Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

// // //
08:05 AM
Simon Marshall
Simon Marshall
Simon Marshall

Cryptocurrency Crime: The Internet's New Wild West

The popularity of Bitcoin and other cryptocurrencies has opened the floodgates to different cybercrimes, scams and outright theft. A pair of reports from Cisco and Digital Shadows paints a portrait of this new Wild West of the Internet.

In many ways cryptocurrency crime resembles the new Wild West, with several different gangs of rogue gunslingers looking for a haul. These bandits use new techniques to illegally harness the computer power of users, mine currency and rob wallets.

"In many ways, it's like the Gold Rush of the 1840s as people flood to the opportunities that cryptocurrencies present and are preyed on by criminals and the unscrupulous," said Rick Holland, vice president strategy at Digital Shadows, a San Francisco-based digital risk management and threat intelligence firm.

And, when ransoming their victims becomes too risky, these groups ride into town to recruit other suckers to do their bidding. Cryptojacking is growing in popularity not just because cryptocurrencies are booming, but because it's also a safer option for extorting funds than ransomware. (See Cryptomining: Paying the Price for Cryptocurrency.)

Illegal cryptocurrency mining is now on the increase because hackers can realize an excellent financial upside versus ransomware without the risk of even engaging the victim, according to the latest Cisco Talos report.

Along with a "marked increase in the volume of cryptocurrency mining software being maliciously delivered to victims," Talos notes that mining is more productive for malicious users because it is not, like ransomware, a one-off attack. (See Rogue Employees Mine Cryptocurrency Using Company Hardware.)

"IOT devices, with their lack of monitoring and lack of day-to-day user engagement, are fast becoming an attractive target for these attackers, as they offer processing power without direct victim oversight," according to Cisco Talos. The report also noted that although the processing power per device is likely relatively small, the number of publicly exposed devices is high, making the equation profitable for those looking for less risk than ransomware.

An average system can mine Monero to the equivalent of $0.25 a day, and in Cisco's estimation, someone enlisting 2,000 victims -- described as "not a hard feat" -- would generate $500 a day, or $182,500 annually -- bearing in mind that currency values are volatile at the moment.

Botnets, which perform the number crunching, are becoming easier to access thanks to "rent a bot" schemes on the Dark Web, and Talos has observed millions of infected systems which could theoretically be used to net tens of millions of dollars by groups or individuals with relatively little effort.

Not only that, but because infections can go unnoticed, mining provides a sustainable income stream, not just a one-off hit. Theft of computing power can go unnoticed by users and most mining software, such as CoinHive, JSEcoin, and Crypto-Loot is not technically considered malware.

Coinhoarder group
Cryptojacking is not the only method of stealing from everyday users. One example is the so-called Coinhoarder group, a Ukrainian hacking organization which has been mining Bitcoin since at least 2015.

Cisco has been tracking them for the last six months hand-in-hand with a specialist Ukrainian cyberpolice unit, revealing that the group has to date stolen an estimated "tens of millions" of dollars in cryptocurrency by using Google Adwords to poison everyday users' search results, and steal directly from their wallets.

The group emerged into the spotlight after a campaign in February 2017 that targeted blockchain.info, a popular Bitcoin wallet site. Alarm bells rang after about 200,000 client queries pinged the site in a single day, after the group had placed phishing links in Google Adwords such as "blockchain" and "bitcoin wallet."

These spoofed links, when clicked, would redirect to a regionalized landing page based on the user's IP address, where phishing content was served up.

Using the attackers' Bitcoin wallet address, Cisco and law enforcement spotted that between September and December last year, about $10 million was stolen. In one campaign, $2 million was netted in under a month.

Cisco estimates the Coinhoarder group has gained north of $50 million in total over three years, proving how lucrative this activity is becoming, and some would say more successful in pure money terms than ransomware.

Taking people for a ride
Like in the Pioneer Days, people do not remain fools for too long. There are no visible criminals for the population to tar and feather, but even so, hackers are staying nimble by deploying new techniques and software hybrids that take cryptocurrency crime to the next level.

These not only include a rash of cryptomining and currency value "pump and dump" schemes, but also botnet rental and fake Initial Coin Offerings (ICOs), according to a new report from Digital Shadows.

"This is a rapidly changing space and we see new scams crop up daily," said Digital Shadows' Holland. "While the future of cryptocurrencies remains somewhat uncertain, what we can be sure of is that cybercriminals will continue to find new ways of making money."

Holland emphasizes that the growth of botnets-for-rent and the weaponization of mining tools available on the black market at low price points is further accelerating crypto crime. Digital Shadows has observed one such botnet-for-rent priced at $40 which has already been rented 2,000 times.

One example of weaponization that looks particularly powerful is a new cryptojacker which combines CoinHive, Authedmine and Crypto-Loot into a Word Press plugin with added SEO functionality. Priced at $29, the software has been available illicitly since November last year and essentially clones popular websites which are then leveraged in spam campaigns.

In some instances, criminals have become as brazen as soap bar salesmen by creating their own bogus cryptocurrencies as fake ICOs, duping investors to come on board, pumping the value, and then leaving them with nothing but the detergent.

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file