Eswatini Government's gov

Eswatini Government’s website is running a cryptojacker

The Government of Eswatini’s website,, is running a cryptojacker. Cryptojackers use website visitors’ CPU power to mine cryptocurrency, most often without their knowledge or permission. Data from suggests the JavaScript snippet was added to the site’s HTML source between 28th September and 6th October.

Image of a cryptojacker injection on the Eswatini Government website.

WebMinePool cryptojacker injection on[.]sz.

While sites that are kept open for long periods of time are often the most lucrative – the longer the victim’s browser tab is open, the more cryptocurrency can be mined — criminals are typically not fussy when deploying cryptojackers. Criminals can target large swathes of sites at once, including those using vulnerable or out-of-date software, compromised third-party JavaScript, or with easily guessable administrator credentials.

The cryptojacker on is using the WebMinePool pooling service with the identification key SK_zn6mjzLqJtqExdND4BJr8. A pooling service allows multiple miners to work together to solve computational puzzles to have a greater chance of solving them. Any reward for solving the puzzle is then split amongst the participants. Not all use of web-based cryptocurrency miners is illicit — UNICEF Australia was using Coinhive, a pool that shut down in 2018, for their Hope Page project after gaining user consent.

Eswatini’s official website is not the only government site compromised. Netcraft has detected cryptojacking and other malicious infections on plenty of other sites on government second-level domains including those of Mexico, Brazil, and Indonesia.

Image of a web injection on the Guam Government's website.

A web injection on Guam’s gec.guam[.]gov site.

A script from the driverfortnigtly[.]ga domain is currently referenced on the Guam Election Commission’s website. The domain is now defunct and was previously used for redirecting visitors to other sites.

Netcraft provides anti-cybercrime services to seven governments. To protect domestic internet users we regularly scan and detect web servers that have been compromised and infected with malicious content.

Netcraft’s browser extension and mobile apps defend against non-consensual cryptojackers alongside other JavaScript-borne threats, phishing/malware, fake shops, and other types of cybercrime.

Clickbank Products

Tags: , , , , , , ,
Previous Post
no access to the vps and want to transfer WordPress cPanel site
Web Hosting News

no access to the vps and want to transfer WordPress cPanel site

Next Post
October 2021 Web Server Survey
Web Hosting News

October 2021 Web Server Survey

Leave a Reply

Your email address will not be published.