{"id":25409,"date":"2014-08-08T23:43:21","date_gmt":"2014-08-09T03:43:21","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25409"},"modified":"2014-08-08T23:43:21","modified_gmt":"2014-08-09T03:43:21","slug":"hacker-swipes-83000-from-bitcoin-mining-pools","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptocurrency\/hacker-swipes-83000-from-bitcoin-mining-pools.php","title":{"rendered":"Hacker swipes $83,000 from Bitcoin mining pools"},"content":{"rendered":"<p><p>         Bitcoin.org  <\/p>\n<p>    It's no longer surprising when we hear that a cryptocurrency    exchange has suffered a security breach, but now a hacker has    targeted mining pools -- and managed to steal $83,000 in    cryptocurrency as a result.  <\/p>\n<p>    The Dell SecureWorks Counter Threat Unit (CTU) research team        said Thursday it has identified an exploit that can be used    to lift cryptocurrency from mining pools, and at least one    hacker has already taken advantage of the security flaw.  <\/p>\n<p>    A hijacker was able to use a fake Border Gateway Protocol (BGP)    broadcast in order to compromise networks belonging to some of    the biggest names in the field -- including Amazon, Digital    Ocean, and OVH -- between February and May 2014. According to    the researchers, at least 51 networks were compromised from 19    different ISPs, and at least one hijacker was able to use this    flaw to redirect cryptocurrency miners' connections to a    hijacker-controlled mining pool, therefore collecting the    miner's profit for themselves.  <\/p>\n<p>    Miners were able to continue searching for blocks, which    results in the minting of new bitcoins, but spoofed servers    ensured that miners never received their cut -- instead, the    hijacker took off with all of the earnings.  <\/p>\n<p>    In total, it is believed this single hijacker has been able to    earn $83,000 in roughly four months.  <\/p>\n<p>    Although Bitcoin was the main target of the heist, with 1 BTC    currently worth $589, it was not the only cryptocurrency    affected.  <\/p>\n<p>    \"The threat actor hijacked the mining pool, so many    cryptocurrencies were impacted,\" the researchers said. \"The    protocols make it impossible to identify exactly which ones,    but CTU researchers have mapped activity to certain addresses.\"  <\/p>\n<p>    One miner spoken to by Dell SecureWorks said he estimates 8,000    dogecoin were hijacked and stolen in March, worth $1.39. The    miner later added a firewall rule to reject connections from    the hacker's mining server, which rejected the hijack and led    to normal mining regularity. While $1.39 is a tiny amount, if    widespread, such hacking can be lucrative.  <\/p>\n<p>    The researchers were eventually able to trace the fake    broadcasts to a single router at an ISP in Canada. While the    hijacker has not been identified, CTU believes the scheme can    be blamed on a rogue employee of the ISP, an ex-employee with    an unchanged router password, or simply a black-hat hacker.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cnet.com\/news\/hacker-swipes-83000-from-bitcoin-mining-pools\" title=\"Hacker swipes $83,000 from Bitcoin mining pools\">Hacker swipes $83,000 from Bitcoin mining pools<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Bitcoin.org It's no longer surprising when we hear that a cryptocurrency exchange has suffered a security breach, but now a hacker has targeted mining pools -- and managed to steal $83,000 in cryptocurrency as a result. The Dell SecureWorks Counter Threat Unit (CTU) research team said Thursday it has identified an exploit that can be used to lift cryptocurrency from mining pools, and at least one hacker has already taken advantage of the security flaw. A hijacker was able to use a fake Border Gateway Protocol (BGP) broadcast in order to compromise networks belonging to some of the biggest names in the field -- including Amazon, Digital Ocean, and OVH -- between February and May 2014. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[869],"tags":[],"class_list":["post-25409","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25409"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25409"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25409\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}