Sunday, April 13, 2025
HomecryptocurrencySingaporean Crypto-jacking Attack Leads to Add more Crypto-Security Concerns

Singaporean Crypto-jacking Attack Leads to Add more Crypto-Security Concerns

Published on

SIEM as a Service

Follow Us on Google News

As is often the case when an industry gains any sort of mainstream traction, there are always people looking for gaps in the system.

By creeping into the cracks developers have left behind, hackers can find ways to exploit weaknesses for their own personal gain. Despite the obvious complexity and potential of blockchains and cryptocurrencies, the sector has shown its cracks in recent years.

Even before the 2017 Bitcoin boom, the now maligned MT. Gox exchange unexpectedly filed for bankruptcy in 2014 after announcing $450 million had been stolen. One of the more recent attacks came from a group in Singapore.

- Advertisement - Google News

According to security firms Fortinet, there were at least 100,000 crypto-jacking hits from Singapore in December 2017. As per the reports, malware was used to infect users’ computers and create a “zombie mining army”. The end result was not only the fraudulent production of cryptocurrencies but slow internet connection speeds.

For the average person, a slow connection is nothing more than a minor inconvenience. However, for those invested in the trading world, it can be hugely frustrating. Because a solid trading strategy is predicated on timing, lag can be costly.

What’s more, given that the criminals had targeted the trading world, the incident was even more of a poke in the eye. Fortunately, those in the know had at least one solution.

By using trading algorithms, investors can take the emotion out of the process and not have their judgment clouded. In other words, algo trading strategies reduce the risk of human error because software such as ProOrder can identify market trends and execute orders automatically.

Therefore, at times when connections are disrupted because of hackers, the trader doesn’t get so annoyed when they make mistakes and, moreover, the bot can still react in plenty of time.

In light of recent incidents, many experts have suggested that developers are more concerned with pushing their core technology than securing it.

Indeed, a 2017 article by Wired.com posited the question: why is it so easy to hack cryptocurrency startup fundraisers? For the article’s author Lily Hay Newman, anything to do with cryptocurrencies has a big target on its back.

Because the market is flooded with emerging tech and fairly uneducated users, hackers and scammers have been able to creep into the cracks.

Using everything from DDoS attacks to phishing emails and messages via Slack, cybercriminals have been able to defraud millions of companies and users.

Naturally, the recent Singapore hack is just the tip of a larger iceberg. However, for crypto traders, there are at least ways to offset any potential problems.

The bigger concern here is how crypto companies can deal with the issue. At the start of 2018, Coincheck was hacked for $530 million.

Although experts suggested at the time that those involved wouldn’t be able to spend all the coins, the fact remains that they found a leak in the system and exploited it.

Even though all cryptocurrencies can be easily tracked, it seems the temptation to take advantage of a maturing market is too great for those with ill-intentions.

For many, regulation is crucial as it will force exchanges and their peers to abide by higher operational standards. However, with cryptocurrencies having something of a punk attitude and wanting nothing to do with centralized forces, that could be difficult.

Whatever the best solution is, it’s clear something needs to change or the industry will continue to fall victim to unscrupulous hackers.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers,...