$83k in bitcoins 'stolen' through BGP hijack

Posted by   Virus Bulletin on   Aug 8, 2014

Short-lived network changes used to make miners connect to rogue pool.

Researchers at Dell SecureWorks have discovered an operation that used BGP hijacking to force bitcoin miners to connect to mining pools under the attackers' control, thus gaining them a lot of extra mining power and, ultimately, about $83,000 in bitcoins.

New bitcoins are constantly being created through a process called 'mining': performing resource-intensive and difficult calculations to create a 'block' with a hash value satisfying certain properties. Roughly every ten minutes, a new block worth 25 bitcoins (around $15k) is thus added to the 'block chain'. To make the payout from mining activity less of a lottery, miners usually cooperate in 'mining pools' to share both processing power and rewards.

In a mining pool, clients connect to the pool to receive instructions and share results. A commonly used protocol is the JSON-based Stratum mining protocol. Crucially, in this protocol the mining pool does not authenticate to the clients.

In the incident discovered by the Dell researchers, a rough entity working for a Canadian ISP, or having access to its networks, was able to abuse BGP to announce malicious routes, thus hijacking traffic destined for hosting companies such as Amazon, Digital Ocean and OVH.

None of these attacks lasted very long, but they were enough for the attackers to pretend to be the mining pool and tell the mining client to connect to a second server under their control. Lack of authentication in the Stratum protocol meant this happened seamlessly, and some miners didn't discover anything was amiss until weeks later.

Although the attacks stopped once the upstream provider of the Canadian ISP was notified, it is unclear whether the attack was performed by a rogue (ex-)employee or by an entity having obtained access to the ISP's network.

BGP hijacking isn't new, and in the recent past has, for instance, led to the routing of US Internet traffic through Belarus and Iceland. The study of the BGP graph can help detect and prevent malicious activity, as OpenDNS researcher Dhia Mahjoub will show in the paper "Sweeping the IP space: the hunt for evil on the Internet" that he will present at VB2014.

Cybercriminals' interest in bitcoins isn't new either. In another VB2014 paper, "Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists, a quick overview of the bitcoin bonanza in the digital era", Kaspersky's Santiago Pontiroli will take a look at malicious activity aroud bitcoins and other cryptocurrencies.

You can now register for VB2014, which will take place 24-26 September in Seattle, WA, USA. Or, if you have some interesting last-minute research to contribute, why not submit an abstract for one of the seven remaining slots.

Posted on 08 August 2014 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2018 paper: Lazarus Group: a mahjong game played with different sets of tiles

The Lazarus Group, generally linked to the North Korean government, is one of the most notorious threat groups seen in recent years. At VB2018 ESET researchers Peter Kálnai and Michal Poslušný presented a paper looking at the group's various…

Book your VB2019 ticket now for a chance to win a ticket for BSides London

Virus Bulletin is proud to sponsor this year's BSides London conference, which will take place next week, and we have a number of tickets to give away.

First 11 partners of VB2019 announced

We are excited to announce the first 11 companies to partner with VB2019, whose support will help ensure a great event.

VB2018 paper: Fake News, Inc.

A former reporter by profession, Andrew Brandt's curiosity was piqued when he came across what appeared at first glance to be the website of a small-town newspaper based in Illinois, but under scrutiny, things didn’t add up. At VB2018 he presented a…

Paper: Alternative communication channel over NTP

In a new paper published today, independent researcher Nikolaos Tsapakis writes about the possibilities of malware using NTP as a covert communication channel and how to stop this.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.