The Government of Eswatini’s website,
www.gov.sz, is running a
use website visitors' CPU power to mine cryptocurrency, most often without their knowledge or permission.
28th September and
The cryptojacker on
www.gov.sz is using the WebMinePool pooling service with the
SK_zn6mjzLqJtqExdND4BJr8. A pooling service allows multiple miners
to work together to solve computational puzzles to have a greater chance of solving them.
Any reward for solving the puzzle is then split amongst the participants. Not all use of web-based
cryptocurrency miners is illicit — UNICEF Australia was using
Coinhive, a pool that shut down in
2018, for their Hope Page
project after gaining user consent.
Eswatini’s official website is not the only government site compromised. Netcraft has detected cryptojacking and other malicious infections on plenty of other sites on government second-level domains including those of Mexico, Brazil, and Indonesia.
A script from the
driverfortnigtly[.]ga domain is currently referenced on the Guam Election Commission’s website.
The domain is now defunct and was previously used for
redirecting visitors to other sites.
Netcraft provides anti-cybercrime services to seven governments. To protect domestic internet users we regularly scan and detect web servers that have been compromised and infected with malicious content.
Your link here? Advertising on the Netcraft Blog