Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Bitcoin Hit By Gameover Malware, Chinese Crackdown

China gets tough with exchanges trading Bitcoins, while new malware variant targets Bitcoin customers.

Top 10 Cloud Fiascos
Top 10 Cloud Fiascos
(click image for larger view)

Bitcoin aficionados were hit with a double whammy Wednesday, after China's largest Bitcoin exchange, BTC China Exchange, stopped accepting Chinese Yuan. The same day, security experts warned that a new variant of the Gameover malware, which is based on the Zeus banking Trojan, has begun targeting Bitcoin exchanges.

News of the blocking of Chinese Yuan (a.k.a. renminbi) deposits at Shanghai-based BTC China triggered a Bitcoin selloff, which caused the currency to lose about half of its value, dropping from a high of $1,250 Wednesday to a Bitcoin being offered for sale for just $636. At the Mt Gox exchange, meanwhile, the value of a Bitcoin Wednesday was averaging about $570.

The Chinese central bank's Bitcoin crackdown -- seen by some commentators as the government's attempt to bring the volatile virtual currency under control -- reportedly sparked a retaliatory series of distributed denial-of-service attacks that disrupted the website of the People's Bank of China.

[ Is mobile security improving? Read Android AV Improves But Still Can't Nuke Malware.]

The crackdown started last month, when the People's Bank of China prohibited the country's financial institutions from handling Bitcoins. On Monday, the central bank expanded that prohibition, telling all third-party payment providers that they must cease providing clearing services to all cryptographic virtual currencies -- including Bitcoin and Litecoin -- by the end of January.

"We essentially got notice from our third-party payment provider that they will discontinue accepting payments for us and new deposits," BTC China CEO Bobby Lee told the South China Morning Post. "We're still operating a bitcoin exchange in China, legally, and we're still allowing people to deposit and withdraw bitcoin and withdraw renminbi."

BTC China has been the world's largest Bitcoin exchange, handling 40% of the world's Bitcoin trading. But much of that trading has come from mainland China.

"A lot of people put Bitcoin's rise over recent months to China where interest in it has gone through the roof," Emily Spaven, editor of digital currency news site CoinDesk, told the BBC. "People are getting frightened that with the new regulations the country could now drop out of the ecosystem. Going forward, it's certainly not the end of Bitcoin, but people have been panic selling."

Beyond the wildly fluctuating value of Bitcoins, Bitcoin aficionados should also beware a new version of the Gameover banking malware, which has been updated to steal login credentials for Bitcoin exchanges. That warning was sounded by cybercrime expert Etay Maor, who works for IBM's Trusteeer. He said in an interview that the Bitcoin-targeting malware variant has been active since at least Nov. 29.

"This Gameover variant waits until an infected user attempts to log into the BTC China website," Maor said in a related blog post. "When this occurs, the malware steals the victim's username and password and suspends the session temporarily." That pause is so the malware can launch a social engineering attack against the user, by employing HTML injection to request that the user of the infected PC share the one-time password sent by BTC China to authorize the transaction.

"Once the cybercriminal has the victim's credentials he can easily perform an account takeover and assume control of the Bitcoins associated with the account," Maor said.

The Gameover variant is just the latest attack to be launched against Bitcoin users and exchanges. Many previous attacks have targeted -- and drained -- free e-wallet services that allow people to store their Bitcoins online. One of the virtues of attacking those sites is that if a hacker is successful, he can sell the stolen cryptographic currency anonymously.

"By definition, it won't be traceable," said Maor.

Mathew Schwartz is a freelance writer, editor, and photographer, as well the InformationWeek information security reporter.

InformationWeek Conference is an exclusive two-day event taking place at Interop where you will join fellow technology leaders and CIOs for a packed schedule with learning, information sharing, professional networking, and celebration. Come learn from each other and honor the nation's leading digital businesses at our InformationWeek Elite 100 Awards Ceremony and Gala. You can find out more information and register here. In Las Vegas, March 31 to April 1, 2014.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
David F. Carr
50%
50%
David F. Carr,
User Rank: Strategist
12/18/2013 | 10:05:24 PM
Is this where bitcoin comes unraveled?
Have to wonder if this is the beginning of the end. At least the dollar is backed by God.
Mathew
50%
50%
Mathew,
User Rank: Apprentice
12/19/2013 | 5:52:52 AM
Re: Is this where bitcoin comes unraveled?
Wait, wasn't that the Illuminati? Paging Dan Brown ... 
Brian.Dean
100%
0%
Brian.Dean,
User Rank: Apprentice
12/19/2013 | 8:52:33 AM
Re: Is this where bitcoin comes unraveled?
I guess as long as the Chinese central bank has more mass then BitCoin -- the result will always be the same. Speaking of mass, I don't know why the central bank would even bother going after BitCoin, I mean it's not like BitCoin is a super AI using computational resource under the cloak of mining and transactions. 
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...