Report reveals Russian Hackers May Be Responsible for $530 Million Cryptocurrency Hack

Report reveals Russian Hackers May Be Responsible for $530 Million Cryptocurrency Hack

It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible.

A new report of the investigation into the $530 million hack that ruined Japanese cryptocurrency exchange Coincheck in January 2018 states that Russian, not North Korean, actors may have been behind the attack.

The Asahi Shimbun, a Japanese newspaper, reported that viruses that were thought to have been used in the hack were found on employees’ computers. According to the Asahi Shimbun, the viruses were linked to Russian hacker groups and named “Mokes” and “Netwire.” These viruses were most likely transferred via email, and allowed the hackers to gain access to private keys.

In addition, the viruses have previously appeared on Russian-based message boards with Mokes first appearing in June 2011 and Netwire appearing approximately 12 years ago.

In the January 2018 attack, Coincheck lost over $500 million worth of NEM tokens. The company was adamant that it wasn’t an inside job, even though at the time there was no suggestion of how the attacks had been able to gain access to the system without insider information.

Francis Gaffney, director of threat intelligence at Mimecast, said that as of January 2019, over $1 billion had been lost from cryptocurrency attacks.

“Coincheck is just the latest incident,” Gaffney said. “At the end of the day, cybercriminals are going to go directly where the money is via point-of-sale-focused attacks, like we’re seeing here and with ransomware.”

Gaffney said that these crypto-based attacks are particularly concerning for companies dealing with currencies, and other products that require a large amount of trust.

“Attacks on cryptocurrencies and their enabling exchanges are particularly troubling for systems like currencies, which rely heavily on trust for reliable means of exchange,” Gaffney said. “We see these crypto-based attacks begin with sophisticated phishing campaigns and malware droppers. From there, threat actors study their victims to identify their credentials and capture sensitive information.”

About the Author

Kaitlyn DeHaven is the Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3