Search This Blog

Showing posts with label Crypto Currency. Show all posts

Cryptojacking Spree: Targeting Washington State Educational Institutions

 

According to a new advisory released by Palo Alto Network's Unit 42 team, recently, cryptojacking incidents have taken place against educational institutions in Washington State. Threat actors are targeting educational institutions in the United States intending to compromise their networks and mine cryptocurrency covertly. 

Otherwise known as cryptojacking attacks, this is a form of cyberattack in which attackers use deception tactics to install cryptocurrency mining components that leech off of computational power without being noticed or detected. 

On February 16, cybersecurity researchers discovered the first attack, which consisted of a malicious HTTP request sent to a domain owned by an educational institution. Security teams initially mistook it for a trivial command injection flaw, but it turned out to be a command for a web shell backdoor that attackers used to gain access to the institution's network. 

In this form of attack, attackers use various types of miner software to try to generate cryptocurrencies such as Monero, Litecoin, Bitcoin, and Ethereum. Attackers typically compromise a large number of systems to make the attacks lucrative and bring in more cryptocurrency. 

The researchers say that a UPX-packed cpuminer -- used to mine LTC and BTC -- has been delivered by way of malicious traffic. 

If deployment is successful, the backdoor is then able to call and execute the crypto mining payload. Besides, the malware will download a mini shell that pretends to be a wp-load.php file. "Since the mini shell is not moved elsewhere, we speculate that the current directory of the mini shell, as well as the backdoor, is a web directory exposed to the internet," the report states. 

Cryptocurrency mined on infected systems is sent to two wallets owned by the operators (1,2). In two other incidents, there were some differences when it came to user agent strings, pass values, and algorithms, but the general attack method remained the same. 

"The malicious request [...] exhibits several similarities," Unit 42 noted. "It's the same attack pattern delivering the same cpuminer payload against the same industry (education), suggesting it's likely the same perpetrator behind the cryptojacking operation."

An analysis of K-12 schools across the United States revealed in March that 2020 is a "record-breaking" year for cybersecurity incidents. Over 400 incidents were reported in the study, including ransomware, phishing attempts, website defacement, and denial-of-service (DoS) attacks.

Crypto at Risk After Facebook Leak: Here’s how Hackers Can Exploit Data

 

The tech giant Facebook has been hit with a new wave of data leaks, yet again but this time, the number of users whose records were exposed was not 50 million but a massive 500 million. 

According to a security analyst, sensitive personal information for over half a billion Facebook users was leaked on a well-trafficked hacking forum on April 3, posing a danger to millions of cryptocurrency traders who may now be susceptible to sim swapping and other identity-based attacks.

What should be done? 

In response to the question that how exactly does this most recent breach place at risk the crypto assets of individuals, Dave Jevans, CEO of blockchain security firm CipherTrace, told Cointelegraph that people who have had their phone numbers leaked need to be extra careful because a lot of fraud involving digital assets hinges on such details. 

He further added, “We’ve seen an increase in SIM swaps, phishing attacks, and other types of fraud involving cryptocurrencies that rely on acquiring the phone numbers of victims to execute. Leaked info about the identity of high-profile crypto users gave bad actors the ability to target them.” 

Ben Diggles, co-founder, and chief revenue officer at Constellation, told Cointelegraph that Facebook's latest security lapse is unsurprising, especially given that most Facebook users have a different approach, in which they prefer their world to be managed and structured for them. 

“Those that are crypto holders that were on the list have little to worry about unless they were storing descriptive details of their holdings and access on their Facebook account. However, these hackers have gotten really sophisticated, so I have no idea what tricks they may have [up] their sleeves with regards to scraping info specific to crypto wallets and exchanges.”, he added. 

However, he suggests that most users should update their passwords for all of their social media profiles, as well as all other sites that share their data with Facebook, as a precaution. 

Does decentralization matter? 

As more data leaks occur, a large majority of people around the world are understanding the value proposition that decentralized systems offer in terms of protection, particularly, since they do not feature a single point of failure. 

On the matter, Eli Arkush, a cloud solutions engineer at cybersecurity firm GlobalDots, suggests that having a platform's backend system distributed using blockchain technology could make it more difficult for hackers to obtain user information; however, once credentials fall into the wrong hands, password reuse may become a concern. 

However, Stephen Wilson, the CEO of Lockstep Group and a member of the Australian government's National Blockchain Roadmap Cybersecurity Working Group, believes that, contrary to popular belief, storing personal information on any blockchain ecosystem is never a good idea. He pointed out that the type of personal data breached by Facebook should never be stored in a blockchain, and even if it is, such data can never be completely protected by blockchain in the long run.

“Blockchain and DLTs usually only decentralize some aspects of data management. They don’t usually decentralize data storage in any relevant sense because they tend to duplicate ledger entries across multiple systems. The storage is distributed, but identical copies of information are available in multiple locations and can be vulnerable to attackers or thieves.”, he further added. 

Most hacking schemes in the past have primarily focused on stealing funds from cryptocurrency exchanges. For example, in 2014 and 2018, the total amount of money compromised as a result of exchanges being hacked was $483 million and $875 million, respectively. 

However, an increasing number of offenders are focusing their attention on stealing user data because it provides them with unique opportunities to obtain funds quickly. As a result, cryptocurrency owners must protect their assets.

Goodbye Cryptocurrencies: Number of 'Dead' Coins Increased by 35% Over Last Year

 

Coinopsy.com, an online firm that tracks dead cryptocurrencies has published a data report regarding the number of dead cryptocurrencies or crypto coins. Interestingly, there is a huge surge in the number of dead cryptocurrencies or crypto coins that had minimal to zero profits for everyone. 

According to the data report from Coinopsy.com, the number increased by 35% over last year to 1,949. Around February last year, the total number of dead coins exceeded 1,440. The term dead coins are associated with a cipher that no longer exists for multiple reasons. For example, they are used as a scam, their internet site remains down, there’s a problem with a node or wallet, it’s illiquid or it’s just abandoned, or it’s been stopped by a developer. 

However, if there’s a lack of information on the reasons why a coin died, it falls into the default deserted category. The growth within the quantity of such dead coins had gained momentum again in 2017 when a lot of entrepreneurs or firms went for preliminary coin choices (ICO) and had raised $4.9 billion through the year, as per the reports of Crunchbase. ICOs are meant to develop new blockchain-based cryptos or related apps or companies.

According to CoinMarketCap, ICOs had increased the number of existing coins from 29 to more than 850 projects in 2017. In December last year, the whole cryptos had reached close to 8,000. As of March 3, 2021, there were 9,108 ciphers led by Bitcoin and Ethereum were in circulation. However, many of these coins are no longer present because they never have been scammed, joked, or evolved.

Joke projects and coins have no real or concrete idea, but they are still looking for an investment. For example, according to CoinMarketCap, the Useless Ethereum Token (UET) was one such joke coin that held an ICO and raised over $300,000. The total market capitalization of over 9,000 cryptocurrencies is $1.96 trillion, of which Bitcoin commands a 60 percent share ($1.1 trillion) and Ethereum has an 11% share ($243 billion).

Attackers found abusing GitHub Infrastructure to Mine Cryptocurrency

 

Microsoft-owned GitHub is the new cyberattack victim, with reports of cybercriminals manipulating GitHub's cloud infrastructure to mine cryptocurrency. Code repository hosting service, Github has started an investigation into a series of attacks aimed at abusing its infrastructure to mine cryptocurrency illegally. 

GitHub Actions is a continuous integration (CI) and continuous deployment (CD ) solution that makes it easy to automate all the software workflows and setup periodic tasks. The particular attack adds malicious GitHub Actions code to repositories forked from legitimate ones and further creates a Pull Request for the original repository maintainers to merge the code back, to alter the original code. 

“In a phone call, Dutch security engineer Justin Perdok told The Record that at least one threat actor is targeting GitHub repositories where Actions might be enabled. The attack involves forking a legitimate repository, adding malicious GitHub Actions to the original code, and then filing a Pull Request with the original repository in order to merge the code back into the original.” reported The Record. 

“But the attack doesn’t rely on the original project owner approving the malicious Pull Request. Just filing the Pull Request is enough for the attack, Perdok said.” This is particularly true for GitHub projects that have automated workflows setup to substantiate incoming Pull Requests via Actions. As soon as a Pull Request is created for the original project, GitHub's systems execute the attacker's code which instructs GitHub servers to retrieve and run a crypto miner. 

This isn't the first time an attack leveraging GitHub infrastructure has abused GitHub Actions. An identical attack had previously been identified by another programmer, Yann Esposito, in which an attacker had filed a malicious Pull Request against Esposito's GitHub project. 

Last year, BleepingComputer reported on GitHub being used to host a wormable botnet Gitpaste-12, which reappeared with over 30 exploits the following month. Unlike Gitpaste-12 or the Octopus Scanner malware, which targeted vulnerable projects and computers, this attack appears to be solely abusing on GitHub servers for crypto mining.

In an email, GitHub told The Record that they are “aware of this activity and are actively investigating”. For now, the attack does not appear to damage users’ projects in any way and seems to be solely focused on abusing GitHub infrastructure.

UK Cryptocurrency Exchange EXMO Suffers a 'Massive' DDoS Assault

 

Cryptocurrency exchange EXMO, a British company was targeted in a distributed denial-of-service (DDoS) attack. As a precautionary measure company has shut down its servers temporarily. The company also said in a notification that it suffered a distributed denial-of-service attack on February 15, when its website was offline for two hours.

EXMO’s spokesperson said that the previous DDoS assaults only affected the website but this attack is quite different from previous attacks due to its potency and capability to drive 30 GB of traffic per second affecting the whole network system, including the website, API, Websocket API, and exchange charts. The assault was combated with the help of DDoS protection Qurator and the company has also beefed up the security to avoid any further damage. 

This was the second assault on the company in the last two months, on December 24, threat actors attacked the company and earned 5% of EXMO’s assets from their ‘hot’ wallets. Later, the company confirmed that it has suffered a loss of about $4 million in customer cryptocurrency; currently, there are no proofs to establish the motives behind both the attacks but it is suspected that due to the bitcoin price hit records high, threat actors tried to cash in on the higher value of the stolen assets.

EXMO released an update regarding the developments in an investigation wherein they mentioned, “Our team is currently developing a new infrastructure for hot wallets. Since each blockchain needs a separate server, the process will take some time, once deposits and withdrawals are available, you will have to generate a new wallet address in the ‘Wallet’ section of your account. Our investigation is ongoing, and we are taking all necessary and precautionary measures to prevent such incidents from reoccurring.” 

The company was launched in 2013 and is headquartered in London. Due to Britain’s exit from the European Union, EXMO had chosen to establish their brand into new European bases as part of a contingency plan. The company was registered with the UK Financial Conduct Authority (FCA) for a brief stint as a crypto asset business until July 9th, 2021, following a request submitted back in April 2020. 

EXMO has expanded its reach outside the UK in a very short span of time and the company’s offices are in Kyiv, Barcelona, Moscow, and Istanbul.

Discord Cryptoscam: Scammers Lure Players to Fake Cryptocurrency Exchange Site

 

Experts at Kaspersky have issued a warning alarming that hackers are attacking Discord users, with a scam that focuses on counterfeit cryptocurrency transactions and using the bait of free Ethereum cryptocurrency or Bitcoins to steal user data and money. The cyber scam fools victims on cryptocurrency servers of Discord by sending users a message that looks like a legit ad of an upcoming trading platform that is doing cryptocurrency giveaway. The scammer then deploys social engineering techniques to generate sign-ups, as per the Kaspersky report.  

Experts believe that the ad offers such generous offers to get user interest, the offer depends on the message to message. However, the gist always remains the same, for instance, if the exchange will help the traders in dire times or is it just trying to lure new users. In this case, says Kaspersky, there'll be a lucky user who'd be chosen for the reward of free Ethereum cryptocurrency or Bitcoins. As we all know, the Discord platform was built solely for gamers, but various users, varying from study groups to cryptocurrency enthusiasts, use Discord's handy servers, channels, and private messages for communication. 

The user diversity becomes an easy target for hackers to scam. In this particular incident, the scammer first tried to send the victim a fake message with emojis and added details that contained a code to free cryptocurrency gifts. The message contained a malicious link that led the user to a fake cryptocurrency exchange domain. When the victim clicks the given link, he's redirected to a website (fake of course). The cryptocurrency exchange site has details like trading info, charts, and trading history (to make it look more genuine). 

"The attention to detail even extends to offering victims two-factor authentication to secure their accounts, plus antiphishing protection. Here, of course, the purpose is purely to add plausibility; the site’s true purpose is to transfer money from victim to criminal," reports Kaspersky. "The scammers claim to need a top-up — in our case, 0.02 BTC or an equivalent amount in Ethereum or US dollars. The scammers appear to be collecting a database to sell; many legitimate services, including financial ones," it further says.

Worst Plunge Since March Shakes Faith in Bitcoin

 

Bitcoin ride took another twist on Monday, as the worst two-day tumble in the digital currency since March stirred up worry that the polarizing crypto-currency boom may run out of steam. Bitcoin slid as much as 21% over Sunday and Monday in the greatest two-day slide since March. While the digital token recuperated a portion of the misfortunes during the European meeting, it was still down for most of the time.

"Time to take some money off the table," Scott Minerd, chief investment officer with Guggenheim Investments, said in a tweet from his Twitter account. "Bitcoin's illustrative ascent is impractical in the near term." In late December, Minerd anticipated Bitcoin could at last reach $400,000. 

Bitcoin has more than quadrupled in the previous year, bringing out recollections of the 2017 mania that originally made cryptocurrencies a commonly recognized name before costs fell just as quickly. Costs nearly came to $42,000 on Jan. 8 with retail traders and Wall Street investors clamoring for a slice of the pie. 

"It's to be determined whether this is the beginning of a bigger correction, but we have now seen this parabola break so it may very well be," said Vijay Ayyar, head of business development with crypto exchange Luno in Singapore.

People who believe in Bitcoin contend the rally this time is not quite the same as past win fail cycles in light of the fact that the asset has matured with the passage of institutional investors and is progressively seen as authentic support against dollar weakness and inflation risk. Others stress that the rally is untethered from reason and powered by huge swathes of fiscal and monetary related boost, with Bitcoin improbable to actually fill in as a feasible currency alternative. 

"Putting resources into crypto assets, or investments and lending linked to them, for the most part, includes facing extremely high challenges with investor’s money," the Financial Conduct Authority said in a statement. The FCA's concerns incorporate price volatility, the multifaceted nature of items offered, and the absence of customer protection regulation around a significant number of the products. 

With such countless investors wanting to get rich on Bitcoin, the asset is drawing the attention of regulators. On Monday, the UK's financial watchdog gave a distinct admonition for consumers hoping to benefit from crypto: be prepared to lose everything.

New Self-Spreading Golang Worm Dropping XMRig Miner on Servers

 

Security researchers at Intezer have found a new self-spreading worm written in GoLang. The malware variant has been actively targeting both Windows and Linux servers, predominantly since December 2020. Researchers noted that the worm developed by China-based hackers attempts to mine Monero, an open-source cryptocurrency launched in 2014 which gained immense popularity and wide acceptance for its privacy-oriented features.
 
GoLang's rich library ecosystem makes it a top preference for malware developers, who can infiltrate the systems without being detected while working with GoLang's smooth malware creation process. The language makes it easier for hackers to bypass security as the malware written in GoLang is large-sized and scanning large files is beyond the capabilities of most of the antivirus software.

The 'GoLang' malware that has been dropping XMRig cryptocurrency miners on Windows and Linux servers, has worm-like capabilities that let it propagate itself to other systems through brute-forcing. 

The worm attacks application servers, non-HTTP services, and web application frameworks; it has targeted public-facing services rather than "the end-users". MySQL, Tomcat admin panel, and Jenkins are some of its latest victims. Besides, these public-facing services with weak passwords, the malware operators have also tried to compromise Oracle WebLogic Server by exploiting its remote code execution vulnerability – CVE-2020-14882, in an older variant.

Attack Execution 

The worm on the Command and Control (C&C) server was periodically updated by the operators, signifying the current "active" status of the malware. Once the target is being successfully compromised, the attack proceeds with deploying the loader script, a Golang binary worm, and an XMRig Miner – three files hosted on the aforesaid C&C server.

While giving insights into the matter, Chad Anderson, Senior Security Researcher at DomainTools said, “While it’s certainly alarming that there were no detections for this worm’s initial sample, that’s not surprising as Golang malware analysis tooling has still been playing a bit of catch up in the automation space,” 
 
“We would expect that with the rise in cryptocurrency prices over the last few weeks that actors looking to cash in for a few extra dollars would cause a surge in mining malware,” he further added. 
 
“The fact that the worm’s code is nearly identical for both its PE and ELF malware—and the ELF malware going undetected in VirusTotal—demonstrates that Linux threats are still flying under the radar for most security and detection platforms,” the report by Intezer read.

Crypto Trading App Voyager Hit By Cyberattack, Company Shuts Down Website

 

Cryptocurrency brokerage platform Voyager stopped its operations on 28th December after it suffered a  cyberattack that disrupted its DNS configuration. Voyager Digital LLC is a cryptocurrency is a brokerage platform where an investor can trade their assets with the help of the Voyager mobile app. The company has shown rapid growth in the year 2020, increasing its growth by 40x times in the last 12 months. Not only this, Voyager currently holds under management $200 million in assets. On 28th December, Voyager's online platform had to shut down due to, as per the press release "currently undergoing maintenance." 

The company later revealed that it had suffered a cyberattack which led to the closing and canceling of all limit orders. Steve Ehrlich, Co-founder, and CEO of Voyager said in a press release that "customer funds and security are of the utmost importance to Voyager. Whilst all funds and crypto are secure we have had to temporarily halt trading on the platform and we sincerely apologize for the inconvenience and thank our clients for their patience." 

The team at voyager had no trouble finding the intrusion, the moment it was detected, the team shut down the systems to save client information and assets.  After the cyberattack, the Voyager app is now online, and all the tradings on the website are now back to normal. To assure cybersecurity, Voyager signed out all its users from the app and has advised them to change their login credentials and reset 2-step verification (2fa). As of now, there is not much detail about how the cyberattack happened other than a tweet that mentioned that it was a DNS attack. 

"With a highly experienced team that has previously built successful online brokerages, we know the importance of having robust and highly secure systems to counter cyber attacks. With our rapid growth to date bringing the business into the spotlight, we are fully prepared for such events and in this case, have acted swiftly to prevent any impact on the business," says Voyager press release. 

First Deputy Chairman of the Bank of Russia: Blockchain is not a panacea, and cryptocurrency is not money


First Deputy Chairman of the Bank of Russia Olga Skorobogatova said that blockchain is perfect for letters of credit and guarantees because it solves the problem of trust. However, this is not a universal technology for all occasions.

According to her, many people overestimate the advantages and prospects of blockchain technologies. As negative aspects of cryptocurrencies, the banker noted their high level of volatility, lack of guarantees for saving investments, and the possibility of their use for money laundering and terrorist financing.

This position of the Central Bank of the Russian Federation was one of the reasons for the delay in the adoption of the bill on digital financial assets, which should become the main legislative act regulating the cryptocurrency industry. Recently it became known that the adoption of the law is being postponed due to the coronavirus pandemic.

Despite the rejection of cryptocurrencies, Olga Skorobogatova spoke positively about stablecoins.
“We believe that this is a more reliable type of crypto-assets since they are provided with real assets and give users certain guarantees,” she said, adding that in order to protect consumers, it is necessary to effectively regulate this sector at the global level.

The Central Bank is actively collaborating with other regulators regarding stablecoins and coins such as Libra. According to Skorobogatova, many Central Banks are actively studying the possibility of creating a national digital currency, and the Central Bank of the Russian Federation is no exception in this regard, but at this stage, the authorities have more questions than answers.
In particular, she does not yet see what real benefits the digital currencies of the Central Banks (CBDC) will bring to the economy, people and business.

It is worth noting that the beginning of the pandemic of coronavirus infection served as a kind of trigger for the introduction of remote voting. This was recently stated by the political party United Russia" For this purpose, an electronic voting system based on blockchain technology has been developed. Experts believe that this will reduce the negative effect of the quarantine regime, which has somehow slowed or stopped the political activities of most other parties, not only in Russia but also in the world.

The issue and circulation of cryptocurrencies will be banned in Russia


On March 16, a Representative of the Bank of Russia, Alexey Guznov, announced a possible ban on the issue and organization of cryptocurrency circulation in the territory of the Russian Federation. As noted in the bill on digital financial assets, the issue and circulation of cryptocurrencies in Russia carry an unjustified risk. The bill prohibits the issue and circulation of cryptocurrency in Russia and introduces responsibility for violating the ban.

Mister Guznov noted: "The position of the Bank of Russia remains unchanged. We believe that there are great risks when legalizing the circulation of cryptocurrencies." Risks arise for financial stability and the anti-money laundering system, and consumer protection will also suffer.
The Central Bank objected to legalizing cryptocurrency as a "tool" and an object of circulation, said mister Guznov.

Some experts suggested that cryptocurrency should be treated as a foreign currency and its issuance and circulation should be regulated in the same way.

The authorities replied that they did not intend to ban the ownership of the digital currency. The bill only prohibits the issuance and circulation of cryptocurrencies and introduces liability for violation of this ban.

It is absolutely impossible to ban cryptocurrencies and mining, said Yuri Brisov, a member of the Commission for the Legal Support of the Digital Economy. He is sure that such measures will become an obstacle to the development of the blockchain industry in the Russian Federation.

"The ban on mining and cryptocurrencies will lead to the complete decline of the blockchain industry. For this reason, all developed countries, although they understand the risks associated with money laundering, tax evasion, do not ban cryptocurrencies and mining; to ban today means to limit the potential for economic growth and technological development of their country," said Brisov.

It is important that legal regulation in Russia does not hinder the development of new technologies.
Earlier EhackingNews reported that Russian law enforcement agencies, together with the Ministry of Internal Affairs, to prepare proposals for the arrest of cryptocurrencies by 2021.

Recall that in 2018, President Vladimir Putin said that Russia should "carefully and cautiously" monitor the sphere of cryptocurrencies. At the same time, the position of the Central Bank of Russia was that electronic money can not be a means of payment.

Kaspersky Lab reports North Korean Hacker group Lazarus stealing cryptocurrencies using the Telegram messenger


A group of hackers calling themselves Lazarus modified their previous scheme to steal cryptocurrency which was used in 2018. Hackers use more effective tactics and act more carefully. According to Kaspersky Lab, now, not only users of the macOS operating system are at risk but also users of Windows.

Presumably, Lazarus hackers use malware that runs in memory and not on hard drives allowing it to remain undetected. The researchers believe that the group uses Telegram to spread the virus.

The new Lazarus attack was named Operation APpleJeus Sequel, which follows APpleJeus attack conducted in 2018. Principle of cryptocurrency theft remains the same as before: fake cryptocurrency companies are used to attract investors. The websites of these companies contain links to fraudulent

Telegram trading groups, through which malware that infects Windows computers is distributed.
Once the system is infected, attackers can gain remote access to it and steal the cryptocurrencies stored on the device. So far, researchers have been able to identify many victims of the new fraud across Europe and in China. A representative of Kaspersky Lab reports that it is known about the victims from Russia, China, Poland and the UK. At the same time, they include both individual traders and companies whose activities are related to cryptocurrency.

Kaspersky noted that currently, hackers from Lazarus have suspended their campaign using the messenger, but researchers suggested that in the future, attackers will use even more advanced methods.

Earlier, a closed UN report reported that North Korea finances the development of weapons through digital and Fiat currencies stolen from banks and cryptocurrency exchanges. Last fall, Group-IB said that a North Korean group of hackers stole $571 million in cryptocurrencies.

Upbit suffers $52M loss in a Cryptocurrency Heist


One of the globe's largest cryptocurrency transactions is being forced to cease account debits and credits when it was hit by a huge online theft worth $52M. UpBit, a South Korean cryptocurrency market, announced the provisional stay declaration on Wednesday accompanied by a letter from CEO Lee Seok-woo, Dunamu. "The heist took place on Wednesday in the afternoon. Around $50 million in Ethereum currency were sent from an UpBit account via an anonymous beneficiary," says Lee Seok-woo.


The victims of the robbery will have their damages satisfied by the firm, which has sent additional crypto-currencies into the firm's cool account for advanced safety. “It is expected that our company will take around 2 weeks more until the transaction gets active again. As soon as it is done, we'll inform the public,” stated Lee. UpBit’s toils are the newest in a lengthy series of victorious cyberattacks attacking cryptocurrencies markets in recent times. Other victims involve United States company Coinbase, which faced charges whopping $1million, Bitpoint, of Japan, that suffered $32million, Singapore firm Bitrue, that was stripped of $4.5million and Binance, whose headquarters are in Malta.

"The newest heist is a serious lesson to account holders concerning the value of working only on safe and secure exchanging forums," argues Peter Wood, CEO CoinBurp, a cryptocurrency exchange. He further continues, "it is especially critical in the case of cryptocurrency because it can't be traced virtually and, no regulatory authority is present to look over this problem." “But, possible account holders are ensured that they shouldn't be concerned as attacks like these have happened before. However, the individuals must examine the safety contracts and measures carefully while working on any cryptocurrency exchanging program,” says Lee Seok-woo.

At the beginning of this year, the United Nations accused North Korea of utilizing its increasing hacking abilities to attack crypto markets in an attempt to fulfill the country's treasures. North Korea is accused of storing $2 Billion from the cryptocurrency hacks. Upbit was originally started as a business among Bittrex and Dunamu, a South Korean app maker, that supports messenger colossal Kakao. Other cryptocurrency exchanges have warned their users about the heist.