Hacking Wireless Networks & Use CoffeeMiner To Inject Cryptocurrency Miners

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn3

A developer named Arnau from Spain has released a new project called CoffeeMiner that is designed to hack wireless networks to inject cryptocurrency mining code inside connected browsing sessions.

CoffeeMiner project use the power of man-in-the-middle attack to inject some javascript code in the html pages reached by the connected users, in this scenario all the machines connected to the same WiFi network will mine cryptocurrency for the attacker.

The project works by spoofing ARP messages on a LAN in order to capture unencrypted traffic from other machines on the same network.

“In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker’s MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead.”

CoffeeMiner will use a tool called mitmproxy to inject the following line of HTML code into non-HTTPS (non-encrypted) web pages requested by other users on the network:

http://httpserverIP:8000/script.js

 

When victims view these web pages, the JavaScript code will use your CPU to generate Monero, a cryptocurrency, using CoinHive’s crypto-mining library.

The CoffeeMiner project is available on GitHub.

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn3
The following two tabs change content below.

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Leave a Reply