Dell sounds alarm over network-hijacking cryptocurrency thefts

Researchers from Dell SecureWorks share details of a recent run of cryptocurrency thefts

Theft

A series of attacks against ISPs between February and May 2014 allowed an unknown assailant to siphon off more than $83,000 from legitimate cryptocurrency miners.  

The perpetrator is thought to have compromised 51 networks belonging to 19 ISPS in order to redirect connections to the assailant's own mining pool to make a profit.

The attacks were picked up by the Dell SecureWorks Counter Threat Unit (CTU), and discussed at length during the Black Hat hackers conference in Las Vegas today.

The organisation said reports from people who had their connections hijacked began to emerge from 22 March 2014, with many disgruntled miners taking to online user forums to complain.

However, CTU's research also suggests the person responsible made some abortive attempts to carry out their deception in February too.

Speaking to IT Pro, Joe Stewart, director of malware research at Dell SecureWorks, explained:  "We started to notice in the forums some people talking about some hijacking of cryptocurrency mining pools and people observed they were mining with the pool one day, and suddenly it switched to an IP address they didn't recognised, meaning they had been hijacked somehow."

Stewart decided to examine the set-up of his own cryptocurrency mining pools in response, and realised his own mining pool had been plundered too, prompting him to embark on an investigation.

Now this attack has come to light, the researchers are hopeful the mining community will know the warning signs to look for should another unscrupulous sort try something similar.

"The success of this attack was partly due to it being a new threat to [the cryptocurrency mining community] and now that it's been executed, it will be much more difficult for someone else to pull it off again," Pat Litke, CTU researcher at Dell SecureWorks told IT Pro.

"In this instance, the actor could have been much more successful with a little more planning... in the future I personally would be surprised to see more successful attacks of this nature simply because people are looking for them."   

At present, the person responsible for the attacks is still unknown, although their activities have been traced to a single router at an ISP in Canada.

Based on this information, the CTU researchers have narrowed the list of potential suspects down to a rogue ISP employee or a malicious hacker.

"This kind of activity can happen at any time to any network, if you have a rogue operator at the ISP who has access to some of these routers," he said.

"This person abused their access to mine cryptocurrency but certainly he could use potential access to re-route someone else's network traffic for a short time in order to gain some sort of intelligence about them.

"You wouldn't want to do this long-term because people do notice their traffic isn't flowing where it should and it introduces latency," Stewart added.

The researchers alerted the ISP closest to the site where malicious activity was detected on 9 May, and it stopped three days later and. At the time of publication the attack had not resumed. 

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

New York seeks to ban bitcoin mining over power consumption
cryptocurrencies

New York seeks to ban bitcoin mining over power consumption

6 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021
Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

5 May 2021
Security researchers take control of a Tesla via drone
ethical hacking

Security researchers take control of a Tesla via drone

5 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021