Connect with us

News

CoinMarketCap Supply Chain Attack Leaves Crypto Users Reeling After $43,000 Wallet Drain

Published

on

<p data-start&equals;"264" data-end&equals;"392">A malicious script hidden in a homepage image triggered a wallet-draining popup that stole thousands from unsuspecting visitors&period;<&sol;p>&NewLine;<p data-start&equals;"399" data-end&equals;"710">On the evening of June 20&comma; 2025&comma; visitors to CoinMarketCap weren’t expecting anything unusual&period; It looked like a typical day on the world’s most visited cryptocurrency pricing site&period; But what appeared to be a harmless homepage doodle ended up being the digital Trojan horse that siphoned crypto from user wallets&period;<&sol;p>&NewLine;<p data-start&equals;"712" data-end&equals;"905">Within hours&comma; a wave of complaints and concerns started trickling through social media and crypto forums&period; Popups asking users to connect their Web3 wallets&quest; On CoinMarketCap&quest; Something was off&period;<&sol;p>&NewLine;<h2 data-start&equals;"907" data-end&equals;"941">A Wallet Popup No One Asked For<&sol;h2>&NewLine;<p data-start&equals;"943" data-end&equals;"1042">Things started to go sideways when users began encountering strange Web3 wallet connection prompts&period;<&sol;p>&NewLine;<p data-start&equals;"1044" data-end&equals;"1170">Most users thought it was a new feature or maybe an update&period; Instead&comma; the moment they clicked &&num;8220&semi;Connect&comma;&&num;8221&semi; their crypto was gone&period;<&sol;p>&NewLine;<p data-start&equals;"1172" data-end&equals;"1187">Just like that&period;<&sol;p>&NewLine;<p data-start&equals;"1189" data-end&equals;"1355">In a statement posted on X&comma; CoinMarketCap confirmed that threat actors had slipped malicious JavaScript into their homepage through a seemingly innocent doodle image&period;<&sol;p>&NewLine;<p data-start&equals;"1189" data-end&equals;"1355"><a href&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;06&sol;coinmarketcap-website-homepage-screenshot&period;jpg"><img class&equals;"aligncenter size-full wp-image-57732" src&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;06&sol;coinmarketcap-website-homepage-screenshot&period;jpg" alt&equals;"coinmarketcap website homepage screenshot" width&equals;"1101" height&equals;"818" &sol;><&sol;a><&sol;p>&NewLine;<h2 data-start&equals;"1357" data-end&equals;"1401">How a Doodle Image Became the Smoking Gun<&sol;h2>&NewLine;<p data-start&equals;"1403" data-end&equals;"1441">So how did an image become a backdoor&quest;<&sol;p>&NewLine;<p data-start&equals;"1443" data-end&equals;"1631">Well&comma; it wasn’t the image itself&period; It was the JSON payload linked to it&period; According to cybersecurity firm c&sol;side&comma; attackers had tampered with the API CoinMarketCap used to serve that doodle&period;<&sol;p>&NewLine;<p data-start&equals;"1633" data-end&equals;"1771">Once that JSON was loaded&comma; it quietly inserted a script tag referencing static&period;cdnkit&lbrack;&period;&rsqb;io—an external server controlled by attackers&period;<&sol;p>&NewLine;<p data-start&equals;"1773" data-end&equals;"1807">And that’s where the damage began&period;<&sol;p>&NewLine;<ul data-start&equals;"1809" data-end&equals;"2024">&NewLine;<li data-start&equals;"1809" data-end&equals;"1847">&NewLine;<p data-start&equals;"1811" data-end&equals;"1847">The script ran on the user’s browser<&sol;p>&NewLine;<&sol;li>&NewLine;<li data-start&equals;"1848" data-end&equals;"1917">&NewLine;<p data-start&equals;"1850" data-end&equals;"1917">A fake Web3 wallet popup appeared using real CoinMarketCap branding<&sol;p>&NewLine;<&sol;li>&NewLine;<li data-start&equals;"1918" data-end&equals;"1978">&NewLine;<p data-start&equals;"1920" data-end&equals;"1978">Unsuspecting users clicked &OpenCurlyDoubleQuote;connect&comma;” thinking it was safe<&sol;p>&NewLine;<&sol;li>&NewLine;<li data-start&equals;"1979" data-end&equals;"2024">&NewLine;<p data-start&equals;"1981" data-end&equals;"2024">Their wallet contents were drained silently<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p data-start&equals;"2026" data-end&equals;"2212">This wasn’t a direct breach of CoinMarketCap’s servers&period; It was something trickier&colon; a supply chain attack&period; One that worked by compromising a third-party component CoinMarketCap relied on&period;<&sol;p>&NewLine;<h2 data-start&equals;"2214" data-end&equals;"2272">Supply Chain Attacks&colon; Silent&comma; Slippery&comma; and Devastating<&sol;h2>&NewLine;<p data-start&equals;"2274" data-end&equals;"2393">Supply chain attacks are nasty because they don’t go after the big fish directly&period; Instead&comma; they poison the fish’s food&period;<&sol;p>&NewLine;<p data-start&equals;"2395" data-end&equals;"2521">That’s basically what happened here&period; CMC trusted an external source to display a fun little graphic&period; That trust was exploited&period;<&sol;p>&NewLine;<p data-start&equals;"2523" data-end&equals;"2642">In their analysis&comma; c&sol;side wrote&colon; &OpenCurlyDoubleQuote;Such attacks are hard to detect because they exploit trusted elements of a platform&period;”<&sol;p>&NewLine;<p data-start&equals;"2644" data-end&equals;"2813">They’re not wrong&period; From SolarWinds to 3CX&comma; supply chain breaches have made headlines for exactly this reason—they sneak in through the back door everyone forgot to lock&period;<&sol;p>&NewLine;<h2 data-start&equals;"2815" data-end&equals;"2850">A Glimpse Into the Drainer Panel<&sol;h2>&NewLine;<p data-start&equals;"2852" data-end&equals;"2893">The attackers weren’t exactly shy either&period;<&sol;p>&NewLine;<p data-start&equals;"2895" data-end&equals;"3074">More technical details started emerging after a threat actor named Rey posted a screenshot of the drainer control panel on Telegram&period; The panel confirmed some disturbing stats&colon;<&sol;p>&NewLine;<ul data-start&equals;"3076" data-end&equals;"3169">&NewLine;<li data-start&equals;"3076" data-end&equals;"3103">&NewLine;<p data-start&equals;"3078" data-end&equals;"3103">Total stolen&colon; &dollar;43&comma;266<&sol;p>&NewLine;<&sol;li>&NewLine;<li data-start&equals;"3104" data-end&equals;"3128">&NewLine;<p data-start&equals;"3106" data-end&equals;"3128">Total victims&colon; 110<&sol;p>&NewLine;<&sol;li>&NewLine;<li data-start&equals;"3129" data-end&equals;"3169">&NewLine;<p data-start&equals;"3131" data-end&equals;"3169">Language used by attackers&colon; French<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p data-start&equals;"3171" data-end&equals;"3225">Here&&num;8217&semi;s a snapshot of what the attackers were tracking&colon;<&sol;p>&NewLine;<div class&equals;"&lowbar;tableContainer&lowbar;16hzy&lowbar;1">&NewLine;<div class&equals;"&lowbar;tableWrapper&lowbar;16hzy&lowbar;14 group flex w-fit flex-col-reverse" tabindex&equals;"-1">&NewLine;<table class&equals;"w-fit min-w-&lpar;--thread-content-width&rpar;" data-start&equals;"3227" data-end&equals;"3549">&NewLine;<thead data-start&equals;"3227" data-end&equals;"3268">&NewLine;<tr data-start&equals;"3227" data-end&equals;"3268">&NewLine;<th data-start&equals;"3227" data-end&equals;"3253" data-col-size&equals;"sm">Metric<&sol;th>&NewLine;<th data-start&equals;"3253" data-end&equals;"3268" data-col-size&equals;"sm">Value<&sol;th>&NewLine;<&sol;tr>&NewLine;<&sol;thead>&NewLine;<tbody data-start&equals;"3311" data-end&equals;"3549">&NewLine;<tr data-start&equals;"3311" data-end&equals;"3352">&NewLine;<td data-start&equals;"3311" data-end&equals;"3337" data-col-size&equals;"sm">Total Wallets Affected<&sol;td>&NewLine;<td data-start&equals;"3337" data-end&equals;"3352" data-col-size&equals;"sm">110<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"3353" data-end&equals;"3394">&NewLine;<td data-start&equals;"3353" data-end&equals;"3379" data-col-size&equals;"sm">Total Funds Drained<&sol;td>&NewLine;<td data-start&equals;"3379" data-end&equals;"3394" data-col-size&equals;"sm">&dollar;43&comma;266<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"3395" data-end&equals;"3436">&NewLine;<td data-start&equals;"3395" data-end&equals;"3421" data-col-size&equals;"sm">Channel Language<&sol;td>&NewLine;<td data-start&equals;"3421" data-end&equals;"3436" data-col-size&equals;"sm">French<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"3437" data-end&equals;"3485">&NewLine;<td data-start&equals;"3437" data-end&equals;"3463" data-col-size&equals;"sm">Host Site<&sol;td>&NewLine;<td data-start&equals;"3463" data-end&equals;"3485" data-col-size&equals;"sm">static&period;cdnkit&lbrack;&period;&rsqb;io<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"3486" data-end&equals;"3549">&NewLine;<td data-start&equals;"3486" data-end&equals;"3512" data-col-size&equals;"sm">Popup Spoof<&sol;td>&NewLine;<td data-start&equals;"3512" data-end&equals;"3549" data-col-size&equals;"sm">CoinMarketCap Web3 Wallet Connect<&sol;td>&NewLine;<&sol;tr>&NewLine;<&sol;tbody>&NewLine;<&sol;table>&NewLine;<div class&equals;"sticky end-&lpar;--thread-content-margin&rpar; h-0 self-end select-none">&NewLine;<div class&equals;"absolute end-0 flex items-end"><&sol;div>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;<p data-start&equals;"3551" data-end&equals;"3731">While &dollar;43K might not sound like a fortune in crypto terms&comma; that’s not the real point&period; The point is how it was done—stealthy&comma; smart&comma; and practically invisible until it was too late&period;<&sol;p>&NewLine;<h2 data-start&equals;"3733" data-end&equals;"3787">The Bigger Picture&colon; Wallet Drainers Are on the Rise<&sol;h2>&NewLine;<p data-start&equals;"3789" data-end&equals;"3825">Unfortunately&comma; this isn’t a one-off&period;<&sol;p>&NewLine;<p data-start&equals;"3827" data-end&equals;"4067">Wallet drainers have been getting more creative by the month&period; Gone are the days of old-school phishing emails&period; Now&comma; you’ll find them embedded in Twitter ads&comma; disguised as browser extensions&comma; or hiding in cloned versions of popular websites&period;<&sol;p>&NewLine;<p data-start&equals;"4069" data-end&equals;"4231">By some estimates&comma; wallet drainers alone siphoned nearly &dollar;500 million in 2024&period; That’s half a billion gone in less than a year&comma; spread across 300&comma;000&plus; victims&period;<&sol;p>&NewLine;<p data-start&equals;"4233" data-end&equals;"4247">Scary numbers&period;<&sol;p>&NewLine;<p data-start&equals;"4249" data-end&equals;"4376">Mozilla&&num;8217&semi;s even rolled out new measures to spot these scripts in Firefox add-ons&period; That tells you how real the threat has become&period;<&sol;p>&NewLine;<h2 data-start&equals;"4378" data-end&equals;"4437">CoinMarketCap Responds&comma; Users Left Picking Up the Pieces<&sol;h2>&NewLine;<p data-start&equals;"4439" data-end&equals;"4608">CoinMarketCap says the hole is patched&period; Their post on X was quick to reassure users&colon; &OpenCurlyDoubleQuote;We acted immediately… identified the root cause… CoinMarketCap is safe and secure&period;”<&sol;p>&NewLine;<p data-start&equals;"4610" data-end&equals;"4655">But for the 110 victims&comma; it’s little comfort&period;<&sol;p>&NewLine;<p data-start&equals;"4657" data-end&equals;"4746">There’s no customer support line for stolen Ethereum&period; No chargeback button for lost NFTs&period;<&sol;p>&NewLine;<p data-start&equals;"4748" data-end&equals;"4812">In crypto&comma; self-custody means self-responsibility—and self-risk&period;<&sol;p>&NewLine;<p data-start&equals;"4814" data-end&equals;"4952">One user wrote on Reddit&comma; &OpenCurlyDoubleQuote;I only had &dollar;300 in there&comma; but it still hurts&period; I’ve been checking that site for years without a second thought&period;”<&sol;p>&NewLine;<p data-start&equals;"4954" data-end&equals;"4995">That’s exactly what made the attack work&period;<&sol;p>&NewLine;

Hayden Patrick is a writer who specializes in entertainment and sports. He is passionate about movies, music, games, and sports, and he shares his opinions and reviews on these topics. He also writes on other topics when there is no one available, such as health, education, business, and more.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

TRENDING