{"id":11434,"date":"2018-02-09T13:11:08","date_gmt":"2018-02-09T21:11:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/09\/news-5205\/"},"modified":"2018-02-09T13:11:08","modified_gmt":"2018-02-09T21:11:08","slug":"news-5205","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/09\/news-5205\/","title":{"rendered":"Bank robbers 2.0: digital thievery and stolen cryptocoins"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 09 Feb 2018 19:57:07 +0000<\/strong><\/p>\n<p>Imagine running down the street (and away from law enforcement) with 2,000 pounds of gold bars. Or 1,450 pounds in $100 bills. With both of these physical currencies amounting to roughly US$64 million, you&#8217;d be making quite a steal&#8230;if you could get away with it.<\/p>\n<p>That&#8217;s exactly what <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/12\/how-we-can-stop-new-mafias-digital-footprint-spreading-2018\/\" target=\"_blank\" rel=\"noopener\">the next generation of thieves\u2014bank robbers 2.0\u2014<\/a>did in December 2017, when they stole more than $60 million in Bitcoin* from the mining marketplace <a href=\"https:\/\/techcrunch.com\/2017\/12\/06\/nicehash-hack\/\" target=\"_blank\" rel=\"noopener\">NiceHash<\/a>. It turns out stealing Bitcoin is a lot less taxing on the body.<\/p>\n<h6><em>*Disclaimer: I used the value of Bitcoins as they were at the time of the robbery. Current values are volatile and change from minute to minute.<\/em><\/h6>\n<p>Crime these days has gotten a technical upgrade. By going digital, crooks are better able to pull off high-stakes sting operations, using the anonymity of the Internet as their weapon of choice. And their target? Cryptocurrency.<\/p>\n<h3>Old-school bank robbers<\/h3>\n<p>The amount of money stolen from NiceHash is comparable to arguably the biggest physical heist to date, the theft of nearly $70 million from a Brazilian bank in 2005. Noted in the <a href=\"http:\/\/www.guinnessworldrecords.com\/world-records\/greatest-robbery-of-a-bank\" target=\"_blank\" rel=\"noopener\">Guinness Book of World Records,<\/a>\u00a0the robbers managed to get away with 7,716 pounds of 50 Brazilian real notes. There were 25 people involved\u2014including experts in mathematics, engineering, and excavation\u2014who fronted a landscaping company near the bank, dug a\u00a078-meter (256-foot) tunnel underneath it, and\u00a0broke through 1 meter (about 3.5 feet) of steel-reinforced concrete to enter the bank vault.<\/p>\n<p>The largest\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/United_California_Bank_robbery\" target=\"_blank\" rel=\"noopener\">bank robbery in the United States<\/a>, meanwhile, was at the United California Bank in 1972. The details of this bank robbery were described by its mastermind, Amil Dinsio, in the book <em>Inside the Vault<\/em>. A gang of seven, including an alarm expert,\u00a0explosives expert, and burglary tool designer, broke into the bank&#8217;s safe deposit vault and made off with cash and valuables with an estimated value of $30 million US dollars.<\/p>\n<p>What these robberies have in common is that, in order to pull them off, there were large groups of criminals involved with various special skills. Most of the criminals of these robberies were either caught or betrayed\u2014physical theft leaves physical traces behind. Today&#8217;s physical robbers run the risk of getting hurt or hurting others, or leaving behind prints or DNA. And they are often tasked with moving large amounts of money or merchandise without being seen.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21518 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/shutterstock_582226981-600x400.jpg\" alt=\"heavy loot\" width=\"600\" height=\"400\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/shutterstock_582226981-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/shutterstock_582226981-300x200.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h3>Bank robbers 2.0<\/h3>\n<p>So here comes the bank robbers 2.0. They don\u2019t have to worry about transporting stolen goods, fleeing the crime scene, digging or blowing things up. They are in no\u2014immediate\u2014physical danger. And if they\u2019re smart enough, they work alone or remain anonymous, even to their accessories. Their digital thievery has been proven successful through several methods used to obfuscate their identity, location, and criminal master plan.<\/p>\n<h4>Social engineering<\/h4>\n<p>One of the <a href=\"https:\/\/www.nytimes.com\/2015\/02\/15\/world\/bank-hackers-steal-millions-via-malware.html?_r=0\" target=\"_blank\" rel=\"noopener\">most spectacular<\/a> digital crimes targeted 100 banks and financial institutions in 30 nations with a months-long prolonged attack in 2013, reportedly netting the criminals involved over $300 million. The group responsible for this used <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/social-engineering\/\" target=\"_blank\" rel=\"noopener\">social engineering<\/a> to install malicious programs on bank employees\u2019 systems.<\/p>\n<p>The robbers were looking for employees responsible for bank transfers or ATM remote control. By doing so, they were able to mimic the actions required to transfer money to accounts they controlled without alerting the bank that anything unusual was going on. For example, they were able to show more money on a balance than was actually in the account. An account with $10,000 could be altered to show $100,000 so that hackers could transfer $90,000 to their own accounts without anyone noticing anything.<\/p>\n<p>The alleged group behind this attack, the Carbanak Group, have not yet been apprehended, and variants of their malware are still active in the wild.<\/p>\n<h4>Ponzi schemes<\/h4>\n<p>Bitcoin Savings &amp; Trust (BST), a large Bitcoin investment firm that was later proved to be a <a href=\"https:\/\/www.theverge.com\/2012\/8\/27\/3271637\/bitcoin-savings-trust-pyramid-scheme-shuts-down\">pyramid scheme<\/a>, offered 7 percent interest per week to investors who parked their Bitcoins there. When the virtual hedge fund shut down in 2012, most of its investors were not refunded. At the time of its closing, BST was sitting on 500,000 BTC, worth an estimated $5.6 million. Its founder, an e-currency banker who went by the pseudonym\u00a0pirateat40, only paid back a small sum to some beneficiaries before going into default. It was later learned that he misappropriated nearly <a href=\"https:\/\/insidebitcoins.com\/news\/trendon-shavers-bitcoin-ponzi-schemer-charged-40-million-fine\/24716\" target=\"_blank\" rel=\"noopener\">$150,000 of his clients&#8217; money<\/a> on &#8220;rent, car-related expenses, utilities, retail purchases, casinos, and meals.&#8221;<\/p>\n<h4>Hacking<\/h4>\n<p>Even though details are still unclear, the <a href=\"https:\/\/www.theregister.co.uk\/2017\/12\/06\/nicehash_diced_up_by_hackers_thousands_of_bitcoin_pilfered\/\" target=\"_blank\" rel=\"noopener\">NiceHash hack<\/a> was reported as a security breach related to the website of the popular <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/12\/how-cryptocurrency-mining-works-bitcoin-vs-monero\/\">mining<\/a> marketplace. Roughly 4,732 coins were transferred away from internal NiceHash Bitcoin addresses to a single Bitcoin address controlled by an unknown party. The hackers appear to have entered the NiceHash system using the credentials of one of the company&#8217;s engineers. As it stands now, it is unknown how they acquired those, although it&#8217;s whispered to be an inside job.<\/p>\n<h4>Stolen wallet keys<\/h4>\n<p>In September 2011, the <a href=\"http:\/\/blog.wizsec.jp\/2017\/07\/breaking-open-mtgox-1.html\" target=\"_blank\" rel=\"noopener\">MtGox hot wallet private keys were stolen<\/a>\u00a0in a case of a simple copied wallet.dat file. This gave the hacker access to not only a sizable number of Bitcoins immediately, but also the ability to redirect the incoming trickle of Bitcoins deposited to any of the addresses contained in the file. This went on for a few years until the theft was discovered in 2014. The damages by then were estimated at $450 million. A suspect was arrested in 2017.<\/p>\n<h4>Transaction malleability<\/h4>\n<p>When a Bitcoin transaction is made, the account sending the money digitally signs the important information, including the amount of Bitcoin being sent, who it\u2019s coming from, and where it\u2019s going. A transaction ID, a unique name for that transaction, is then generated from that information. But some of the data used to generate the transaction ID comes from the unsigned, insecure part of the transaction.As a result, it\u2019s possible to alter the transaction ID without needing the sender\u2019s permission. This vulnerability in the Bitcoin protocol became known as &#8220;transaction malleability.&#8221;<\/p>\n<p>Transaction malleability was a hot topic in 2014, as researchers saw how easily criminals could exploit it.\u00a0For example, a thief could claim that his transactions didn\u2019t show up under the expected ID (because he had edited it), and complain that the transaction had failed. The system would then automatically retry, initiating a second transaction and sending out more Bitcoins.<\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/andygreenberg\/2014\/02\/13\/silk-road-2-0-hacked-using-bitcoin-bug-all-its-funds-stolen\/#6b4d31b72025\" target=\"_blank\" rel=\"noopener\">Silk Road 2.0<\/a> blamed this bug for the theft of $2.6 million in Bitcoins in 2014, but it was never proven to be true.<\/p>\n<h4><span lang=\"EN-US\">Man-in-the-middle (by design)<\/span><\/h4>\n<p>In 2018, a Tor proxy was <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/double-dipping-diverting-ransomware-bitcoin-payments-onion-domains\" target=\"_blank\" rel=\"noopener\">found stealing<\/a>\u00a0Bitcoin from both <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/ransomware\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a> authors and victims alike. A Tor proxy service is a website that allows users to access <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/explained-dark-web\/\" target=\"_blank\" rel=\"noopener\">.onion domains<\/a> hosted on the Tor network without having to install the Tor browser. As Tor proxy servers have a <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/man-in-the-middle-mitm\/\" target=\"_blank\" rel=\"noopener\">man-in-the-middle (MitM)<\/a> function by design, the thieves were able to replace the Bitcoin address that victims were paying ransom to and insert their own. This left the ransomware authors unpaid, which in turn left the victims without their decryption key.<\/p>\n<h4>Cryptojacking<\/h4>\n<p>Also known as drive-by mining, cryptojacking is a next-generation, stealthy robbing trick that covers all mining activities completed on third-party systems without the users&#8217; consent. Stealing little amounts from many can amount to large sums. There are so many methods to achieve this that Malwarebytes&#8217; own\u00a0<a href=\"https:\/\/twitter.com\/jeromesegura\" target=\"_blank\" rel=\"noopener\">J\u00e9r\u00f4me Segura<\/a>\u00a0published a <a href=\"https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/Drive-by_Mining_FINAL.pdf\">whitepaper<\/a> about it.<\/p>\n<p>Unlike drive-by downloads that push malware, drive-by mining focuses on utilizing the processing power of visitors\u2019 computers to mine cryptocurrency, especially those that were designed to <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/12\/how-cryptocurrency-mining-works-bitcoin-vs-monero\/\">accommodate non-specialized processors<\/a>. Miners of this kind come to us in advertisements, <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/bundler\/\">bundlers<\/a>, browser extensions, and Trojans. The revenues are hard to guess, but given the number of blocks Malwarebytes records on<a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/why-is-malwarebytes-blocking-coinhive\/\" target=\"_blank\" rel=\"noopener\">\u00a0Coinhive and similar sites<\/a>\u00a0daily, criminal profit margins could be potentially record-breaking.<\/p>\n<h4>Physical stealing of digital currency<\/h4>\n<p>This last one brings us full circle, as someone actually managed to steal Bitcoins the old-fashioned way. In January 2018, three armed men attempted to\u00a0<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/ne4pvg\/police-in-ottawa-canada-charged-a-teen-with-armed-bitcoin-robbery-are-hunting-two-suspects\" target=\"_blank\" rel=\"noopener\">rob a Bitcoin exchange<\/a>\u00a0in Canada, but failed miserably as a hidden employee managed to call the police. However, others have had more success. The Manhattan District attorney is looking for the accomplice of a man that <a href=\"https:\/\/gizmodo.com\/man-charged-with-stealing-1-8-million-in-cryptocurrenc-1821252074\" target=\"_blank\" rel=\"noopener\">robbed his friend<\/a> of $1.8 million in Ether at gunpoint. Apparently this \u201cfriend\u201d got hold of the physical wallet and forced the victim to surrender the key needed to transfer the cryptocurrency into his own account.<\/p>\n<h3>Summary<\/h3>\n<p>As we can conclude from the examples above, there are many ways for cybercriminals to get rich quick. With a lot less risk of physical harm and even less hard labor, they can score larger amounts for less risk than the old-fashioned bank robbers. The only pitfall to robbing digital currency is how to turn it into fiat money without raising a lot of suspicion or losing a big chunk to launderers.<\/p>\n<p>While the diminished use of violence is reassuring, it&#8217;s still beneficial to think about how we can avoid becoming a victim. Much of it has to do with putting too much trust in the wrong people. We are dealing with a very young industry that doesn&#8217;t have a lot of established names. So how can you avoid getting hurt by these modern thieves? Here are a few tips:<\/p>\n<ul>\n<li>Don&#8217;t put all your eggs in one basket.<\/li>\n<li>Use common sense when deciding who to do business with. A little background check into the company and its execs never hurt anyone.<\/li>\n<li>Don&#8217;t put more money into cryptocurrencies than you can spare.<\/li>\n<\/ul>\n<h3>Additional links<\/h3>\n<ul>\n<li><a href=\"https:\/\/bitcointechtalk.com\/transaction-malleability-explained-b7e240236fc7\">Transaction Malleability Explained<\/a><\/li>\n<li><a href=\"http:\/\/time.com\/money\/5125106\/what-is-atm-jackpotting\/\">What is ATM Jackpotting<\/a><\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bank-robbers-2-0-digital-thievery-stolen-cryptocoins\/\">Bank robbers 2.0: digital thievery and stolen cryptocoins<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bank-robbers-2-0-digital-thievery-stolen-cryptocoins\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 09 Feb 2018 19:57:07 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bank-robbers-2-0-digital-thievery-stolen-cryptocoins\/' title='Bank robbers 2.0: digital thievery and stolen cryptocoins'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/bankrobbers.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they&#8217;ve developed a multitude of ways to pilfer cryptocurrency.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/technology\/\" rel=\"category tag\">Technology<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bak\/\" rel=\"tag\">bak<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/coinhive\/\" rel=\"tag\">coinhive<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/crypto-currency\/\" rel=\"tag\">crypto-currency<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/jackpotting\/\" rel=\"tag\">jackpotting<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malleability\/\" rel=\"tag\">malleability<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mt-gox\/\" rel=\"tag\">Mt Gox<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nicehash\/\" rel=\"tag\">Nicehash<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pieter-arntz\/\" rel=\"tag\">Pieter Arntz<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/robber\/\" rel=\"tag\">robber<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bank-robbers-2-0-digital-thievery-stolen-cryptocoins\/' title='Bank robbers 2.0: digital thievery and stolen cryptocoins'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bank-robbers-2-0-digital-thievery-stolen-cryptocoins\/\">Bank robbers 2.0: digital thievery and stolen cryptocoins<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[17479,15078,17480,4503,17481,17482,17483,16985,10523,17484,1331],"class_list":["post-11434","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bak","tag-coinhive","tag-crypto-currency","tag-cybercrime","tag-jackpotting","tag-malleability","tag-mt-gox","tag-nicehash","tag-pieter-arntz","tag-robber","tag-technology"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11434"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11434\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11434"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}