sb-eu logo
Story image

Hacker steals US$440K in 'easily avoidable' digital currency breach

26 Jan 2018

News recently emerged of another digital currency breach where a hacker hijacked Black Wallet to steal around $440,000 from Bitcoin rival Stellar Lumen.

According to reports, the DNS server of Black Wallet was hacked and manipulated so that whenever a user logged into the web-based wallet, the injected code redirects the Stellar Lumens coins (provided more than 20 are held) into another.

The Black Wallet team sent out warnings and alert messages to all the users of Stellar Lumens coins via the Stellar Community, Reddit, GitHub, Twitter, and Galactic Talk.

After following the trail of the hacker, the Stellar community deemed the hacker moved the coins to the Bittrex exchange where the assumed motive of the hacker is exchange the coins and bury the tracks.

This attack comes on the heels of a series of social engineering attacks aimed at the ever-growing and burgeoning crypto-market. For example Exchange EtherDelta suffered a very similar attack late last year where the attacker was reported to gain around $250,000 worth of digital currency.

High Tech Bridge CEO Ilia Kolochenko says these attacks will continue in both frequency and magnitude unless changes are made – and they’re really quite simple.

“Unfortunately, startups in digital currencies and other blockchain technologies often ignore or underestimate information security and privacy fundamentals,” says Kolochenko.

“They operate on a very competitive and extremely fluctuative market, and just don’t have enough resources and time to take care of cybersecurity. “

Kolochenko says it’s this competitive and young market that is causing the fundamental issues.

“Changes and updates go into production every hour, without the necessary security validation and testing of new code,” Kolochenko says.

“Competition is always behind, price of currencies skyrocket and fall down, customers ask new features, regulators announce new rules - it’s a realm of uncontrolled chaos.”

And in terms of the future, Kolochenko asserts that we can only hope other organisations in the digital currency and blockchain markets learn from these breaches.

“While such negligence is understandable, it will unlikely provide any justification in case of a breach. Civil damages claimed by the victims can be very important, while the impending enforcement of GDPR in May will impose additional fines for such carelessness,” Kolochenko concludes.

Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
Strong cybersecurity posture crucial for company success - Fortinet
"They should also conduct due diligence to ensure partners aren’t inadvertently creating vulnerabilities with insufficient cybersecurity measures."More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Is cyber deception the latest SOC 'game changer'?
Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense.More