Tuesday, February 11, 2025
HomecryptocurrencySingaporean Crypto-jacking Attack Leads to Add more Crypto-Security Concerns

Singaporean Crypto-jacking Attack Leads to Add more Crypto-Security Concerns

Published on

SIEM as a Service

Follow Us on Google News

As is often the case when an industry gains any sort of mainstream traction, there are always people looking for gaps in the system.

By creeping into the cracks developers have left behind, hackers can find ways to exploit weaknesses for their own personal gain. Despite the obvious complexity and potential of blockchains and cryptocurrencies, the sector has shown its cracks in recent years.

Even before the 2017 Bitcoin boom, the now maligned MT. Gox exchange unexpectedly filed for bankruptcy in 2014 after announcing $450 million had been stolen. One of the more recent attacks came from a group in Singapore.

According to security firms Fortinet, there were at least 100,000 crypto-jacking hits from Singapore in December 2017. As per the reports, malware was used to infect users’ computers and create a “zombie mining army”. The end result was not only the fraudulent production of cryptocurrencies but slow internet connection speeds.

For the average person, a slow connection is nothing more than a minor inconvenience. However, for those invested in the trading world, it can be hugely frustrating. Because a solid trading strategy is predicated on timing, lag can be costly.

What’s more, given that the criminals had targeted the trading world, the incident was even more of a poke in the eye. Fortunately, those in the know had at least one solution.

By using trading algorithms, investors can take the emotion out of the process and not have their judgment clouded. In other words, algo trading strategies reduce the risk of human error because software such as ProOrder can identify market trends and execute orders automatically.

Therefore, at times when connections are disrupted because of hackers, the trader doesn’t get so annoyed when they make mistakes and, moreover, the bot can still react in plenty of time.

In light of recent incidents, many experts have suggested that developers are more concerned with pushing their core technology than securing it.

Indeed, a 2017 article by Wired.com posited the question: why is it so easy to hack cryptocurrency startup fundraisers? For the article’s author Lily Hay Newman, anything to do with cryptocurrencies has a big target on its back.

Because the market is flooded with emerging tech and fairly uneducated users, hackers and scammers have been able to creep into the cracks.

Using everything from DDoS attacks to phishing emails and messages via Slack, cybercriminals have been able to defraud millions of companies and users.

Naturally, the recent Singapore hack is just the tip of a larger iceberg. However, for crypto traders, there are at least ways to offset any potential problems.

The bigger concern here is how crypto companies can deal with the issue. At the start of 2018, Coincheck was hacked for $530 million.

Although experts suggested at the time that those involved wouldn’t be able to spend all the coins, the fact remains that they found a leak in the system and exploited it.

Even though all cryptocurrencies can be easily tracked, it seems the temptation to take advantage of a maturing market is too great for those with ill-intentions.

For many, regulation is crucial as it will force exchanges and their peers to abide by higher operational standards. However, with cryptocurrencies having something of a punk attitude and wanting nothing to do with centralized forces, that could be difficult.

Whatever the best solution is, it’s clear something needs to change or the industry will continue to fall victim to unscrupulous hackers.

Latest articles

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

Quishing via QR Codes Emerging as a Top Attack Vector Used by Hackers

QR codes, once a symbol of convenience and security in digital interactions, have become...

New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal

A recent cybersecurity presentation at BSides London 2024 has unveiled a sophisticated attack technique...