AD
AD
  • General Bytes, a leading cryptocurrency ATM manufacturer reported it was recently hacked.
  • The firm tracked that the hacker involved has reportedly made away with $1.5 million worth of Bitcoin (BTC). 

The week before saw a handful of traditional banks take a massive hit in the United States. This time, crypto seems to have been hit with its own fair share of pushbacks, as a leading global cryptocurrency ATM manufacturer recently got exploited by hackers.

General Bytes, one of the world’s leading cryptocurrency automated teller machine (ATM) manufacturers, experienced a security breach on the 17th and 18th of March.

The hacker went on to liquidate 56.28 Bitcoins, which was valued at a staggering $1.5 million at the time of the attack. The stolen Bitcoins were taken from cryptocurrency ATM operators in the United States. The number of affected operators sitting between 15 and 20. A significant number of ATM operators in the country were forced to shut down briefly.

On the 28th of March, a day after the incident, the firm took to Twitter to inform the public about the incident. The firm notified that a statement has been released, informing customers to ensure that their personal information as well as their funds, are safe.

“On March 17-18th, 2023, GENERAL BYTES experienced a security incident. We released a statement urging customers to take immediate action to protect their personal information.We urge all our customers to take immediate action to protect their funds and personal information and carefully read the security bulletin.” The company wrote in a tweet.

General Bytes details how customers can spot a server breach

In the bulletin, the company explained that the attacker succeeded in uploading his own Java application remotely. This was done using the master service interface which is typically utilized by terminals, to upload and run videos using batm user privileges.

This would later result in gaining access to certain information that would have otherwise been private. The hacker gained the ability to access the database. The data was also able to read and decrypt API keys that are typically used to access funds in hot wallets and exchanges.

Additionally, the hacker could send funds from hot wallets, as well as download user names, their password hashes and switch off their two factor authentication. The hacker could also access terminal event logs and scan for any instance where customers canned private key at the ATM. The bulletin also outlined the steps users could take to find out if your server was breached.

“Investigate your master.log and admin.log files and look for time gaps that your server wasn’t logging anything. Typically you will only see one day of events. The attacker was deleting these logs to conceal his activity. This is a certain indicator of attack.” The bulletin explained.

Subscribe to our daily newsletter!


          No spam, no lies, only insights. You can unsubscribe at any time.

This article is provided for informational purposes only and is not intended as investment advice. The content does not constitute a recommendation to buy, sell, or hold any securities or financial instruments. Readers should conduct their own research and consult with financial advisors before making investment decisions. The information presented may not be current and could become outdated.

Olivia Brooke has been writing about cryptocurrencies since 2018. She's currently fascinated by NFTs and remains committed to learning and writing about the broader cryptocurrency industry. Olivia holds a Master's degree in Economics, which has provided her with a strong analytical background to delve deeper into the economic implications and financial aspects of the cryptocurrency world. Her expertise and passion for the subject make her a valuable resource for understanding the dynamic landscape of digital assets and blockchain technology. Business Email: info@crypto-news-flash.com Phone: +49 160 92211628

Exit mobile version