Breaking

General Bytes ATMs Hacked, Hackers Exploit Zero-day Vulnerability

Leading Bitcoin ATM manufacturer General Bytes recently disclosed that hackers stole cryptocurrency from the company and its customers using a zero-day vulnerability in its BATM management platform. Here’s what we know about the incident.

Exploited zero-day vulnerability

Hackers exploited a zero-day vulnerability tracked as BATM-4780 to remotely upload a Java application via the ATM’s master service interface and run it with ‘batm’ user privileges.

After uploading the Java application, the threat actors gained access to the database, API keys, and hot wallets of compromised devices, as well as user names and password hashes.

Breached customers and cloud service

General Bytes warned that its customers and its own cloud service were breached during the attacks. The company urged customers to install the latest updates to protect their servers and funds from attackers. The company also provided a list of cryptocurrency addresses used by the hacker during the attack.

Shuttering cloud service and releasing security fix

General Bytes announced that it is shuttering its cloud service because it finds it “theoretically (and practically) impossible” to secure it from bad actors while providing access to multiple operators.

The company will provide support with data migration to those who would like to install their own standalone CAS behind a firewall and VPN. The company has also released a CAS security fix that addresses the exploited vulnerability.

Multiple security audits planned

General Bytes had a security incident in August 2022, and the company plans to conduct numerous security audits of its products by multiple companies in a short period to discover and fix other potential flaws before bad actors find them.

Although the company disclosed how much money the attacker stole, they provided a list of cryptocurrency addresses used by the hacker during the attack.

The importance of timely updates

This recent hack underscores the importance of timely updates for software and systems that deal with sensitive information and transactions.

As General Bytes explained in its security incident disclosure, the attackers were able to exploit a zero-day vulnerability in its BATM management platform. A zero-day vulnerability is a software vulnerability that is unknown to the vendor or manufacturer, making it difficult to patch or fix until it is discovered and disclosed.

In this case, the company had released a patch for the vulnerability before the attack occurred. However, some customers had not updated their systems in time, leaving them vulnerable to attack.

This incident highlights the need for companies and individuals to stay up-to-date with security patches and software updates. Failing to do so can leave systems and data vulnerable to attack, putting both the company and its customers at risk.

General Bytes’ response

General Bytes has taken swift action in response to the hack. The company has released patches to fix the exploited vulnerability and has provided detailed instructions for customers on how to protect their systems.

In addition, the company is shuttering its cloud service, which it says is “theoretically (and practically) impossible” to secure from bad actors. Instead, General Bytes is encouraging customers to install their own standalone CAS behind a firewall and VPN.

General Bytes has also pledged to conduct numerous security audits of its products by multiple companies in a short period to discover and fix other potential flaws before bad actors find them.

The General Bytes ATM hack highlights the ongoing threat of cyber attacks on cryptocurrency systems and the need for companies and individuals to take proactive steps to protect their systems and data.

By staying up-to-date with security patches and software updates, companies can reduce the risk of a successful attack. And by conducting regular security audits, companies can identify and fix vulnerabilities before bad actors can exploit them.

As the use of cryptocurrency continues to grow, it is essential that companies and individuals take cybersecurity seriously to protect themselves and their customers from the growing threat of cyber attacks.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

2 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

2 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

2 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

3 months ago