Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

10,000 Litecoins Worth $230,000 USD Were Stolen!

Newspapers, commentators and bloggers have lately been asking whether digital currencies, such as Bitcoin, are "the new gold". Digital currencies are valuable and so attackers take interest in them just like they do payment card numbers. Just today, we witnessed firsthand a heist of 10,000 Litecoins. Similar to Bitcoin, Litecoin is a peer-to-peer internet currency and is considered to be the second leading digital currency after Bitcoin.

In order to extract crypto coins such as Litecoin, the common method is using mining pools. A mining pool is basically a service (a website) that people register with in order to combine work force in the task of mining coins.

According to the managers of one of the largest Litecoin mining pools, Give Me Coins, a security flaw in the website was abused by an as yet unnamed team or person to steal 10,000 Litecoins. At the time of this writing, a sum of 10,000 Litecoins would be valued at approximately $230,000 USD.

Following is a screenshot from that shows relative distribution of the hashing power across the major pools in the Litecoin network. You will notice that "GiveMeCoins" is rated third in terms of its hash power.

Litecoinpool Hash rate distribution

Many users noticed unauthorized transactions sent to various wallet addresses:

Give Me Coin user's transactions

The pool owners disabled the transfer of coins outside of the website in response to numerous complaints from users about the fraudulent transactions. The pool manager's quick response managed to prevent the attackers from stealing an additional 20,000 Litecoins (valued at roughly $460,000 USD at the time of this writing).

We have found several transactions initiated by the attackers that sent the stolen Litecoins from the Give Me Coins wallets (the coins are kept in the website's wallets until a user requests that coins be transferred to their personal wallet) to the wallets of the attacker or attackers.

Following is a screenshot of a user complaining about a fraud case:

A complaint of a user about a fraud case

Here's a documentation of the transaction in the Litecoin transaction network:

Litecoin chain

At this point the exact vulnerability that led to this breach remains unknown. According to the site manager, the most likely vector was SQL Injection.

Unlike the recent heist of 96,000 Bitcoins from the "Sheep Marketplace" that led the operators of the website to close the website, Give Me Coins promised to refund affected users. Distributing those credits to many of the affected users may already be complete. The website is still working in stealth mode until they will manage to identify the security breach and fully patch it.

This blog post was written by Ben Hayak and Daniel Chechik

Latest SpiderLabs Blogs

Hunting For Integer Overflows In Web Servers

Allow me to set the scene and start proceedings off with a definition of an integer overflow, according to Wikipedia:

Read More

Welcome to Adventures in Cybersecurity: The Defender Series

I’m happy to say I’m done chasing Microsoft certifications (AZ104/AZ500/SC100), and as a result, I’ve had the time to put some effort into a blog series that hopefully will entertain and inform you...

Read More

Trustwave SpiderLabs: Insights and Solutions to Defend Educational Institutions Against Cyber Threats

Security teams responsible for defending educational institutions at higher education and primary school levels often find themselves facing harsh lessons from threat actors who exploit the numerous...

Read More