Incident: Cryptojacking Malware Attack on Australian Government Websites via Browsealoud Plugin

Published Date: 2018-02-12

Postmortem Analysis
Timeline 1. The software failure incident of the Australian government websites being compromised by malware for cryptojacking occurred on Sunday, as mentioned in the article [67996]. 2. The article was published on 2018-02-12. 3. Therefore, the software failure incident happened on Sunday, 2018-02-11.
System 1. Browsealoud browser plug-in made by Texthelp 2. Coinhive script inserted into the Browsealoud software [67996]
Responsible Organization 1. Hackers exploited a vulnerability in the popular browser plug-in Browsealoud, inserting a script known as Coinhive into the software, leading to the cryptojacking attack on government websites [67996].
Impacted Organization 1. Victorian parliament's website 2. Queensland Civil and Administrative Tribunal (QCAT) website 3. Queensland ombudsman's website 4. Queensland Community Legal Centre homepage 5. Queensland legislation website [67996]
Software Causes 1. The software cause of the failure incident was the compromise of the Browsealoud browser plug-in by hackers, who inserted a script known as Coinhive into the software, leading to cryptojacking on government websites [67996].
Non-software Causes 1. Third-party browser plug-in compromise: The malware attack was initiated through a compromise in the popular browser plug-in Browsealoud, which was made by a third-party [67996]. 2. Vulnerability exploitation: Hackers exploited a vulnerability in the Browsealoud plug-in to insert the Coinhive script, leading to the cryptojacking incident [67996].
Impacts 1. The impacted government websites, including the Victorian parliament’s, the Queensland Civil and Administrative Tribunal, the Queensland ombudsman, the Queensland Community Legal Centre homepage, and the Queensland legislation website, were compromised by malware that forced visitors’ computers to secretly mine cryptocurrency, leading to unauthorized cryptocurrency mining [67996]. 2. The malware attack affected thousands of sites globally, including the UK’s National Health Service and the UK’s data protection watchdog, showcasing the widespread impact of the incident [67996]. 3. The compromised browser plug-in Browsealoud, which was exploited by hackers, allowed the insertion of a script known as Coinhive into the software, hijacking users' processing power to mine the cryptocurrency Monero without their consent [67996]. 4. The incident raised concerns about the security vulnerabilities associated with third-party software, as highlighted by security researcher Scott Helme, who emphasized the importance of implementing defense mechanisms to prevent such attacks on government websites [67996]. 5. As a result of the attack, Texthelp took the Browsealoud plugin offline to prevent new visitors from loading the cryptojacking script, and the affected government websites took steps to remove the Browsealoud script entirely to mitigate the impact of the malware [67996].
Preventions 1. Implementing stricter security measures and regular security audits to detect vulnerabilities in third-party software like Browsealoud could have prevented the incident [67996]. 2. Utilizing web application firewalls and intrusion detection systems to monitor and block suspicious activities on government websites could have helped prevent the cryptojacking attack [67996]. 3. Conducting thorough vetting and due diligence on third-party software providers to ensure their systems are secure and not susceptible to compromise could have mitigated the risk of such incidents [67996].
Fixes 1. Implementing stricter security measures to prevent vulnerabilities in third-party software plugins like Browsealoud from being exploited [67996]. 2. Regularly monitoring and auditing third-party software plugins for any unauthorized changes or malicious scripts [67996]. 3. Educating website administrators and developers on best practices for securing government websites against cryptojacking attacks [67996]. 4. Promptly removing compromised plugins and scripts from government websites to mitigate the impact of such incidents [67996].
References 1. Scott Helme, security researcher [67996] 2. Texthelp, makers of Browsealoud [67996]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: The article mentions that in December, nearly 1 billion visitors to video sites like Openload, Streamango, Rapidvideo, and OnlineVideoConverter were also being cryptojacked. This indicates a similar incident of cryptojacking affecting visitors to these video sites, suggesting a recurrence of the software failure incident related to cryptojacking within the same organization or its services [67996]. (b) The software failure incident having happened again at multiple_organization: The article reports that thousands of sites, including the UK’s National Health Service and the UK’s data protection watchdog, were affected by the cryptojacking attack. Additionally, other government sites in Australia such as the City of Casey council, City of Bayswater council, City of Unley council, and the office of the Queensland Public Guardian were also impacted by the same incident. This indicates that the software failure incident of cryptojacking has occurred at multiple organizations, affecting various government and non-government websites [67996].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase was due to a vulnerability in the popular browser plug-in Browsealoud, which was compromised by hackers inserting a script known as Coinhive into the software. This vulnerability allowed the hackers to exploit the processing power of users' computers to mine cryptocurrency without their permission, affecting government websites in Australia and other countries [67996]. (b) The software failure incident related to the operation phase was due to the operation of the compromised Browsealoud plug-in on government websites, including the Victorian parliament's website, the Queensland Civil and Administrative Tribunal, the Queensland ombudsman, and others. The operation of the plug-in allowed the cryptojacking attack to take place, impacting thousands of users who visited these websites [67996].
Boundary (Internal/External) within_system (a) within_system: The software failure incident, in this case, the cryptojacking attack on Australian government websites, was primarily caused by a vulnerability within the system. Hackers exploited a vulnerability in the popular browser plug-in Browsealoud, which was used by the government websites affected. The malware was inserted into the Browsealoud software, allowing the hackers to hijack the processing power of users' computers to mine cryptocurrency without their permission [67996]. Additionally, the affected websites could have implemented better defense mechanisms to prevent such attacks, indicating that the failure was within the system due to inadequate security measures [67996].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurred due to non-human actions, specifically through the compromise of a browser plug-in called Browsealoud by inserting a script known as Coinhive. This script hijacked the processing power of users' computers to mine the cryptocurrency Monero without their permission [67996]. (b) The software failure incident also involved human actions as the hackers exploited a vulnerability in the Browsealoud plug-in, which was made by a third-party company called Texthelp. The security researcher, Scott Helme, mentioned that government websites could have done more to prevent the attack by implementing better defense mechanisms when loading software from third parties [67996].
Dimension (Hardware/Software) software (a) The software failure incident reported in the articles was primarily due to contributing factors originating in software. The incident involved a malware attack known as cryptojacking that affected Australian government websites, including the Victorian parliament's site, due to a compromised browser plug-in called Browsealoud [67996]. The hackers exploited a vulnerability in Browsealoud to insert a script (Coinhive) that hijacked users' computers to mine cryptocurrency without their permission. This incident highlights how vulnerabilities in software can lead to security breaches and impact hardware systems by utilizing their processing power for malicious activities.
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. Hackers compromised government websites, including the Victorian parliament's, by inserting a script known as Coinhive into the Browsealoud software, which hijacked users' computers to mine cryptocurrency without their permission [67996]. This act of cryptojacking was done with the intent to generate profits for the hackers, indicating a malicious objective behind the software failure incident.
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident related to poor_decisions: - The software failure incident of the Australian government websites being compromised by malware for cryptojacking was due to poor decisions made by the third-party browser plug-in, Browsealoud. The plug-in, made by Texthelp, was compromised by hackers who inserted the Coinhive script, leading to the unauthorized mining of cryptocurrency on visitors' computers [67996]. (b) The intent of the software failure incident related to accidental_decisions: - The accidental decisions or unintended consequences in this software failure incident are not explicitly mentioned in the provided article.
Capability (Incompetence/Accidental) accidental (a) The software failure incident in this case was not due to development incompetence but rather due to a vulnerability in a popular browser plug-in called Browsealoud, which was exploited by hackers to insert a script known as Coinhive. This script hijacked the processing power of users' computers to mine the cryptocurrency Monero without their permission [67996]. (b) The software failure incident was accidental in nature as it was caused by hackers compromising the Browsealoud plug-in made by a third-party, Texthelp. The hackers inserted the Coinhive script into the software, leading to the cryptojacking attack on various government websites in Australia and other countries. Texthelp took the Browsealoud plugin offline to address the security breach, indicating that the incident was accidental and not intentionally caused by the developers [67996].
Duration temporary (a) The software failure incident in this case was temporary. The malware attack that led to cryptojacking on government websites, including the Victorian parliament's, was active for a period of four hours on Sunday [67996]. The affected Browsealoud service was temporarily taken offline, and the security breach was addressed [67996].
Behaviour crash, omission, timing, value, other (a) crash: The software failure incident in the articles can be categorized as a crash as the malware injected into the government websites caused the system to lose its state and not perform its intended functions. The malware, known as Coinhive, hijacked the processing power of users' computers to mine cryptocurrency without their permission, leading to the websites being compromised and not functioning as expected [67996]. (b) omission: The incident can also be categorized as an omission failure as the system omitted to perform its intended functions at an instance(s) due to the injection of the cryptojacking script. The affected websites failed to provide their regular services to visitors as they were unknowingly used to mine cryptocurrency, omitting their primary purpose [67996]. (c) timing: The timing of the failure can be considered in this incident as well. The system performed its intended functions, but too late in addressing the security breach. The Browsealoud plugin was taken offline on Monday morning after the attack had already occurred on Sunday, indicating a delayed response in mitigating the issue [67996]. (d) value: The incident can also be related to a value failure as the system performed its intended functions incorrectly. Instead of providing the usual services to visitors, the compromised websites were generating profits for the hackers by mining cryptocurrency using visitors' computers, which was not the intended function of the websites [67996]. (e) byzantine: The byzantine behavior is not explicitly mentioned in the articles. (f) other: The other behavior observed in this software failure incident is unauthorized behavior. The malware injected into the websites caused the system to engage in unauthorized activities, such as mining cryptocurrency without users' consent, which deviated from the legitimate and authorized functions of the websites [67996].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, non-human (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving the cryptojacking attack on Australian government websites resulted in visitors' computers being secretly used to mine cryptocurrency without their permission. This unauthorized use of visitors' computing power generated profits for the hackers [67996].
Domain information, government (a) The failed system was intended to support the information industry. The incident involved government websites, including the Victorian parliament’s website, being compromised by malware that forced visitors’ computers to secretly mine cryptocurrency [67996]. The affected websites included those of various government entities such as the Queensland Civil and Administrative Tribunal, the Queensland ombudsman, and the Queensland legislation website [67996]. Additionally, the Browsealoud plugin, which was exploited by hackers to inject the cryptojacking script, is a program that converts website text to audio for visually impaired users [67996].

Sources

Back to List