IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Dell sounds alarm over network-hijacking cryptocurrency thefts

Researchers from Dell SecureWorks share details of a recent run of cryptocurrency thefts

Theft

A series of attacks against ISPs between February and May 2014 allowed an unknown assailant to siphon off more than $83,000 from legitimate cryptocurrency miners.  

The perpetrator is thought to have compromised 51 networks belonging to 19 ISPS in order to redirect connections to the assailant's own mining pool to make a profit.

The attacks were picked up by the Dell SecureWorks Counter Threat Unit (CTU), and discussed at length during the Black Hat hackers conference in Las Vegas today.

The organisation said reports from people who had their connections hijacked began to emerge from 22 March 2014, with many disgruntled miners taking to online user forums to complain.

However, CTU's research also suggests the person responsible made some abortive attempts to carry out their deception in February too.

Speaking to IT Pro, Joe Stewart, director of malware research at Dell SecureWorks, explained:  "We started to notice in the forums some people talking about some hijacking of cryptocurrency mining pools and people observed they were mining with the pool one day, and suddenly it switched to an IP address they didn't recognised, meaning they had been hijacked somehow."

Stewart decided to examine the set-up of his own cryptocurrency mining pools in response, and realised his own mining pool had been plundered too, prompting him to embark on an investigation.

Now this attack has come to light, the researchers are hopeful the mining community will know the warning signs to look for should another unscrupulous sort try something similar.

"The success of this attack was partly due to it being a new threat to [the cryptocurrency mining community] and now that it's been executed, it will be much more difficult for someone else to pull it off again," Pat Litke, CTU researcher at Dell SecureWorks told IT Pro.

"In this instance, the actor could have been much more successful with a little more planning... in the future I personally would be surprised to see more successful attacks of this nature simply because people are looking for them."   

At present, the person responsible for the attacks is still unknown, although their activities have been traced to a single router at an ISP in Canada.

Based on this information, the CTU researchers have narrowed the list of potential suspects down to a rogue ISP employee or a malicious hacker.

"This kind of activity can happen at any time to any network, if you have a rogue operator at the ISP who has access to some of these routers," he said.

"This person abused their access to mine cryptocurrency but certainly he could use potential access to re-route someone else's network traffic for a short time in order to gain some sort of intelligence about them.

"You wouldn't want to do this long-term because people do notice their traffic isn't flowing where it should and it introduces latency," Stewart added.

The researchers alerted the ISP closest to the site where malicious activity was detected on 9 May, and it stopped three days later and. At the time of publication the attack had not resumed. 

Featured Resources

Meeting the future of education with confidence

How the switch to digital learning has created an opportunity to meet the needs of every student, always

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

Technology reimagined

Why PCaaS is perfect for modern schools

Free Download

Recommended

What is cryptocurrency mining?
cryptocurrencies

What is cryptocurrency mining?

27 May 2022
IMF urges El Salvador to remove Bitcoin as legal tender
cryptocurrencies

IMF urges El Salvador to remove Bitcoin as legal tender

26 Jan 2022
El Salvador announces plans to build a 'Bitcoin city' at the foot of a volcano
cryptocurrencies

El Salvador announces plans to build a 'Bitcoin city' at the foot of a volcano

22 Nov 2021
Cryptocurrency: Should you invest?
cryptocurrencies

Cryptocurrency: Should you invest?

27 Oct 2021

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

7 Jun 2022
Attracting and retaining talent through training
Sponsored

Attracting and retaining talent through training

13 Jun 2022
Delivery firm Yodel disrupted by cyber attack
cyber attacks

Delivery firm Yodel disrupted by cyber attack

21 Jun 2022