Users of the popular Agora Marketplace have been targeted by unknown crooks who sent them malicious messages trough their PM system. The messages contain a malicious java script exploit that was designed to drain the Bitcoins from the victim’s wallet.
“Immediately after I clicked to open the page, tons of Agora tabs opened up saying “Unable to withdraw amount: 1.0000000”, “Unable to withdraw amount: 2.0000000″, etc. and there were like at least 20 pages with different amounts. 2.0, 0.5, etc. Luckily I had only like $20 in my account.” reported one of the victims in a discussion started on Reddit.
The following image was reported by the popular deepdotweb.com:
When Agora users click the link in the message, the malicious JS code tries to exploit a CSRF vulnerability in the Dark Market to steal users fund from Agora’s wallet as well as changing the users PGP key and reset his PIN code.
As reported by DeepDotWeb, the exploit could be successfully exploited if the following conditions are respected:
The user has to have an active session open with Agora
The user must have JS enabled
See an unknown link and be dumb enough to click on it
The complete code of the malicious exploit is available on Pastebin.
In order for the exploit to work:
Agora users are advised, don’t click on any link in a message, the suggestion is particulrly important for Agora vendors.
(Security Affairs – Agora Dark market, cybercrime)
Qualys warns of two information disclosure flaws in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise…
Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…
The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…
ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
This website uses cookies.