CybersecurityFintechNewswireTechnology

CoinMarketCap hacked: Fake Web3 popup drained crypto wallets

▼ Summary

– CoinMarketCap experienced a supply chain attack where a malicious script injected via a homepage “doodle” image drained crypto from visitors’ wallets.
– The attack exploited a vulnerability in an API call, displaying fake Web3 popups that mimicked legitimate wallet connection requests.
Cybersecurity firm c/side confirmed the breach targeted a third-party tool, making it hard to detect as it exploited trusted platform elements.
– Attackers stole $43,266 from 110 victims, with evidence shared on a French-speaking Telegram channel.
– Wallet drainers are a growing threat, stealing nearly $500 million in 2024, prompting Mozilla to enhance detection in browser add-ons.

CoinMarketCap recently fell victim to a sophisticated cyberattack that compromised user crypto wallets through a deceptive Web3 popup. The incident occurred when visitors to the popular cryptocurrency tracking platform encountered fraudulent prompts asking them to connect their digital wallets. Unbeknownst to users, these popups contained malicious scripts designed to siphon funds from connected accounts.

Investigations revealed that hackers exploited a vulnerability in the site’s homepage doodle image, injecting harmful JavaScript code via a manipulated API call. This supply chain attack bypassed CoinMarketCap’s security by targeting a third-party resource rather than the platform’s own servers. Once executed, the script displayed a convincing but fake wallet connection request, tricking users into approving unauthorized transactions.

CoinMarketCap’s security team responded swiftly, removing the compromised content and implementing measures to prevent further exploitation. In a public statement, the company assured users that all systems were restored and deemed secure. However, cybersecurity experts noted the growing sophistication of such attacks, which leverage trusted platform elements to evade detection.

According to cybersecurity firm c/side, the malicious payload originated from an external domain, static.cdnkit[.]io, and was designed to mimic legitimate Web3 interactions. A threat actor known as Rey later shared evidence of the attack’s success, revealing that $43,266 was stolen from 110 victims before the breach was contained.

Wallet drainers have become an increasingly prevalent threat in the crypto space, with attackers employing social media scams, fake ads, and even malicious browser extensions to distribute their scripts. Recent data shows these schemes stole nearly $500 million in 2024 alone, affecting over 300,000 wallet addresses. The surge in such attacks has prompted platforms like Mozilla to enhance security measures, including new systems to detect wallet-draining malware in browser extensions.

As crypto adoption grows, so does the need for heightened vigilance. Users are advised to scrutinize unexpected wallet connection requests and verify the authenticity of Web3 interactions before approving transactions. Platforms, meanwhile, must prioritize third-party risk assessments to prevent similar supply chain breaches in the future.

(Source: Bleeping Computer)

Topics

coinmarketcap supply chain attack 95% malicious script injection 90% web3 popup exploitation 85% third-party tool vulnerability 80% cryptocurrency theft 75% wallet drainers threat 70% cybersecurity response 65% mozilla security enhancements 60% user vigilance crypto transactions 55% third-party risk assessments 50%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.
Close

Adblock Detected

We noticed you're using an ad blocker. To continue enjoying our content and support our work, please consider disabling your ad blocker for this site. Ads help keep our content free and accessible. Thank you for your understanding!