Hackers Attack Crypto Exchange With Bitcoin-Stealing Malware

Hackers Attack Crypto Exchange With Bitcoin-Stealing Malware

A group of hackers attacked a crypto exchange Gate.io, and compromise its web analytics platform to infect users. According to reports, these actors have compromised StaTcouter, a famous site based in Ireland, in an attempt to steal Bitcoin from the users of Gate.io.

The attacker was able to inject a malicious code into the script of the page that had a domain that was really like the one from the original page, named “StatConuter”.  This new domain was harder to spot than many traps. It was the Slovakian cybersecurity firm, ESET, that detected the attack, and in this case, it also affirmed that the domain was also used for a scam back in 2010.

Even though maximum people (2-million) use StatCouter, and were touched by the scam, but only the Gate.io users were affected. The script, targeted “myaccount/withdraw/BTC” from Gate.io. The script replaces the address of the victims with the address from the attackers, so they would send Bitcoin to them instead.

As reported by The Next Web’s Hard Fork, a total of 688,000 sites was affected by the malware as they used StatCounter.

ESET, which originally discovered the whole scheme, alerted the staff of Gate.io as soon as possible about the security breach and the malware was immediately removed from StatCounter. As the address keeps changing, ESET was not able to determine how much money was lost. However, Gate.io handles a volume of $1.7 million USD worth in BTC every day, so the damage might have been bigger.

StatCounter is a lot like Google Analytics and it is used to analyze internet traffic flow. In order to get the statistics directly to your site, you have to use the code of StatCounter and the hackers used this to get the money from the users.

Gate.io is a very reputed company while not a top 10 crypto exchange. At the moment, the company is at 38th at the ranking of the largest crypto exchange by trading volume. The company has also urged its users to always use two-factor authentication and a two-step login protection in order to be free from this kind of scam after the attack happened.

Julia Sowells467 Posts

Julia Sowells has been a technology and security professional. For a decade of experience in technology, she has worked on dozens of large-scale enterprise security projects, and even writing technical articles and has worked as a technical editor for Rural Press Magazine. She now lives and works in New York, where she maintains her own consulting firm with her role as security consultant while continuing to write for Hacker Combat in her limited spare time.

0 Comments

Leave a Comment

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register