Cyber security weekly summary 17 - 23 July

The most influential cyber-events of last week were the raid on a major darknet market Hansa, the attack on the cryptocurrency trading platform CoinDash and a data leak, which affected customers of American company Dow Jones.

On 17 July, unknown hackers attacked the CoinDash cryptocurrency trading platform during its initial coin auction. The company's web page was hacked mere 13 minutes after the release of tokens, derived from the Ethereum cryptocurrency, had been initiated. This way, the attackers were able to change the contact address for sending investments and thus stole Ethereum funds worth up to 10 million dollars. The circumstances of the breach of CoinDash's website are still unknown

Last week was also marked by another data leak. American analytic company Dow Jones accidentally compromised millions of customers' names, account information, physical and email addresses, and last four digits of credit card numbers. All the aforementioned information was accessible by anyone owning a free account on the Web Services S3 Amazon cloud depository, where the data have been stored. Dow Jones confirmed that the exposition has affected 2.2 millions of their customers, however, the security company Upguard estimated that up to 4 million clients' data might be compromised.

On 20 July Europol and the U.S. Department of Justice informed about the closure of Hansa, a major illegal online market. During the operation against the dark net hosted portal, Dutch police were able to infiltrate Hansa's infrastructure and take over its servers. Although the takeover took place on June, the police kept the domain online to get logs of the user names, passwords, and activities. The operation was part of a bigger initiative against online black markets, which also resulted in the closure of another portal, AlphaBay.

New documents published by WikiLeaks as a part of the Vault 7 initiative describe the relationship between the CIA and its contractor Raytheon Blackbird Technologies, who is responsible for analysing malware and hacking techniques used by cyber criminals. Five reports about attack vectors and methods, submitted by Raytheon in the period between November 2014 and September 2015, presumably serve to the CIA as an inspiration for developing their own advanced malware projects.

About author: Roman Šulc

Partners

Tento web používá k analýze návštěvnosti soubory cookie. Používáním tohoto webu s tím souhlasíte. Další informace