Learn Insider Threat Detection with Application Response Strategies
Discover how application detection, response, and automated behavior modeling can revolutionize your defense against insider threats.Join Now
Like Google Analytics, StatCounter is also an old, but popular real-time web analytics platform reportedly being used by more than two million websites and generates stats on over 10 billion page views per month.
Here's How Hackers Tried to Steal Bitcoins from Crypto Exchange
The "myaccount/withdraw/BTC" URI is exclusively associated with a gate.io webpage that offers users to make Bitcoin withdrawals and transfers.
The malicious script was intended to replace the destination Bitcoin address of transfers with an address belonging to the hackers.
"The script automatically replaces the destination Bitcoin address with an address belonging to the attackers, for example, 1JrFLmGVk1ho1UcMPq1WYirHptcCYr2jad," Faou explains in a report released Tuesday.
"The malicious server generates a new Bitcoin address each time a visitor loads the statconuter[.]com/c.php script. Thus, it is hard to see how many bitcoins have been transferred to the attackers," he adds.
"As a new Bitcoin address is generated each time the malicious script is sent to the victim, we were not able to see how many bitcoins the attackers have gathered."
Gate.io Removes StatCounter Following Security Breach
Attackers successfully breached StatCounter on November 3, and ESET notified the company on November 5 when it discovered the hack, which the security firm labeled as a "supply chain" attack because the malicious script has appeared on the service used by the target.
"Even if we do not know how many bitcoins have been stolen during this attack, it shows how far attackers go to target one specific website, in particular, a cryptocurrency exchange," the researcher says.
StatCounter removed the malicious script on November 6, several hours before the Gate.io cryptocurrency exchange platform stopped using the popular analytic service to prevent further damage.
Gate.io also claimed the company subsequently scanned its website with 56 antivirus products, and "no one reported any suspicious behavior at that time."
The exchange also reported that its "users' funds are safe," but it did not reveal how many customers who performed transfers between November 3 and 6 had lost their funds, neither promised to reimburse those users.
Gate.io also urged its customers to maximize the security levels on their accounts by enabling two-factor authentication (2FA) and two-step login protection.