Getting your Trinity Audio player ready...
|
Hackers strike again—this time with popular analytics script StatCounter, in an attack that researchers say was an attempt to target a specific cryptocurrency exchange.
Researchers at ESET documented how they uncovered the hack, and how it was structured around running functions on a specific page at Gate.io, a cryptocurrency exchange which handles over $1.6 million in BTC transactions daily.
Intriguingly, this means the attack would have compromised millions of StatCounter users as a way of attacking just one specific user, Gate.io, which was running the StatCounter analytics script.
In a blog post, ESET’s Matthieu Faou described how the BTC scammers compromised StatCounter as a way of compromising every website using its analytics package.
“On November 3, attackers successfully breached StatCounter, a leading web analytics platform. This service is used by many webmasters to gather statistics on their visitors—a service very similar to Google Analytics,” Faou wrote. “To do so, webmasters usually add an external JavaScript tag incorporating a piece of code from StatCounter…into each webpage. Thus, by compromising the StatCounter platform, attackers can inject JavaScript code in all websites that use StatCounter.”
On the structure of the hack, Faou said it demonstrates “…how far attackers go to target one specific website, in particular a cryptocurrency exchange. To achieve this they compromised an analytics service’s website, used by more than two million other websites, including several government-related websites, to steal bitcoin from customers of just one cryptocurrency exchange website. “
“It also shows that even if your website is updated and well protected, it is still vulnerable to the weakest link, which in this case was an external resource. This is another reminder that external JavaScript code is under the control of a third party and can be modified at any time without notice,” he said.
StatCounter is used by over 2 million websites, and tracks traffic in the order of 10 billion visits per month—with an Alexa rank of 5000, showing the sheer scale of the security breach.
Due to a particular URL structure indicated in the malicious code, ESET researchers were able to pinpoint specifically one page on the Gate.io exchange website as the ultimate target of the attack. StatCounter has already removed the malicious script, according to the security experts, while Gate.io stopped using StatCounter analytics services to prevent further infections. As of November 6, the “incident is now resolved and both websites can be browsed safely.”
While in this case the BTC scammers were specific in their target, the wider security implications—especially for those still using BTC—are a further reminder of the inherent defects in this cryptocurrency.