Profile picture
Bad Packets Report @bad_packets
, 10 tweets, 7 min read Read on Twitter
#Coinhive found on the website of the San Diego Zoo (@sandiegozoo) in the latest high-profile case of #cryptojacking.
How did it get there? @ninoseki shares the details here:
As for why did it happen, we can clearly see the site is running an outdated (vulnerable) version of #Drupal.
I've contacted @sandiegozoo and advised them to remove the code ASAP and update to the latest Drupal version.

Coinhive is injected via obfuscated code found in zoo.sandiegozoo.org/misc/jquery.on…
So who owns vuuwd.com?

WHOIS records indicate it belongs to "X XYZ" who lives on "joker joker" street in China.
While the clearly fake WHOIS data may seem like a dead end, the same email address (goodluck610@foxmail.com) was used to register five other domains. It's likely you'd find malicious activity tied to these as well. One of the domains references less-fake information.
For now we'll stick with the facts at hand:
@sandiegozoo's website compromised to run #Coinhive
Domain used to inject the malware: vuuwd.com
Current hosting provider: @QuadraNet
Domain registrar: @Namecheap
Looking at the historical DNS records on @securitytrails we find vuuwd.com was recently involved in Monero (XMR) mining operations. So it seems fitting to continue the trend with today's cryptojacking incident using #Coinhive.
#Coinhive has been removed from the @sandiegozoo website. @urlscanio confirms the site is clean now as well.
Please unroll.
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Bad Packets Report
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!