skip to Main Content
bitcoin
Bitcoin (BTC) $ 97,963.25 1.00%
ethereum
Ethereum (ETH) $ 3,421.81 3.80%
tether
Tether (USDT) $ 1.00 0.21%
solana
Solana (SOL) $ 256.64 1.04%
bnb
BNB (BNB) $ 657.18 5.37%
xrp
XRP (XRP) $ 1.49 2.73%
dogecoin
Dogecoin (DOGE) $ 0.428555 5.38%
usd-coin
USDC (USDC) $ 0.999897 0.11%
cardano
Cardano (ADA) $ 1.06 7.78%
staked-ether
Lido Staked Ether (STETH) $ 3,419.96 3.77%

Malware on Official Monero Website Can Steal Crypto: Investigator

The software available for download on Monero’s (XMR) official website was compromised to steal cryptocurrency, according to a Nov. 19 Reddit post published by the coin’s core development team.

The command-line interface (CLI) tools available at getmonero.org may have been compromised over the last 24 hours. In the announcement, the team notes that the hash of the binaries available for download did not match the expected hashes.

The software was malicious

On GitHub, a professional investigator going by the name of Serhack said that the software distributed after the server was compromised is indeed malicious, stating:

“I can confirm that the malicious binary is stealing coins. Roughly 9 hours after I ran the binary a single transaction drained the wallet. I downloaded the build yesterday around 6pm Pacific time.”

An important security practice

Hashes are non-reversible mathematical functions which, in this case, are used to generate an alphanumeric string from a file that would have been different if someone was to make changes to the file.

It is a popular practice in the open-source community to save the hash generated from software available for download and keep it on a separate server. Thanks to this measure, users are able to generate a hash from the file they downloaded and check it against the expected one.

If the hash generated from the downloaded file is different, then it is likely that the version distributed by the server has been replaced — possibly with a malicious variant. The Reddit announcement reads:

“It appears the box has been indeed compromised and different CLI binaries served for 35 minutes. Downloads are now served from a safe fallback source. […] If you downloaded binaries in the last 24h, and did not check the integrity of the files, do it immediately. If the hashes do not match, do NOT run what you downloaded.”

In general, blockchain development communities are vigilant in tracking possible vulnerabilities and maintaining network integrity.

In mid-September, the developer of Ethereum decentralized exchange protocol AirSwap’s developers announced a different important development for their project’s security. More precisely, they revealed the discovery of a critical vulnerability in the system’s new smart contract.

In order to incentivize network integrity, some organizations have founded bounty programs that reward so-called white-hack hackers for exposing vulnerabilities.

Loading data ...
Comparison
View chart compare
View table compare
Back To Top