Los hackers escanean la web en busca de información vulnerable de carteras Bitcoin y Ethereum

in #bitcoin6 years ago

bitcoin-ethereum-wallet-hacker.jpg

Cryptoactives are objects of desire for cyber pirates due to their value in years, Bitcoin and other cryptoactives have had important price hikes that seem to threaten the financial markets, being protagonists of a dynamic and volatile market where each time participant more people.

Bitcoin and Ethereum, which has reportedly not been modified to perform cyber attacks, which has reportedly not been completed with the search for sensitive information about cryptoactives.

The effort of scanning the network carried out by the hackers has been detected by researchers specialized in cybersecurity, who identified that several compressed, copying and backing files of cryptoactive billboards are in the sights of hackers. According to researcher Didier Stevens, the baby had been investigated a couple of years ago, but had never seen so many scans of the same time, the last time he saw a similar amount during the 2013 hike.

https://twitter.com/dim0x69

The idea of ​​scanning the internet in search of these files is to detect sensitive information to which the funds can be accessed, and then steal them. Now, they are not only looking for bitcoin portfolios, but also for Ethereum, the second cryptoactive in market capitalization.

In the case of the Smart Contractors Network, the attackers make false queries to the JSON-RPC interface contained in the Ethereum nodes, being an API that allows them to access information that should only be in closed, local environments. This is due to the fact that this interface does not have authentication mechanisms, so it can request applications to change funds in the applications of the installed portfolio, according to the specialist Dimitrios Slamaris.

https://twitter.com/campuscodi/status/934357745108742146/photo/1

1262/5000
As specified by Slamaris, during the same month a robbery of 8 ethers, or $ 3,200, of some vulnerable accounts was detected; while during this week Slamaris and the researcher Johannes Ullrich of Storm Center registered a new campaign of portfolio scanning, before which they warn that it is fundamental for those who execute nodes with the JSON-RPC interface that disable the proxy requests using filters as intermediaries to only receive approved clients.

One of the main security recommendations for cryptoactive users is not to include access information to their portfolios in the network, since it is vulnerable to being obtained by hackers. All access pins and private keys must be recorded on paper, physically, and stored in a safe place. Also, do not store the cryptoactives in exchange houses or online sites, but in private portfolios, which are nothing more than applications or interfaces that allow you to visualize the blockchain assets that are owned.

Sort:  

@royrodgers has voted on behalf of @minnowpond.
If you would like to recieve upvotes from minnowponds team on all your posts, simply FOLLOW @minnowpond.

            To receive an BiggerUpvote send 0.5 SBD to @minnowpond with your posts url as the memo
            To receive an BiggerUpvote and a reSteem send 1.25SBD to @minnowpond with your posts url as the memo
            To receive an upvote send 0.25 SBD to @minnowpond with your posts url as the memo
            To receive an reSteem send 0.75 SBD to @minnowpond with your posts url as the memo
            To receive an upvote and a reSteem send 1.00SBD to @minnowpond with your posts url as the memo

Coin Marketplace

STEEM 0.31
TRX 0.12
JST 0.033
BTC 64485.37
ETH 3156.53
USDT 1.00
SBD 4.05