly for efficient computation, web workers to run mining tasks in parallel without blocking the main browser thread, and WebSocket communication for command and control (C2) interactions. Obfuscation techniques are used to hide malicious code, and the campaign prioritizes stealth by dynamically spawning workers and adjusting mining intensity based on the environment. This approach reflects a cat-and-mouse dynamic between attackers and defenders, with attackers continuously refining their methods to bypass security controls and remain undetected. Indicators of compromise include specific malicious domains (e.g., yobox.store, trustisimportant.fun, faster.mo) and URLs hosting obfuscated JavaScript mining scripts. The campaign does not rely on exploiting a particular software vulnerability but rather compromises websites to inject mining scripts, making it a widespread threat affecting web users visiting infected sites. Although no known exploits or threat actors are explicitly identified, the scale and sophistication suggest a well-organized campaign. Overall, this threat highlights the ongoing risk posed by cryptojacking, especially as attackers adopt advanced evasion techniques and leverage modern web technologies to maintain persistence and profitability.

Potential Impact

For European organizations, the impact of this cryptojacking campaign can be significant despite its medium severity classification. Organizations hosting or relying on web services that become compromised can suffer degraded system performance, increased electricity costs, and potential reputational damage if customers or partners detect unauthorized mining activities. The stealthy nature of the campaign means infections may go unnoticed for extended periods, allowing attackers to continuously siphon computing resources. This can affect endpoint devices, web servers, and cloud infrastructure, leading to reduced availability and productivity. Furthermore, cryptojacking can serve as a foothold for further malicious activities, such as deploying additional malware or establishing persistent access. For organizations in sectors with strict compliance requirements (e.g., finance, healthcare), undetected cryptojacking could lead to regulatory scrutiny if it results from inadequate security controls. The use of Monero mining also complicates attribution and financial tracking, making it harder to disrupt the attackers' revenue streams. Given the reliance on web technologies, organizations with significant web presence or those whose employees frequently browse the internet are at higher risk. The campaign's use of advanced evasion techniques also challenges traditional detection mechanisms, necessitating more sophisticated monitoring and response capabilities.

Mitigation Recommendations

1. Conduct regular security audits and integrity checks of web assets to detect unauthorized script injections or modifications. 2. Implement Content Security Policy (CSP) headers to restrict the domains from which scripts can be loaded, blocking known malicious domains such as yobox.store, trustisimportant.fun, and faster.mo. 3. Employ advanced endpoint detection and response (EDR) solutions capable of identifying anomalous CPU usage patterns and suspicious WebAssembly or web worker activity indicative of cryptojacking. 4. Monitor network traffic for unusual WebSocket connections or C2 communication patterns associated with mining operations. 5. Use web application firewalls (WAFs) with updated threat intelligence feeds to block malicious payload delivery and prevent exploitation of web infrastructure. 6. Educate employees about cryptojacking risks and encourage cautious browsing habits, especially avoiding suspicious or untrusted websites. 7. Regularly update and patch all web platforms and CMS systems to reduce the risk of compromise that could lead to script injection. 8. Implement browser extensions or security tools that detect and block cryptojacking scripts in real-time. 9. Collaborate with threat intelligence providers to stay informed about emerging cryptojacking domains and indicators of compromise for proactive blocking. 10. For cloud environments, enforce strict access controls and monitor resource usage anomalies that may indicate cryptojacking activity.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cside.dev/blog/cryptojacking-is-dead-long-live-cryptojacking"]
Adversary
null
Pulse Id
68a5a893d0e6cf5fee6c45a2
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://www.yobox.store/karma/karma.js?karma=bs?nosaj=faster.mo
urlhttps://trustisimportant.fun/karma/karma.js?karma=bs?nosaj=faster.mo

Domain

ValueDescriptionCopy
domainfaster.mo
domaintrustisimportant.fun
domainyobox.store
domainwww.yobox.store

Threat ID: 68a5b967ad5a09ad0004938d

Added to database: 8/20/2025, 12:02:47 PM

Last enriched: 8/20/2025, 12:18:14 PM

Last updated: 8/21/2025, 8:11:06 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats