follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel . ask urgent question ONLY . Subscribe to our reddit . Altcoins Talks Shop Shop


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here Ads bidding Bidding Open

Author Topic: Top Cryptocurrency News: Hackers Exploit Zero-Day Bug to Steal From General Byte  (Read 395 times)

Offline Gabbartoken

  • Under Review
  • Baby Steps
  • *
  • Activity: 21
  • points:
    2569
  • Karma: -1
  • Trade Count: (0)
  • Referrals: 0
  • Last Active: November 01, 2022, 07:57:39 AM
    • View Profile

  • Total Badges: 5
    Badges: (View All)
    One year Anniversary 10 Posts Search
On August 18, the servers of Bitcoin ATM manufacturer General Bytes were compromised by a zero-day attack, allowing the hackers to designate themselves the default admins and modify settings so that all funds were transferred to their wallet address.
The amount of funds stolen and the number of ATMs affected have not been disclosed, however, the company has urged ATM operators to update their software immediately.

General Bytes, which owns and manages 8827 Bitcoin ATMs in over 120 countries, acknowledged the hack on August 18. The company's headquarters are in Prague, Czech Republic, where the ATMs are also manufactured. The ATMs allow users to buy and sell more than 40 coins.

The vulnerability has existed since August 18, when the hacker's modifications updated the CAS software to version 20201208.

General Bytes has advised customers not to use their General Bytes ATM servers until they have updated their servers to patch releases 20220725.22 and 20220531.38 for customers operating on 20220531.

Customers have also been encouraged to alter their server firewall settings so that the CAS admin interface may only be accessed from approved IP addresses, among other considerations.

General Bytes also encouraged customers to examine their SELL Crypto Setting before reactivating the terminals to ensure that the hackers did not change the settings so that any received funds would instead be retransferred to them (and not the customers).

General Bytes stated that multiple security assessments had been performed since its beginning in 2020, none of which had found this vulnerability.

How the attack happened

According to General Bytes' security advisory team, the hackers used a zero-day vulnerability exploit to obtain access to the company's Crypto Application Server (CAS) and steal the funds.

The CAS server oversees the whole functioning of the ATM, including the execution of crypto buying and selling on exchanges and which currencies are supported.

The company believes the hackers scanned for vulnerable servers operating on TCP ports 7777 or 443, including servers housed on General Bytes' own cloud service.

The hackers then added themselves as a default admin on the CAS, calling themselves gb, and then modified the "buy" and "sell" settings such that any crypto received by the Bitcoin ATM would instead be transferred to the hacker's wallet address.

Read also: Top cryptocurrency news: Moscow Exchange Plans to List Digital Financial Assets by Year's End
for more information visit Coingabbar.com


« Last Edit: August 23, 2022, 12:11:12 PM by Gabbartoken »

Altcoins Talks - Cryptocurrency Forum


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here Ads bidding Bidding Open


 

ETH & ERC20 Tokens Donations: 0x2143F7146F0AadC0F9d85ea98F23273Da0e002Ab
BNB & BEP20 Tokens Donations: 0xcbDAB774B5659cB905d4db5487F9e2057b96147F
BTC Donations: bc1qjf99wr3dz9jn9fr43q28x0r50zeyxewcq8swng
BTC Tips for Moderators: 1Pz1S3d4Aiq7QE4m3MmuoUPEvKaAYbZRoG
Powered by SMFPacks Social Login Mod