February 10, 2016 By Larry Loeb 2 min read

LoanBase, a bitcoin lending site, sent out a security warning to its users on Feb. 7 saying it had been breached by cybercriminals.

Breach Notice

While the email notice from LoanBase was not officially made public, one user allegedly posted a copy of the statement to Reddit.

“We’ve discovered that there was a security breach, which resulted in the loss of roughly around 8 BTC,” the Office of Inadequate Security quoted the notice as saying. “At this stage this is an estimate based on the confirmed breach of 4 user accounts. The maximum amount which may have been lost does not exceed 20 BTC.”

LoanBase went on to describe the attack further, noting that the compromised accounts were not protected by two-factor authentication. Additionally, the attackers managed to gain access to the company’s SQL database, which houses personal information of users, via a vulnerability in the site’s content management system.

An Underlying Problem

We know this much: Attackers managed to breach the company through WordPress. This exploit does not seem to be the same as some previous WordPress attacks that have recently come to attention, such as the attacks leveraging TeslaCrypt.

WordPress is open source and has many known vulnerabilities in the PHP code that powers it. The underlying problem for LoanBase was that its WordPress blog was on the same server as its business area, leaving the entire enterprise open to attack.

Some users opined on public forums that once WordPress was compromised, the financial database, which was probably the same mySQL database, would be easy pickings. That seems to be exactly what happened.

Though the financial losses may be contained, the continuing problem may be misuse of the user information contained in the business database. LoanBase maintains identification documentation for a prolonged period regardless of whether a user requests to have an account deactivated (rather than actually deleted). Such a strategy may aid in money laundering investigations but can also impact user confidentiality.

What’s Next for the Bitcoin Lending Site?

As of this writing, the LoanBase site is active, but the blog area is disabled. One remediation method that LoanBase may apply is the use of static content. Static content would shield the active code of WordPress from attacker exploitation. The static content also loads faster since it does not need to be interpreted. Of course, moving WordPress to another server away from the financial system seems like a good idea.

All users of WordPress must consider the takeaway here: Don’t put the CMS on the same server as your business. Isolate it well to enhance security.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today