Dell sounds alarm over network-hijacking cryptocurrency thefts
Researchers from Dell SecureWorks share details of a recent run of cryptocurrency thefts
A series of attacks against ISPs between February and May 2014 allowed an unknown assailant to siphon off more than $83,000 from legitimate cryptocurrency miners.
The perpetrator is thought to have compromised 51 networks belonging to 19 ISPS in order to redirect connections to the assailant's own mining pool to make a profit.
The attacks were picked up by the Dell SecureWorks Counter Threat Unit (CTU), and discussed at length during the Black Hat hackers conference in Las Vegas today.
The organisation said reports from people who had their connections hijacked began to emerge from 22 March 2014, with many disgruntled miners taking to online user forums to complain.
However, CTU's research also suggests the person responsible made some abortive attempts to carry out their deception in February too.
Speaking to IT Pro, Joe Stewart, director of malware research at Dell SecureWorks, explained: "We started to notice in the forums some people talking about some hijacking of cryptocurrency mining pools and people observed they were mining with the pool one day, and suddenly it switched to an IP address they didn't recognised, meaning they had been hijacked somehow."
Stewart decided to examine the set-up of his own cryptocurrency mining pools in response, and realised his own mining pool had been plundered too, prompting him to embark on an investigation.
Now this attack has come to light, the researchers are hopeful the mining community will know the warning signs to look for should another unscrupulous sort try something similar.
"The success of this attack was partly due to it being a new threat to [the cryptocurrency mining community] and now that it's been executed, it will be much more difficult for someone else to pull it off again," Pat Litke, CTU researcher at Dell SecureWorks told IT Pro.
"In this instance, the actor could have been much more successful with a little more planning... in the future I personally would be surprised to see more successful attacks of this nature simply because people are looking for them."
At present, the person responsible for the attacks is still unknown, although their activities have been traced to a single router at an ISP in Canada.
Based on this information, the CTU researchers have narrowed the list of potential suspects down to a rogue ISP employee or a malicious hacker.
"This kind of activity can happen at any time to any network, if you have a rogue operator at the ISP who has access to some of these routers," he said.
"This person abused their access to mine cryptocurrency but certainly he could use potential access to re-route someone else's network traffic for a short time in order to gain some sort of intelligence about them.
"You wouldn't want to do this long-term because people do notice their traffic isn't flowing where it should and it introduces latency," Stewart added.
The researchers alerted the ISP closest to the site where malicious activity was detected on 9 May, and it stopped three days later and. At the time of publication the attack had not resumed.
Navigating the new normal: A fast guide to remote working
A smooth transition will support operations for years to comeDownload now
Putting a spotlight on cyber security
An examination of the current cyber security landscapeDownload now
The economics of infrastructure scalability
Find the most cost-effective and least risky way to scaleDownload now
IT operations overload hinders digital transformation
Clearing the path towards a modernised system of agreementDownload now