A developer named Arnau from Spain has released a new project called CoffeeMiner that is designed to hack wireless networks to inject cryptocurrency mining code inside connected browsing sessions.
The project works by spoofing ARP messages on a LAN in order to capture unencrypted traffic from other machines on the same network.
“In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker’s MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead.”
CoffeeMiner will use a tool called mitmproxy to inject the following line of HTML code into non-HTTPS (non-encrypted) web pages requested by other users on the network:
The CoffeeMiner project is available on GitHub.
Latest posts by Unallocated Author (see all)
- 5 Robust Cybersecurity Practices for Your Email Marketing Campaigns - December 5, 2019
- 5 Insider Threat Solutions You Should Follow in 2019 - November 29, 2019
- Data Breaches That Occurred in 2019 and How Cybersecurity Frameworks Can Work To Prevent Them - November 25, 2019