Dell sounds alarm over network-hijacking cryptocurrency thefts

Researchers from Dell SecureWorks share details of a recent run of cryptocurrency thefts

Theft

A series of attacks against ISPs between February and May 2014 allowed an unknown assailant to siphon off more than $83,000 from legitimate cryptocurrency miners.  

The perpetrator is thought to have compromised 51 networks belonging to 19 ISPS in order to redirect connections to the assailant's own mining pool to make a profit.

The attacks were picked up by the Dell SecureWorks Counter Threat Unit (CTU), and discussed at length during the Black Hat hackers conference in Las Vegas today.

The organisation said reports from people who had their connections hijacked began to emerge from 22 March 2014, with many disgruntled miners taking to online user forums to complain.

However, CTU's research also suggests the person responsible made some abortive attempts to carry out their deception in February too.

Speaking to IT Pro, Joe Stewart, director of malware research at Dell SecureWorks, explained:  "We started to notice in the forums some people talking about some hijacking of cryptocurrency mining pools and people observed they were mining with the pool one day, and suddenly it switched to an IP address they didn't recognised, meaning they had been hijacked somehow."

Stewart decided to examine the set-up of his own cryptocurrency mining pools in response, and realised his own mining pool had been plundered too, prompting him to embark on an investigation.

Now this attack has come to light, the researchers are hopeful the mining community will know the warning signs to look for should another unscrupulous sort try something similar.

"The success of this attack was partly due to it being a new threat to [the cryptocurrency mining community] and now that it's been executed, it will be much more difficult for someone else to pull it off again," Pat Litke, CTU researcher at Dell SecureWorks told IT Pro.

"In this instance, the actor could have been much more successful with a little more planning... in the future I personally would be surprised to see more successful attacks of this nature simply because people are looking for them."   

At present, the person responsible for the attacks is still unknown, although their activities have been traced to a single router at an ISP in Canada.

Based on this information, the CTU researchers have narrowed the list of potential suspects down to a rogue ISP employee or a malicious hacker.

"This kind of activity can happen at any time to any network, if you have a rogue operator at the ISP who has access to some of these routers," he said.

"This person abused their access to mine cryptocurrency but certainly he could use potential access to re-route someone else's network traffic for a short time in order to gain some sort of intelligence about them.

"You wouldn't want to do this long-term because people do notice their traffic isn't flowing where it should and it introduces latency," Stewart added.

The researchers alerted the ISP closest to the site where malicious activity was detected on 9 May, and it stopped three days later and. At the time of publication the attack had not resumed. 

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

IT security awareness and training firm KnowBe4 acquires MediaPRO
Acquisition

IT security awareness and training firm KnowBe4 acquires MediaPRO

3 Mar 2021
High-risk email security threats increased by 32% last year
phishing

High-risk email security threats increased by 32% last year

3 Mar 2021
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

3 Mar 2021
Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021

Most Popular

Star Alliance passenger data stolen in SITA data breach
data breaches

Star Alliance passenger data stolen in SITA data breach

5 Mar 2021
I went shopping at Amazon’s till-less supermarket so that you don’t have to
automation

I went shopping at Amazon’s till-less supermarket so that you don’t have to

5 Mar 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021