Monday, December 23, 2024
HomeCyber Security NewsHackers Exploited a Zero-day Flaw in Bitcoin ATM Servers to Steal Cryptocurrency

Hackers Exploited a Zero-day Flaw in Bitcoin ATM Servers to Steal Cryptocurrency

Published on

SIEM as a Service

General Bytes Bitcoin ATM servers have been exploited by hackers in order to steal cryptocurrency from their customers as a result of a zero-day vulnerability.

Whenever cryptocurrency was deposited or purchased via the ATM, hackers would take advantage of the situation in order to siphon off the funds.

General Bytes manufactures Bitcoin ATMs that are capable of purchasing and selling over 40 different cryptocurrencies, depending on the model.

- Advertisement - SIEM as a Service

There is a CAS that controls the Bitcoin ATMs remotely, enabling the following functions:-

  • Ensures that the ATM is operating as it should
  • What cryptocurrencies are supported
  • Performs transactions on exchanges for the purchase and sale of cryptocurrencies

Zero-day Vulnerability in Bitcoin ATM servers

The CAS software was vulnerable to this zero-day vulnerability since it was released in version 20201208. On August 18th, General Bytes published a security advisory that outlined the following:-

“As part of the attacks, the company’s CAS was exposed to a zero-day vulnerability, which was exploited by the attacker.”

A URL call on the page granted the attacker access to the CAS administrative interface, where the hacker was able to create an admin user remotely. A default installation is performed on this page, along with the creation of the first administrator account on the server.

A scan for any exposures of servers running on any of the following TCP ports was conducted by the threat actors on the internet:- 

  • 7777 
  • 443

The servers at Digital Ocean as well as the servers hosted at General Bytes’ own cloud services are also included in this list.

A default admin user named ‘gb’ was then added to the CAS as a result of exploiting this bug by the threat actors. Then the hacker modified the following things:-

  • ‘buy’ crypto settings
  • ‘sell’ crypto settings
  • ‘invalid payment address’ used with a wallet that is under the control of the hacker

There are two recent server patch releases from General Bytes which need to be applied to customers’ servers before they can begin using their Bitcoin ATMs:-

  • 20220531.38 
  • 20220725.22

Until then, security analysts have strongly urged users to not operate Bitcoin ATMs.

Recommendations

Here below, we have mentioned all the recommendations:-

  • The admin and master services should be stopped.
  • The server needs to be upgraded to 20220725.22.
  • The firewall settings on your server need to be modified.
  • Admin service should be started.
  • Make sure that only two-way machines are deactivated.
  • Ensure that all of your CAS users are reviewed.
  • It is necessary to reset all passwords for all users.
  • You should review your crypto settings in order to make sure they are correct.
  • Make sure that no terminals have been added by the attacker. There is a possibility that you might find BT123456 if your system has been breached.
  • Make sure that the terminals are activated.
  • You may find more information on an attacker’s activity in the admin.log file if you are concerned your system was breached.

Also Read: The Rise of Remote Workers: A Checklist for Securing Your Network – Free E-Book Download

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store,...

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store,...