Users of the popular Agora Marketplace have been targeted by unknown crooks who sent them malicious messages trough their PM system. The messages contain a malicious java script exploit that was designed to drain the Bitcoins from the victim’s wallet.
“Immediately after I clicked to open the page, tons of Agora tabs opened up saying “Unable to withdraw amount: 1.0000000”, “Unable to withdraw amount: 2.0000000″, etc. and there were like at least 20 pages with different amounts. 2.0, 0.5, etc. Luckily I had only like $20 in my account.” reported one of the victims in a discussion started on Reddit.
The following image was reported by the popular deepdotweb.com:
When Agora users click the link in the message, the malicious JS code tries to exploit a CSRF vulnerability in the Dark Market to steal users fund from Agora’s wallet as well as changing the users PGP key and reset his PIN code.
As reported by DeepDotWeb, the exploit could be successfully exploited if the following conditions are respected:
The user has to have an active session open with Agora
The user must have JS enabled
See an unknown link and be dumb enough to click on it
The complete code of the malicious exploit is available on Pastebin.
In order for the exploit to work:
Agora users are advised, don’t click on any link in a message, the suggestion is particulrly important for Agora vendors.
(Security Affairs – Agora Dark market, cybercrime)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.