Skip to main contentSkip to navigationSkip to navigation
Person using laptop
The UK’s data protection website is one of many infected by the malware. Photograph: Dominic Lipinski/PA
The UK’s data protection website is one of many infected by the malware. Photograph: Dominic Lipinski/PA

Government websites hit by cryptocurrency mining malware

This article is more than 6 years old

Thousands of sites, including NHS services and the ICO, hijacked by rogue code

Thousands of websites, including those belonging to NHS services, the Student Loans Company and several English councils, have been infected by malware that forces visitors’ computers to mine cryptocurrency while using the site.

Late on Sunday, the website of the UK’s data protection watchdog, the Information Commissioner’s Office, was taken down to deal with the issue after it was reportedly infected by the malware.

Q&A

What is cryptojacking?

Show

Cryptojacking is the use of a computer to mine cryptocurrency without the permission of machine's owner.

A program is loaded on to the unwitting user's machine, typically through the browser when they visit a site with a video or other interactive element, which begins to solve computational problems that generate rewards in the form of cryptocurrency – so called mining. The person, group or organisation that places the program or script on the user's machine then reaps the rewards without compensation for the user.

The user's computer slows down when being cryptojacked as the mining operation is computationally intensive, using electricity at an increased rate and often preventing the computer from operating normally.

Was this helpful?

The cryptojacking script was inserted into website codes through BrowseAloud, a popular plugin that helps blind and partially-sighted people access the web.

More than 5,000 websites have been flooded by the malware. Software known as Coinhive, which quietly uses the processing power of a user’s device to mine open source cryptocurrency Monero, appears to have been injected into the compromised BrowseAloud plugin.

Texthelp, which operates BrowseAloud, took its website down on Sunday while it tried to resolve the problem.

The National Cyber Security Centre confirmed the issue was being investigated, adding there was nothing to suggest members of the public were at risk after the malware attack.

Scott Helme, an IT security consultant, raised the alarm about the malware after he received a message from a friend whose antivirus software had detected an issue after visiting a UK government website.

“This type of attack isn’t new – but this is the biggest I’ve seen. A single company being hacked has meant thousands of sites impacted across the UK, Ireland and the United States,” Helme told Sky News.

“Someone just messaged me to say their local government website in Australia is using the software as well.”

A spokesperson for the National Cyber Security Centre said: “NCSC technical experts are examining data involving incidents of malware being used to illegally mine cryptocurrency.

“The affected services has been taken offline, largely mitigating the issue. Government websites will continue to operate securely. At this stage there is nothing to suggest that members of the public are at risk.”

Most viewed

Most viewed