Attacks/Breaches
12/18/2013
02:35 PM
Connect Directly
RSS
E-Mail
50%
50%

Bitcoin Hit By Gameover Malware, Chinese Crackdown

China gets tough with exchanges trading Bitcoins, while new malware variant targets Bitcoin customers.

Top 10 Cloud Fiascos
Top 10 Cloud Fiascos
(click image for larger view)

Bitcoin aficionados were hit with a double whammy Wednesday, after China's largest Bitcoin exchange, BTC China Exchange, stopped accepting Chinese Yuan. The same day, security experts warned that a new variant of the Gameover malware, which is based on the Zeus banking Trojan, has begun targeting Bitcoin exchanges.

News of the blocking of Chinese Yuan (a.k.a. renminbi) deposits at Shanghai-based BTC China triggered a Bitcoin selloff, which caused the currency to lose about half of its value, dropping from a high of $1,250 Wednesday to a Bitcoin being offered for sale for just $636. At the Mt Gox exchange, meanwhile, the value of a Bitcoin Wednesday was averaging about $570.

The Chinese central bank's Bitcoin crackdown -- seen by some commentators as the government's attempt to bring the volatile virtual currency under control -- reportedly sparked a retaliatory series of distributed denial-of-service attacks that disrupted the website of the People's Bank of China.

[ Is mobile security improving? Read Android AV Improves But Still Can't Nuke Malware.]

The crackdown started last month, when the People's Bank of China prohibited the country's financial institutions from handling Bitcoins. On Monday, the central bank expanded that prohibition, telling all third-party payment providers that they must cease providing clearing services to all cryptographic virtual currencies -- including Bitcoin and Litecoin -- by the end of January.

"We essentially got notice from our third-party payment provider that they will discontinue accepting payments for us and new deposits," BTC China CEO Bobby Lee told the South China Morning Post. "We're still operating a bitcoin exchange in China, legally, and we're still allowing people to deposit and withdraw bitcoin and withdraw renminbi."

BTC China has been the world's largest Bitcoin exchange, handling 40% of the world's Bitcoin trading. But much of that trading has come from mainland China.

"A lot of people put Bitcoin's rise over recent months to China where interest in it has gone through the roof," Emily Spaven, editor of digital currency news site CoinDesk, told the BBC. "People are getting frightened that with the new regulations the country could now drop out of the ecosystem. Going forward, it's certainly not the end of Bitcoin, but people have been panic selling."

Beyond the wildly fluctuating value of Bitcoins, Bitcoin aficionados should also beware a new version of the Gameover banking malware, which has been updated to steal login credentials for Bitcoin exchanges. That warning was sounded by cybercrime expert Etay Maor, who works for IBM's Trusteeer. He said in an interview that the Bitcoin-targeting malware variant has been active since at least Nov. 29.

"This Gameover variant waits until an infected user attempts to log into the BTC China website," Maor said in a related blog post. "When this occurs, the malware steals the victim's username and password and suspends the session temporarily." That pause is so the malware can launch a social engineering attack against the user, by employing HTML injection to request that the user of the infected PC share the one-time password sent by BTC China to authorize the transaction.

"Once the cybercriminal has the victim's credentials he can easily perform an account takeover and assume control of the Bitcoins associated with the account," Maor said.

The Gameover variant is just the latest attack to be launched against Bitcoin users and exchanges. Many previous attacks have targeted -- and drained -- free e-wallet services that allow people to store their Bitcoins online. One of the virtues of attacking those sites is that if a hacker is successful, he can sell the stolen cryptographic currency anonymously.

"By definition, it won't be traceable," said Maor.

Mathew Schwartz is a freelance writer, editor, and photographer, as well the InformationWeek information security reporter.

InformationWeek Conference is an exclusive two-day event taking place at Interop where you will join fellow technology leaders and CIOs for a packed schedule with learning, information sharing, professional networking, and celebration. Come learn from each other and honor the nation's leading digital businesses at our InformationWeek Elite 100 Awards Ceremony and Gala. You can find out more information and register here. In Las Vegas, March 31 to April 1, 2014.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
David F. Carr
50%
50%
David F. Carr,
User Rank: Apprentice
12/18/2013 | 10:05:24 PM
Is this where bitcoin comes unraveled?
Have to wonder if this is the beginning of the end. At least the dollar is backed by God.
Mathew
50%
50%
Mathew,
User Rank: Apprentice
12/19/2013 | 5:52:52 AM
Re: Is this where bitcoin comes unraveled?
Wait, wasn't that the Illuminati? Paging Dan Brown ... 
Brian.Dean
100%
0%
Brian.Dean,
User Rank: Apprentice
12/19/2013 | 8:52:33 AM
Re: Is this where bitcoin comes unraveled?
I guess as long as the Chinese central bank has more mass then BitCoin -- the result will always be the same. Speaking of mass, I don't know why the central bank would even bother going after BitCoin, I mean it's not like BitCoin is a super AI using computational resource under the cloak of mining and transactions. 
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5701
Published: 2014-10-20
Multiple SQL injection vulnerabilities in dotProject before 2.1.7 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) search_string or (2) where parameter in a contacts action, (3) dept_id parameter in a departments action, (4) project_id[] parameter in a project ...

CVE-2012-5865
Published: 2014-10-20
SQL injection vulnerability in dispatch.php in Achievo 1.4.5 allows remote authenticated users to execute arbitrary SQL commands via the activityid parameter in a stats action.

CVE-2012-5866
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in include.php in Achievo 1.4.5 allows remote attackers to inject arbitrary web script or HTML via the field parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.