follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel . ask urgent question ONLY . Subscribe to our reddit . Altcoins Talks Shop Shop


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here Ads bidding Bidding Open

Author Topic: Gate.io Removes StatCounter Service Following Report of Security Breach  (Read 779 times)

Offline Pegasus

  • Legendary
  • *
  • Activity: 1502
  • points:
    9826
  • Karma: 28
  • Trade Count: (0)
  • Referrals: 0
  • Last Active: May 23, 2023, 06:19:09 PM
    • View Profile

  • Total Badges: 21
    Badges: (View All)
    Fifth year Anniversary Fourth year Anniversary 10 Posts
Crypto exchange Gate.io has removed web analytics tool StatCounter from their website following a breach report by cybersecurity firm ESET, according to an official blog post published today, Nov. 7.
The company has reported that they immediately removed StatCounter's traffic stats service after receiving a security notice by ESET about suspicious behavior. Gate.io claimed they subsequently scanned the website with 56 antivirus products, and “no one reported any suspicious behavior at that time.” However, the firm still changed its traffic tracker, also reporting that “users’ funds are safe.”

On Nov. 6, Slovakia-based cybersecurity firm ESET published a security report claiming that hackers had successfully breached major web analytics tool StatCounter, targeting Bitcoin (BTC) exchanges that use the traffic analytic service. According to ESET researcher Matthieu Faou, the attackers compromised the StatCounter platform — which is reportedly used by more than two million other websites — by modifying the JavaScript (JS) code on each page of the website.

The hackers managed to add a piece of malicious code containing “myaccount/withdraw/BTC,” which intends to replace the destination address of a Bitcoin transfers by crypto exchange users with an address belonging to the attackers.



Modified script at www.statcounter[.]com/counter/counter.js. Source: WeLiveSecurity

According to Faou, who is reportedly the first to detect the “supply-chain attack,” this Uniform Resource Identifier (URI) “myaccount/withdraw/BTC” has been solely valid on crypto exchange Gate.io, allegedly “the main target of this attack.”

Now-ranked the 38th top crypto trading platform by daily trade volume as of press time, the exchange is quite popular in China with a rank of 9,382 in terms of in-country traffic, while its global rank amounts to 33,365, according to SimilarWeb traffic data and analytics tool.

In the conclusion to his report, the ESET researcher stated that the recent security breach again demonstrates the fact that external “JavaScript code is under the control of a third party and can be modified at any time without notice.”

As reported by Cointelegraph earlier this year, JS has been one of the major tools of hackers implemented in cryptojacking. According to the analysis, JS-based browser add-ons and extensions are “extremely vulnerable to hacking attacks” and often used for hidden mining by deploying users computing resources. For example, in mid-October, researchers found a crypto-mining malware that hides itself behind a fake Adobe Flash update.

Source

Altcoins Talks - Cryptocurrency Forum


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here Ads bidding Bidding Open


 

ETH & ERC20 Tokens Donations: 0x2143F7146F0AadC0F9d85ea98F23273Da0e002Ab
BNB & BEP20 Tokens Donations: 0xcbDAB774B5659cB905d4db5487F9e2057b96147F
BTC Donations: bc1qjf99wr3dz9jn9fr43q28x0r50zeyxewcq8swng
BTC Tips for Moderators: 1Pz1S3d4Aiq7QE4m3MmuoUPEvKaAYbZRoG
Powered by SMFPacks Social Login Mod