Cyber Criminals are Taking Crypto Attacks to the Next Level
Matthew Rosenquist
CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker, 190k followers
Coinbase recently thwarted a very clever hacking attempt by cyber criminals. The planning and sophistication of the attack against this major cryptocurrency exchange was impressive. The attackers were careful, well-funded, technically savvy, and unexpectedly patient. They laid a foundation of trust by socially engineering people over an extended period of time before attempting to exploit two 0-Day vulnerabilities. Those don’t come cheap. They used compromised academic email accounts to bypass detection and built credibility with their targets over the course of many messages before sending a malicious link that directed victims to a custom browser exploit.
This took planning and preparation. They obviously did research to identify proper candidates, connected with them on a platform and subject that held a high potential of engagement. Attackers even knew the type of web browser the intended victims were using on their systems. Gaining such insights takes dedication and organization.
These are very smart tactics and not indicative behavior of typical cyber criminals who are impatient. This has the hallmarks of a professional team. Glad to hear that the compromise was detected and isolated before the next phase of the attack could take place.
This attack is another example of how the crypto community is currently in the sights of organized and top-tier cyber criminals. Recently there was the $40 million hack of Binance and I predict we will see more of these attacks by the end of the year. I would not be surprised if several are successful to the tune of tens-of-millions of dollars each.
Founder, Dolus Advisors | Human Decision-Making + Behavior Expert | NIST Collaborator | Forbes Contributor | Speaker
5 年Matthew Rosenquist I’m inclined to agree that “Recognizing early changes helps the defender community prepare and anticipate new risks and opportunities.” But assessing in archetypal categories can only provide an indistinct meta-view of your subject. Studying a behavioral taxonomy through a narrow lens invariably occludes a whole host of biases and blind spots. To wit: “… unexpectedly patient …” “… not indicative behavior of typical cyber criminals who are impatient.” It would appear you anticipate conformity to a generalized pattern. Gopal Padinjaruveetil ’s introduction of the idea of 3-dimensional chess is on-point. Success requires seeing a massively complex field. Generalization and simplification are handicaps. In addition: I recommend cyber security professionals refrain from over-valuing technique and tactics. There are other more important elements in the criminal arsenal, notably the psychological predispositions and capabilities which naturally drive and define criminal (as distinct from socially legitimate) choices and decisions. Cybersecurity is warfare of the mind. Not a battle of technological brawn.
Senior Member IEEE
5 年Criminals are rapid adopters of technology. This brave new world of #DigitalTransformation just keeps on giving and the #lemmings keep on adopting it. Ema Rimeike, MSc,Cyber Security? You can always stop using the technology that causes the problems. We managed without it in the past. Why keep on gifting the criminals new opportunities?