{"id":12458,"date":"2025-06-23T12:34:51","date_gmt":"2025-06-23T19:34:51","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=12458"},"modified":"2025-06-23T12:34:51","modified_gmt":"2025-06-23T19:34:51","slug":"coinmarketcap-briefly-hacked-to-drain-crypto-wallets-via-fake-web3-popup","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2025\/06\/23\/coinmarketcap-briefly-hacked-to-drain-crypto-wallets-via-fake-web3-popup\/","title":{"rendered":"CoinMarketCap Briefly Hacked to Drain Crypto Wallets via Fake WEB3 Popup"},"content":{"rendered":"\n<p>You really should have known better, and use a hardware wallet that requires you to confirm transactions on the hardware wallet, which also hides your private keys from the internet connected computer. Anything just on a computer or phone is hackable, and you shouldn&#8217;t have much value stored within it. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/coinmarketcap-briefly-hacked-to-drain-crypto-wallets-via-fake-web3-popup\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bleepingcomputer.com\/news\/security\/coinmarketcap-briefly-hacked-to-drain-crypto-wallets-via-fake-web3-popup\/<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_19adcf1d-e79c-4968-a5fb-83873cdcea18\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<p>By Lawrence Abrams<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2024\/12\/05\/Cryptocurrency.jpg\" alt=\"Cryptocurrency\"\/><\/figure>\n\n\n\n<p>CoinMarketCap, the popular cryptocurrency price tracking site, suffered a website supply chain attack that exposed site visitors to a wallet drainer campaign to steal visitors&#8217; crypto.<\/p>\n\n\n\n<p>On Friday evening, January 20, CoinMarketCap visitors <a href=\"https:\/\/twitter.com\/DarkWebInformer\/status\/1936209452878745680\" target=\"_blank\" rel=\"noreferrer noopener\">began seeing Web3 popups<\/a> asking them to connect their wallets to the site.&nbsp;However, when visitors connected their wallets, a malicious script drained cryptocurrency from them.<\/p>\n\n\n\n<p>The company later confirmed&nbsp;threat actors utilized a vulnerability in the site&#8217;s homepage &#8220;doodle&#8221;&nbsp;image to inject malicious JavaScript into the site.<\/p>\n\n\n\n<p>&#8220;On June 20, 2025, our security team identified a vulnerability related to a doodle image displayed on our homepage. This doodle image contained a link that triggered malicious code through an API call, resulting in an unexpected popup for some users when visited our homepage,&#8221; reads a statement <a href=\"https:\/\/x.com\/CoinMarketCap\/status\/1936273633611334081\" target=\"_blank\" rel=\"noreferrer noopener\">posted on X<\/a>.<\/p>\n\n\n\n<p>&#8220;Upon discovery, We acted immediately to remove the problematic content, identified the root cause, and comprehensive measures have been implemented to isolate and mitigate the issue.&#8221;<\/p>\n\n\n\n<p>&#8220;We can confirm all systems are now fully operational, and CoinMarketCap is safe and secure for all users.&#8221;<\/p>\n\n\n\n<p>Cybersecurity firm c\/side explained that the attack worked by the threat actors somehow modifying the API used&nbsp;by the site to retrieve a doodle image to display on the homepage. This tampered&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20250620230124\/https:\/\/static.cdnkit.io\/cmc\/6855a83d80876056dab0a5cf.json\" target=\"_blank\" rel=\"noreferrer noopener\">JSON payload<\/a> now included a <a href=\"http:\/\/web.archive.org\/web\/20250620230124\/https:\/\/static.cdnkit.io\/cmc\/popup.js\" target=\"_blank\" rel=\"noreferrer noopener\">malicious script tag<\/a> that injected a wallet drainer script into CoinMarketCap from an external site named &#8220;static.cdnkit[.]io&#8221;.<\/p>\n\n\n\n<p>When someone visited the page, the script would execute and display a fake wallet connect popup showing CoinMarketCap branding and mimicking a legitimate Web3 transaction request. However, this script was actually a wallet drainer designed to steal connected wallets&#8217; assets.<\/p>\n\n\n\n<p>&#8220;This was a supply chain attack, meaning the breach didn&#8217;&nbsp;target CMC&#8217;s own servers but a third-party tool or resource used by CMC,&#8221; <a href=\"http:\/\/medium.com\/@csideai\/coinmarketcap-client-side-attack-a-comprehensive-analysis-by-c-side-ce0b58e77dec\" target=\"_blank\" rel=\"noreferrer noopener\">explains c\/side<\/a>.<\/p>\n\n\n\n<p>&#8220;Such attacks are hard to detect because they exploit trusted elements of a platform.&#8221;<\/p>\n\n\n\n<p>More details about the attack came later from&nbsp;a threat actor <a href=\"https:\/\/x.com\/ReyXBF\/status\/1936276263137574931\" target=\"_blank\" rel=\"noreferrer noopener\">known as Rey<\/a>, who said that the attackers behind the CoinMarketCap supply chain attack shared a screenshot of the drainer panel on a Telegram channel.<\/p>\n\n\n\n<p>This panel indicated that $43,266 was stolen from 110 victims as part of this supply chain attack, with the threat actors speaking in French on the Telegram channel.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/security\/attacks\/c\/coinmarketcap\/coinmarketcap\/drainer-panel.jpg\" alt=\"Screenshot of drainer panel shared on Telegram\"\/><figcaption class=\"wp-element-caption\"><strong>Screenshot of drainer panel shared on Telegram<\/strong><br><em>Source: Rey<\/em><\/figcaption><\/figure>\n\n\n\n<p>As the popularity of cryptocurrency has boomed, so has the threat from wallet drainers, which are commonly used in attacks.<\/p>\n\n\n\n<p>Unlike traditional phishing, these types of attacks are more often promoted through social media posts, advertisements, spoofed sites, and malicious browser extensions that include malicious wallet-draining scripts.<\/p>\n\n\n\n<p>Reports indicate that <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cryptocurrency-wallet-drainers-stole-494-million-in-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">wallet drainers stole almost $500 million <\/a>in 2024 through attacks targeting more than 300,000 wallet addresses.<\/p>\n\n\n\n<p>The problem has become so pervasive that <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/mozilla-launches-new-system-to-detect-firefox-crypto-drainer-add-ons\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mozilla recently introduced a new system<\/a> to detect wallet drainers in browser add-ons uploaded to the Firefox Add-on repository.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You really should have known better, and use a hardware wallet that requires you to confirm transactions on the hardware wallet, which also hides your private keys from the internet connected computer. Anything just on a computer or phone is hackable, and you shouldn&#8217;t have much value stored within it. https:\/\/www.bleepingcomputer.com\/news\/security\/coinmarketcap-briefly-hacked-to-drain-crypto-wallets-via-fake-web3-popup\/ By Lawrence Abrams CoinMarketCap, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-12458","post","type-post","status-publish","format-standard","hentry","category-tech"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/12458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=12458"}],"version-history":[{"count":1,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/12458\/revisions"}],"predecessor-version":[{"id":12459,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/12458\/revisions\/12459"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=12458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=12458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=12458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}