Abstract：The number three manufacturer of bitcoin ATMs in the world, General Bytes, has revealed that one of its ATMs was compromised using a zero-day server port vulnerability to steal cryptocurrencies from users.
To enable the acquisition or sale of more than 40 different cryptocurrencies, General Bytes runs with over 8,000 Bitcoin ATMs spanning more than 120 nations and territories.
The business claimed that criminals leveraged a zero-day weakness in its crypto application server (CAS), allowing access to administrator capabilities, changing the beneficiary wallet address, and permitting individuals to buy and sell cryptocurrencies using stolen cash.
The expression “zero-day,” often termed as “0-day,” alludes to a hacker-used weakness that hasn't yet had the original programming fixed. It is followed by terms like “vulnerability, exploit, or attack.”
General Bytes' version upgrade notes, which were made public on the 18th, stated the following:
“The attacker was able to create an admin user remotely via CAS administrative interface via a URL call on the page used for the default installation on the server and creating the first administration user.”
By scanning TCP port 7777 or 433 on the internet for vulnerabilities, the attackers were able to reach Digital Ocean's cloud hosting infrastructure. They then installed a default administrator user named “gb” to the business's own Cryptography Application Server (CAS).
Then, while waiting for the trader to utilize the ATM to transfer the bitcoin to the hacker wallet, the user can remotely alter the ATM's pre-set “buy,” “sell,” “invalid transaction address,” and other wallet positions.
The company has not yet revealed the exact sum of money taken, the number of stolen ATMs, or the time at which server vulnerabilities were promptly addressed.
The associated vulnerability has been present in the CAS program since version 20201208, according to its security bulletin.
As a reminder, WikiBit is ready to help you search the qualifications and reputation of projects in a bid to protect you from hidden dangers in this risky industry!
WikiBit 2022-11-30 14:28
WikiBit 2022-11-28 17:34
WikiBit 2022-11-30 14:37
WikiBit 2022-11-29 10:59
WikiBit 2022-11-30 13:42
WikiBit 2022-11-29 17:33
WikiBit 2022-11-28 23:58
WikiBit 2022-11-29 18:24
WikiBit 2022-11-28 18:25
WikiBit 2022-11-28 17:18