There are more and more people wanting to make money through hidden mining every day. Thus, the extraction of digital currencies using the CoinHive service has already reached the websites of government agencies.
A JavaScript miner installed in the website code in order to mine digital currency secretly from users was discovered on the website of the Ukrainian Hydrometeorological Center.
The most interesting thing is that no one hid the presence of the miner; the script was installed at the very beginning of the HTML code. That is, it is not hidden in any masking files, it is not obfuscated and is not covered at all.
Any hidden mining script is recognized by the antivirus program as malware. If they run in a browser, it may cause your computer to freeze. CoinHive ranks sixth on the list of most malicious programs.
It is likely that the site was hacked, like government sites in the US and UK in February, for example.
Recall that then, due to a hacker attack, 4200 sites in the US and UK mined the Monero cryptocurrency from user accounts computers.
On the other hand, perhaps the employees of the Ukrainian Hydrometeorological Center themselves are engaged in hidden mining of digital currencies.
Representatives of the organization have not yet commented on this situation. We follow the news.
You May Also Like
World Bank: Georgia is one of the leaders in global mining
The small post-Soviet republic has managed to take a leading position in the cryptocurrency market. According to the World Bank, almost 5% of Georgians have bought or mined cryptocurrency.
Armenia opened the largest mining farm
Armenia has opened one of the world's largest cryptocurrency mining centers, jointly built by the Armenian holding company Multi Group Concern and the Swedish leader in the crypto mining industry Omnia Tech Limited.
