A recent report has made it known that a target-specific bug has been found in the code of a popular traffic counter service— Statcounter. The target website, in this case, is a popular crypto exchange —Gate.io. Based on the report, Gate.io uses the Statcounter enterprise-quality analytics service to track its web presence. As a result of this, the attackers were able to infiltrate the less secured Statcounter codes and use it as a backdoor into the exchange.
The researcher also reported that the malicious code specifically targeted the withdrawal interface of the Gate.io code and no other section of the website was affected. How the Statcounter code got compromised is still not clear but the attack has been described as a very sophisticated one.
It was reported that for each attack a new bitcoin address is been generated. This means the code is practically part of the website and not restricted to a single browser. As a result of this, all users of the platform becomes a target.
Faou made it known that the code will not work on any other type of website as the structuring was designed to match that of the exchange.
The Statcounter script has been Removed from Gate.io
Since their attention was brought to the malicious code in the Statcounter script, Gate.io has removed the script from there webpage.
Based on the report released by the exchange, no attack has been recorded. This is because the breach was discovered before anyone made a withdrawal. The report also made it known that even though the code is a sophisticated one, it has failed to do its job when tested.