Tuesday, February 27, 2024

Singaporean Crypto-jacking Attack Leads to Add more Crypto-Security Concerns

As is often the case when an industry gains any sort of mainstream traction, there are always people looking for gaps in the system.

By creeping into the cracks developers have left behind, hackers can find ways to exploit weaknesses for their own personal gain. Despite the obvious complexity and potential of blockchains and cryptocurrencies, the sector has shown its cracks in recent years.

Even before the 2017 Bitcoin boom, the now maligned MT. Gox exchange unexpectedly filed for bankruptcy in 2014 after announcing $450 million had been stolen. One of the more recent attacks came from a group in Singapore.

According to security firms Fortinet, there were at least 100,000 crypto-jacking hits from Singapore in December 2017. As per the reports, malware was used to infect users’ computers and create a “zombie mining army”. The end result was not only the fraudulent production of cryptocurrencies but slow internet connection speeds.

For the average person, a slow connection is nothing more than a minor inconvenience. However, for those invested in the trading world, it can be hugely frustrating. Because a solid trading strategy is predicated on timing, lag can be costly.

What’s more, given that the criminals had targeted the trading world, the incident was even more of a poke in the eye. Fortunately, those in the know had at least one solution.

By using trading algorithms, investors can take the emotion out of the process and not have their judgment clouded. In other words, algo trading strategies reduce the risk of human error because software such as ProOrder can identify market trends and execute orders automatically.

Therefore, at times when connections are disrupted because of hackers, the trader doesn’t get so annoyed when they make mistakes and, moreover, the bot can still react in plenty of time.

In light of recent incidents, many experts have suggested that developers are more concerned with pushing their core technology than securing it.

Indeed, a 2017 article by Wired.com posited the question: why is it so easy to hack cryptocurrency startup fundraisers? For the article’s author Lily Hay Newman, anything to do with cryptocurrencies has a big target on its back.

Because the market is flooded with emerging tech and fairly uneducated users, hackers and scammers have been able to creep into the cracks.

Using everything from DDoS attacks to phishing emails and messages via Slack, cybercriminals have been able to defraud millions of companies and users.

Naturally, the recent Singapore hack is just the tip of a larger iceberg. However, for crypto traders, there are at least ways to offset any potential problems.

The bigger concern here is how crypto companies can deal with the issue. At the start of 2018, Coincheck was hacked for $530 million.

Although experts suggested at the time that those involved wouldn’t be able to spend all the coins, the fact remains that they found a leak in the system and exploited it.

Even though all cryptocurrencies can be easily tracked, it seems the temptation to take advantage of a maturing market is too great for those with ill-intentions.

For many, regulation is crucial as it will force exchanges and their peers to abide by higher operational standards. However, with cryptocurrencies having something of a punk attitude and wanting nothing to do with centralized forces, that could be difficult.

Whatever the best solution is, it’s clear something needs to change or the industry will continue to fall victim to unscrupulous hackers.


Latest articles

Abyss Locker Ransomware Attacks Microsoft Windows and Linux Users

FortiGuard Labs has released a report detailing the emergence and impact of the Abyss...

14-Year-Old CMS Editor Flaw Exploited to Hack Govt & Edu Sites

Hackers have exploited a vulnerability in a 14-year-old Content Management System (CMS) editor, FCKeditor,...

Zyxel Firewall Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in some of the Zyxel Firewall and access...

Hackers Abuse Telegram API To Exfiltrate User Information

Attackers have been using keywords like "remittance" and "receipts" to spread phishing scripts using...

ThreatHunter.ai Stops Hundreds of Attacks in 48 Hours: Fighting Ransomware and Nation-State Cyber Threats

The current large surge in cyber threats has left many organizations grappling for security...

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

A critical security flaw has been identified in the Ultimate Member plugin for WordPress,...

Hackers Actively Hijacking ConnectWise ScreenConnect server

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024,...

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles