Topic: Security A researcher has published a proof-of-concept (PoC) project called CoffeeMiner which shows how threat actors can exploit public Wi-Fi networks to mine cryptocurrencies. Last week, a software developer called Arnau disclosed research into how public networks offering access to the Internet can be harnessed to generate revenue for attackers.

Interest in cryptocurrency has grown of late due to the surge in pricing for Bitcoin (BTC) and to a lesser extent, Ethereum (ETH). However, cryptocurrency has always been a common factor for some cyberattackers which utilize ransomware to force their victims to pay a “ransom” to gain access to compromised systems locked by malware.

According to the developer, public Wi-Fi may also now be a source of income for hackers that successfully pull off Man-in-The-Middle (MiTM) attacks to launch cryptocurrency miners. The project, released to the public for academic study, leans upon the recent discovery of a cryptocurrency miner discovered on a Starbucks Wi-Fi network.

CoffeeMiner works in a similar way. The attacking code aims to force all devices connected to a public Wi-Fi network to covertly mine cryptocurrency.

The attack works through the spoofing of Address Resolution Protocol (ARP) messages by way of the dsniff library which intercepts all traffic on the public network. Find and fix IP conflicts in two clicks Mitmproxy is then used to inject JavaScript into pages the Wi-Fi users visit. Read more from…

thumbnail courtesy of