Criminal steals an 83,000 dollar by traffic cryptocurrency-miners to lead

0
285

A malicious attacker has the beginning of this year in about four months time, for an 83,000 dollars of cryptocurrency stolen. He did this through connections to existing miners to lead to a hijacked mining-pool, discovered Dell Secureworks.

The hijacker could be by means of the border gateway protocol traffic interception. That protocol, which already tend to be unsafe seemed, is based on trust and ensures that different networks with each other to connect. The hijacker used a fake broadcast for his attack.

The attacker could the movement of 51 connections in the period of February to may of this year to redirect to a hijacked mining pool, a collective of miners. The connections were nineteen isps, including Amazon.

The hijacker was allegedly so’n 83.000 dollar, equivalent to about 62.000 euro, booty. Including bitcoin and dogecoin-miners were affected. In march appeared the first signals that someone in the movement consciously for their own benefit omleidde, but at a later date under the affected action by a separate line to the firewall to add. This was the traffic that was destined for the hijacked mining-pool is blocked.

The researchers at Dell Secureworks say the traffic that was intended for the attacker, back to can lead to a router from a Canadian isp. The hijacker has not been identified, but the researchers believe that an employee, former employee, or a hacker behind the attack. The researchers have all the affected isp’s are informed, but there is still no one picked up.

The chance that a similar lucrative attack occurs more frequently, according to Dell Secureworks, incidentally, at least. “The border gateway protocol requires that both networks be manually configured and thus are familiar with each other. By the human interaction that the protocol is reasonably secure, as isps not just someone to connect without a valid reason. These hijacks and miner-references would not have been possible without peer-to-broadcast routes,” said the researchers.

Comments
(27)