Attacks/Breaches
11/27/2013
10:35 AM
Connect Directly
RSS
E-Mail
50%
50%

Bitcoin Thefts Surge, DDoS Hackers Take Millions

Cryptographic currency's massive rise in value leads to a corresponding increase in online heists by criminals seeking easy paydays.

10 IT Job Titles We Miss
10 IT Job Titles We Miss
(Click image for larger view.)

Say you've created a cryptographic currency called bitcoin that promises users relative anonymity and untraceable transactions. What could possibly go wrong? The answer, of course, is that these virtues also appeal to hackers, malware developers, and organized crime rings who wouldn't think twice about committing virtual bank robberies.

Earlier this month, for example, Bitcoin Internet Payment System (BIPS), a Denmark-based Bitcoin payment processor, suffered a denial-of-service (DDoS) attack. Unfortunately for users of the company's free online wallets for storing bitcoins, the DDoS attack was merely a smokescreen for a digital heist that quickly drained numerous wallets, netting the attackers a reported 1,295 bitcoins -- worth nearly $1 million -- and leaving wallet users with little chance that they'd ever see their money again.

"On November 15th BIPS was the target of a massive DDoS attack, which is now believed to have been the initial preparation for a subsequent attack on November 17th," Kris Henriksen, the CEO of BIPS, said via Reddit. "Regrettably, despite several layers of protection, the attack caused vulnerability to the system, which has then enabled the attacker/s to gain access and compromise several wallets."

BIPS has been conducting a digital forensic investigation and working with authorities to try to identify the perpetrators. It said that early results showed that the attack originated "from Russia and neighboring countries."

The BIPS heist followed two separate October attacks against Australia-based Inputs.io, in which attackers netted about $1.3 million in bitcoins after stealing all 4,100 bitcoins being held by the free e-wallet service.

[Criminals are taking shelter under bitcoins. See Dutch Banking Malware Gang Busted: Bitcoin's Role.]

The value of bitcoins continues to fluctuate wildly due to a bubble created by bitcoin speculators. In 2011, for example, the currency's value fell from $33 to just $1 per bitcoin before rising to more than $900 earlier this month on MtGox, the world's biggest bitcoin exchange. But that bubble burst the next day, when the value of bitcoins fell by half. As of early Wednesday, however, the currency's value had once again skyrocketed, trading at more than $980 on MtGox.

That rise in value has driven hackers to attack online wallet services that store bitcoins. "Each of these companies had been operating officially for only a few months, yet already had entrusted to them millions of dollars that are now in the hands of cybercrooks," Paul Ducklin, head of technology for Sophos in the Asia Pacific region, said Tuesday in a blog post.

Malware writers have also taken a keen interest in bitcoins, with some -- especially Russian gangs -- modifying their crimeware tools to identify and steal any bitcoins found on infected PCs. "There are numerous malware families today that either perform Bitcoin mining or directly steal the contents of victims' Bitcoin wallets, or both," according to a blog post from Robert Lipovsky, a researcher at security firm ESET.

(Source: zcopley)
(Source: zcopley)

Other malware attacks have started closer to home. Last week, for example, the New Jersey state attorney general's office announced that it had settled a complaint it filed against Commack, N.Y.-based online gaming company E-Sports, as well company co-founder Eric Thunberg and software engineer Sean Hunczak. According to the complaint, Hunczak designed malware that infected about 14,000 computers that subscribed to the company's service, and which mined their PCs for bitcoins, which the perpetrators then sold for about $3,500. Under the terms of the state's $1 million settlement agreement, the company will pay a fine of $325,000, but the rest will be vacated, providing the company complies with a 10-year compliance program.

But not all bitcoin heists have been executed via hack attacks or malware. For example, a China-based bitcoin exchange called GBL launched in May. Almost 1,000 people used the service to deposit bitcoins worth about $4.1 million. But the exchange was revealed to be an elaborate scam after whoever launched the site shut it down on October 26 and absconded with the funds.

Given the potential spoils from a successful online heist, it's not surprising that related attacks are becoming more common. "Please be advised that attacks are not isolated to us and if you are storing larger amounts of coins with any third party you may want to find alternative storage solutions as soon as possible, preferably cold storage if you do not need immediate access to those coins," said Henriksen.

Bitcoin users have echoed that suggestion. "One note of warning: don't trust any online wallet," read a comment on a recent Guardian feature. "The two biggest ones have already been robbed. Use your own wallet on your own computer and back it up on a USB stick."

"Remember, you don't have to keep your Bitcoins online with someone else: you can store your Bitcoins yourself, encrypted and offline," said Ducklin at Sophos.

Knowing your enemy is the first step in guarding against him. In this Dark Reading report, Integrating Vulnerability Management Into The Application Development Process, we examine the world of cybercriminals -- including their motives, resources and processes -- and recommend what enterprises should do to keep their data and computing systems safe in the face of an ever-growing and ever-more-sophisticated threat. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 3
danielcawrey
50%
50%
danielcawrey,
User Rank: Apprentice
11/27/2013 | 2:53:09 PM
Re: Virtual Highway Robbery
There are indeed too many outlaws out there. It isn't the bitcoin network in and of itself that is the problem, its bad people trying to steal money from ususpecting users.

Companies providing bitcoin services should not be so unsuspecting; they shold implictly undertstand the risks of getting involved in bitcoin-based businesses and understand that security should be of paramount importance. 
coalminds.com
50%
50%
coalminds.com,
User Rank: Apprentice
11/27/2013 | 2:17:31 PM
Re: Virtual Highway Robbery
"According to the complaint, Hunczak designed malware that infected about 14,000 computers that subscribed to the company's service, and which mined their PCs for bitcoins, which the perpetrators then sold for about $3,500. Under the terms of the state's $1 million settlement agreement, the company will pay a fine of $325,000, but the rest will be vacated, providing the company complies with a 10-year compliance program."

So breaking into someone's property 14,000 times just leads to a settlement? Shouldn't he be doing hard time the way he would be if he were a black person let's say... possessing a pound of marijuana?
WKash
50%
50%
WKash,
User Rank: Apprentice
11/27/2013 | 1:46:56 PM
Virtual Highway Robbery
Knowing..."That rise in value has driven hackers to attack online wallet services that store bitcoins," it's hard to get excited about jumping on the virtual currency wagon trail...too many outlaws out there.

 
<<   <   Page 3 / 3
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3304
Published: 2014-10-30
Directory traversal vulnerability in Dell EqualLogic PS4000 with firmware 6.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI.

CVE-2013-7409
Published: 2014-10-30
Buffer overflow in ALLPlayer 5.6.2 through 5.8.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .m3u (playlist) file.

CVE-2014-3446
Published: 2014-10-30
SQL injection vulnerability in wcm/system/pages/admin/getnode.aspx in BSS Continuity CMS 4.2.22640.0 allows remote attackers to execute arbitrary SQL commands via the nodeid parameter.

CVE-2014-3584
Published: 2014-10-30
The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service.

CVE-2014-3623
Published: 2014-10-30
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vect...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.