LOADING

Type to search

CoinMarketCap Wallet Drainer Attack Stole Crypto From Over 100 Users

Cybersecurity News

CoinMarketCap Wallet Drainer Attack Stole Crypto From Over 100 Users

Share
CoinMarketCap Wallet Drainer Attack Stole $43K

CoinMarketCap, a leading crypto price tracker, briefly fell victim to a supply chain attack on June 20, 2025. Visitors to the site unknowingly interacted with a malicious Web3 popup, which prompted them to connect their wallets. Once users complied, a hidden script drained over $43,000 worth of crypto from at least 110 wallets. The attack stemmed from a compromised doodle image on CoinMarketCap’s homepage that injected harmful JavaScript via a tampered API. 

Table of Contents

Key Takeaways:

  • Date of breach: June 20, 2025
  • Exploit type: Homepage doodle script injection via API
  • Stolen funds: $43,266 from 110 wallets
  • Delivery method: Fake Web3 popup using CMC branding
  • Source: Malicious script from static.cdnkit[.]io
  • Nature of attack: Supply chain via third-party resource
  • Ongoing risk: Wallet drainers stole ~$500M in 2024 alone

The malicious script was delivered from a third-party domain, static.cdnkit[.]io, through a JSON payload linked to the doodle. It triggered a fake wallet connection prompt mimicking CoinMarketCap’s design, leading users to believe the prompt was legitimate. The attackers used this trick to access and empty connected wallets.

CoinMarketCap confirmed the breach on X, explaining their security team acted swiftly to remove the compromised content and fix the issue. “All systems are now fully operational, and CoinMarketCap is safe and secure for all users,” their statement read. They’ve since isolated the vulnerability and implemented safeguards to prevent similar incidents.

Cybersecurity firm c/side analyzed the attack and classified it as a supply chain compromise. The attackers didn’t breach CoinMarketCap’s core servers directly. Instead, they manipulated a third-party element the site trusted—making detection significantly harder.

A threat actor known as Rey later shared a screenshot of the attacker’s drainer panel in a Telegram group, where the cybercriminals communicated in French. The panel confirmed the amount stolen and the number of victims.

This incident adds to the growing list of Web3 wallet drainer attacks. Unlike typical phishing scams, wallet drainers often spread through spoofed websites, ads, browser extensions, and fake popups. In 2024 alone, these attacks siphoned nearly $500 million from over 300,000 wallets.

In response to the rising threat, Mozilla has begun scanning browser extensions submitted to the Firefox Add-on store for wallet-draining behavior. While CoinMarketCap has resolved this breach, the episode underscores how vulnerable even well-established platforms can be through third-party assets.

Author

  • Maya Pillai is a tech writer with 20+ years of experience and a diploma in Computer Applications. She specializes in cybersecurity—covering ransomware, endpoint protection, and online threats—on her blog The Review Hive. Her content makes cybersecurity simple for individuals and small businesses. Maya also mentors content writers at mayapillaiwrites.com, combining technical know-how with storytelling. She’s eligible for the (ISC)² Certified in Cybersecurity exam.

    View all posts
Tags:
Maya Pillai

Maya Pillai is a tech writer with 20+ years of experience and a diploma in Computer Applications. She specializes in cybersecurity—covering ransomware, endpoint protection, and online threats—on her blog The Review Hive. Her content makes cybersecurity simple for individuals and small businesses. Maya also mentors content writers at mayapillaiwrites.com, combining technical know-how with storytelling. She’s eligible for the (ISC)² Certified in Cybersecurity exam.

  • 1