Posted: 3 Min ReadThreat Intelligence

Cryptojacking Extensions Found on Google Chrome Web Store

Symantec found two Chrome extensions that secretly mine for Monero.

On May 8, we discovered two extensions for Google’s Chrome web browser that secretly perform coin mining after they are installed. Both extensions were found on the official Google Chrome Web Store.

One of the extensions, called 2048, is a version of a popular math-based strategy game. The extension was published in August 2017 and has over 2,100 users, which suggests the publisher has made some profit using the CPU cycles of those users to mine for cryptocurrency.

Figure 1. Strategy game 2048 secretly mines for cryptocurrency
Figure 1. Strategy game 2048 secretly mines for cryptocurrency
Figure 2. The 2048 extension has over 2,100 users
Figure 2. The 2048 extension has over 2,100 users

The other extension, Mp3 Songs Download, claims to be an MP3 downloader but just redirects the user to an MP3 download website when they click on the extension button. The MP3 download website secretly launches a coin-mining script in the background. The Mp3 Songs Download extension was published in June 2017 and has around 4,000 users.

Figure 3. The Mp3 Songs Download Chrome extension has almost 4,000 users
Figure 3. The Mp3 Songs Download Chrome extension has almost 4,000 users
Figure 4. Mp3 Songs Download asks users to click on icon that redirects them to a website which runs a coin-mining script
Figure 4. Mp3 Songs Download asks users to click on icon that redirects them to a website which runs a coin-mining script

Coin-mining script: 2048

The source code for the 2048 extension contains a hardcoded domain that is triggered when Chrome is launched.

Figure 5. 2048 extension source code contains hardcoded domain that is called when Chrome launches
Figure 5. 2048 extension source code contains hardcoded domain that is called when Chrome launches

The form in http://www.madafak[DOT]in/landing sends a POST request with a hidden field to www.madafak[DOT]in after one second.

Figure 6. POST request with hidden field
Figure 6. POST request with hidden field

The main page www.madafak[DOT]in attempts to pass itself off as Google Analytics but it secretly loads a coinminer library (ga.js) in the background.

Figure 7. Website claims to be related to Google Analytics but secretly loads coin-mining library
Figure 7. Website claims to be related to Google Analytics but secretly loads coin-mining library

From the script shown in Figure 7 we can see that the coinminer mines Monero, throttles CPU usage at 0.5 (50 percent), and contains a hardcoded Monero wallet address (5bdd3443937ebe08d3e3c99e9524afc13702eba28340).

Coin-mining script: Mp3 Songs Download

The extension Mp3 Songs Download doesn’t start its coin-mining script until the user clicks on the extension button and is redirected to a website. As the JavaScript in Figure 8 shows, the extension redirects the user to http://mp3song-s[DOT]com.

Figure 8. Mp3 Songs Download extension source code redirects users to another website
Figure 8. Mp3 Songs Download extension source code redirects users to another website

This website looks just like a normal MP3 download site (Figure 9) and actually functions as one. However, it also loads coin-mining JavaScript (VEZ4.js) secretly, which can be seen in the website’s source code (Figure 10). From the source code we can also see the hardcoded wallet key and throttling ratio, which is set at 0, meaning 100 percent of the user’s CPU cycles can be used for mining.

Figure 9. Website looks and functions like a normal MP3 download site
Figure 9. Website looks and functions like a normal MP3 download site
Figure 10. Coin-mining JavaScript shown in website’s source code
Figure 10. Coin-mining JavaScript shown in website’s source code

Impact on users

The coin mining will persist for as long as the browser (with the 2048 extension installed) or website (in the case of the Mp3 Songs Download extension) remains open. The effects of this activity could include device slowdown, overheating batteries, increased energy consumption, and even devices becoming unusable.

Figure 11 shows our test computer’s CPU usage spiking at 100 percent after the Mp3 Songs Download extension was installed.

Figure 11. CPU usage spikes due to Mp3 Songs Download extension
Figure 11. CPU usage spikes due to Mp3 Songs Download extension

Furthermore, the malicious activity of these extensions is made harder to detect by the fact that they function as described. For example, the game 2048 is playable just like any 2048 game and the MP3 website contains downloadable MP3 files. This means that many users will not be suspicious and may not realize their computing power is being hijacked to make money for the developers behind these extensions.

We notified Google about these coin-mining extensions and they have now been removed from the Google Chrome Web Store.

Protection

Symantec and Norton products detect the extensions as the following:

Mitigation

  • Install a suitable security app, such as Norton or Symantec Endpoint Protection, to protect your device and data.
  • Pay close attention to CPU and memory usage on your computer or device. Abnormally high usage could be an indication of coin-mining.
  • Check the app developer’s name, which can be found on the app’s store page. Do an internet search for the developer as there may be users who have had experience of their apps—good or bad.
  • Check the app reviews. While fake reviews are common, they’re often short and generic. There may also be legitimate reviews from users who have figured out that the app isn’t what it appears to be.
Symantec Enterprise Blogs
You might also enjoy
4 Min Read

Cryptojacking: A Modern Cash Cow

Cryptojacking shook up the cyber security landscape in 2017 and 2018. We take an in-depth look at this cyber crime trend.

About the Author

Yuanjing Guo

Associate Software Engineer

Yuanjing is a member of Symantec's Security Technology and Response team who are focused on researching and developing automation technologies in mobile security.

About the Author

Tommy Dong

Sr Princ Software Engineer

Tommy is a member of Symantec's Security Technology and Response team who are focused on researching and providing protection against current and future cyber threats.

Want to comment on this post?

We encourage you to share your thoughts on your favorite social platform.