Cryptocurrency Threat Actors Attack Cloud Infrastructure, Trading Software And Bitcoin ATMs

B
BakerHostetler

Contributor

BakerHostetler logo
Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
According to a recent report from the cybersecurity team at a major U.S. telecom provider, "[o]ne of the most widely observed objectives of attacking an organization's cloud infrastructure has been for cryptocurrency mining."
United States Technology

According to a recent report from the cybersecurity team at a major U.S. telecom provider, "[o]ne of the most widely observed objectives of attacking an organization's cloud infrastructure has been for cryptocurrency mining." The report outlines some of the most common methods of attack that hackers have used in recent attempts to hack into cloud infrastructure for the purpose of operating cryptocurrency mining malware, and provides tips for detecting such attacks. Another recently published report provides details on more than 40 bugs in blockchain and cryptocurrency platforms that were detected in the 30-day period from Feb. 13 to March 13, 2019. A third report issued this week describes details of a malware campaign that is "attempting to compromise financial technology and cryptocurrency trading companies in an effort to harvest credentials, passwords and other confidential information." The attackers are reportedly using an updated version of the Cardinal RAT malware, and evidence suggests they have been targeting companies in Israel that write software for forex and cryptocurrency trading.

An "in person" attack was reported late last week in Canada, where Calgary police published a press release seeking the public's assistance to identify four individuals alleged to have stolen $195,000 in cash by exploiting a security flaw in bitcoin ATM machines. According to the press release, the suspects succeeded in initiating bitcoin conversion transactions, withdrawing cash from the bitcoin ATMs, and then cancelling the bitcoin transactions before any bitcoin was actually transferred to the ATM provider.

For more information, please refer to the following links:

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More