Attacks/Breaches
12/18/2013
02:35 PM
50%
50%

Bitcoin Hit By Gameover Malware, Chinese Crackdown

China gets tough with exchanges trading Bitcoins, while new malware variant targets Bitcoin customers.

Top 10 Cloud Fiascos
Top 10 Cloud Fiascos
(click image for larger view)

Bitcoin aficionados were hit with a double whammy Wednesday, after China's largest Bitcoin exchange, BTC China Exchange, stopped accepting Chinese Yuan. The same day, security experts warned that a new variant of the Gameover malware, which is based on the Zeus banking Trojan, has begun targeting Bitcoin exchanges.

News of the blocking of Chinese Yuan (a.k.a. renminbi) deposits at Shanghai-based BTC China triggered a Bitcoin selloff, which caused the currency to lose about half of its value, dropping from a high of $1,250 Wednesday to a Bitcoin being offered for sale for just $636. At the Mt Gox exchange, meanwhile, the value of a Bitcoin Wednesday was averaging about $570.

The Chinese central bank's Bitcoin crackdown -- seen by some commentators as the government's attempt to bring the volatile virtual currency under control -- reportedly sparked a retaliatory series of distributed denial-of-service attacks that disrupted the website of the People's Bank of China.

[ Is mobile security improving? Read Android AV Improves But Still Can't Nuke Malware.]

The crackdown started last month, when the People's Bank of China prohibited the country's financial institutions from handling Bitcoins. On Monday, the central bank expanded that prohibition, telling all third-party payment providers that they must cease providing clearing services to all cryptographic virtual currencies -- including Bitcoin and Litecoin -- by the end of January.

"We essentially got notice from our third-party payment provider that they will discontinue accepting payments for us and new deposits," BTC China CEO Bobby Lee told the South China Morning Post. "We're still operating a bitcoin exchange in China, legally, and we're still allowing people to deposit and withdraw bitcoin and withdraw renminbi."

BTC China has been the world's largest Bitcoin exchange, handling 40% of the world's Bitcoin trading. But much of that trading has come from mainland China.

"A lot of people put Bitcoin's rise over recent months to China where interest in it has gone through the roof," Emily Spaven, editor of digital currency news site CoinDesk, told the BBC. "People are getting frightened that with the new regulations the country could now drop out of the ecosystem. Going forward, it's certainly not the end of Bitcoin, but people have been panic selling."

Beyond the wildly fluctuating value of Bitcoins, Bitcoin aficionados should also beware a new version of the Gameover banking malware, which has been updated to steal login credentials for Bitcoin exchanges. That warning was sounded by cybercrime expert Etay Maor, who works for IBM's Trusteeer. He said in an interview that the Bitcoin-targeting malware variant has been active since at least Nov. 29.

"This Gameover variant waits until an infected user attempts to log into the BTC China website," Maor said in a related blog post. "When this occurs, the malware steals the victim's username and password and suspends the session temporarily." That pause is so the malware can launch a social engineering attack against the user, by employing HTML injection to request that the user of the infected PC share the one-time password sent by BTC China to authorize the transaction.

"Once the cybercriminal has the victim's credentials he can easily perform an account takeover and assume control of the Bitcoins associated with the account," Maor said.

The Gameover variant is just the latest attack to be launched against Bitcoin users and exchanges. Many previous attacks have targeted -- and drained -- free e-wallet services that allow people to store their Bitcoins online. One of the virtues of attacking those sites is that if a hacker is successful, he can sell the stolen cryptographic currency anonymously.

"By definition, it won't be traceable," said Maor.

Mathew Schwartz is a freelance writer, editor, and photographer, as well the InformationWeek information security reporter.

InformationWeek Conference is an exclusive two-day event taking place at Interop where you will join fellow technology leaders and CIOs for a packed schedule with learning, information sharing, professional networking, and celebration. Come learn from each other and honor the nation's leading digital businesses at our InformationWeek Elite 100 Awards Ceremony and Gala. You can find out more information and register here. In Las Vegas, March 31 to April 1, 2014.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
David F. Carr
50%
50%
David F. Carr,
User Rank: Strategist
12/18/2013 | 10:05:24 PM
Is this where bitcoin comes unraveled?
Have to wonder if this is the beginning of the end. At least the dollar is backed by God.
Mathew
50%
50%
Mathew,
User Rank: Apprentice
12/19/2013 | 5:52:52 AM
Re: Is this where bitcoin comes unraveled?
Wait, wasn't that the Illuminati? Paging Dan Brown ... 
Brian.Dean
100%
0%
Brian.Dean,
User Rank: Apprentice
12/19/2013 | 8:52:33 AM
Re: Is this where bitcoin comes unraveled?
I guess as long as the Chinese central bank has more mass then BitCoin -- the result will always be the same. Speaking of mass, I don't know why the central bank would even bother going after BitCoin, I mean it's not like BitCoin is a super AI using computational resource under the cloak of mining and transactions. 
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

CVE-2015-4232
Published: 2015-07-03
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.

CVE-2015-4234
Published: 2015-07-03
Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127.

CVE-2015-4237
Published: 2015-07-03
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv0...

CVE-2015-4239
Published: 2015-07-03
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report