Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Traffic To Hosting Companies Hijacked In Crypto Currency Heist
Attacker likely a current or former ISP employee, researchers say.
Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
August 14, 2014
3 Min Read
A crypto currency thief hijacked traffic that was meant for large hosting companies including Amazon, Digital Ocean, OVH, and others earlier this year in a heist that earned him some $83,000 in profits in more than four months, researchers revealed last week.
Researchers with Dell SecureWorks Counter Threat Unit published the new research on the attacks in conjunction with the Black Hat USA show in Las Vegas. Dell SecureWorks says some 51 networks were compromised from 19 Internet service providers as the thief redirected crypto currency miners to his own mining pool and stole their profits -- to the tune of $9,000 per day. The crypto currency hijack also interrupted network traffic for other users in the netblocks he targeted, the researchers say, but the attacker was mainly interested in the miners.
"They were man-in-the-middle hijacking crypto currency. I found my [account] was hijacked, too," says Joe Stewart, director of malware research for Dell SecureWorks. When Stewart first heard of the crypto currency theft, he figured the attacker had hijacked Border Gateway Protocol (BGP) routes and redirected their mining to the rogue systems. The Internet's BGP routing protocol basically connects networks on the Internet.
It turns out Stewart was correct: The attacker had blasted phony BGP broadcasts that redirected the victims' crypto currency traffic to his server. "He only hijacked it for brief periods where he was able to capture and trap a large section of miners," Stewart says, so the hijack was not necessarily noticeable.
The attacker was successful in part because crypto currency miners employ a protocol called Stratum that has little or no security. "They're not using HTTPS, so any mining pool can send or reconnect to send to a different IP. [The protocol] trusts that they are talking to the real server."
It was that inherent trust that the hijacker capitalized on. But Stewart says the culprit also needed the administrative rights to pull off the BGP spoof, so it was likely an employee or former employee of an ISP. "Or a hacker hacked a router."
The researchers ultimately traced the malicious BGP announcements to a single router at an ISP in Canada. "We reported it to the ISP, and gave them large logs." The activity ultimately came to a halt, he says, and the ISP didn't provide any additional information on its resolution.
Dell SecureWorks' Pat Litke, who worked with Stewart on investigating the theft, says at the heart of the problem is the ISP not having proper oversight of its offending employee or former employee.
But even more unsettling was how the attacker was able to temporarily commandeer all of those IP addresses. The affected hosting providers "have a huge range of IP addresses," says Litke. "The addresses being hijacked were fairly negligible. It didn't impact them… They weren't losing money, and their customers didn't notice."
The only noticeable glitch would be that users wouldn't be able to ping a server, but that would have been seen as a temporary network problem. "Only the miners got trapped for a longer period of time," Stewart says. "We didn't see any big website hijacked in that."
It was when miners started talking online in a Bitcoin forum about lost funds that it become obvious something had gone awry. On March 22, a user named "caution" noted sketchy activity in the wafflepool.com mining pool. Other miners chimed in with similar observations of their mining systems being redirected to an IP address they didn't recognize, and ultimately, their loss of funds.
According to Dell SecureWorks, some $2.6 million in crypto currency mining occurs daily. The researchers suggest that ISPs use the Resource Public Key Infrastructure service, and miners use a Secure Sockets Layer (SSL) client to encrypt their traffic. "Miners should also implement server certificate validation. This validation ensures that the certificate the pool server sends when establishing the connection is valid and authorized for use with the connected domain, even if the domain's IP address changes," the researchers wrote in their report about the attacks.
Read more about:Black Hat News
About the Author(s)
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.
You May Also Like
Unbiased Testing. Unbeatable ResultsFeb 22, 2024
Unbiased Testing. Unbeatable ResultsFeb 22, 2024
Your Everywhere Security guide: Four steps to stop cyberattacksFeb 27, 2024
Your Everywhere Security Guide: 4 Steps to Stop CyberattacksFeb 27, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
A screen displaying many different types of charts and graphs to show what data is being analyzed.Cybersecurity Analytics