Connect with us

Hi, what are you looking for?

Tech & Science

Liquid: Cryptocurrency firm experiences cybersecurity breach (Includes interview)

In a blog post on its website, Liquid said that last week, on Friday, November 13, 2020,a hacker managed to breach employee email accounts and pivot to its internal network. The company said it detected the intrusion before the hacker stole any funds, but a subsequent investigation revealed that the attacker was able to collect personal information from Liquid’s database that stored user details.

Further information suggests a domain hosting provider “GoDaddy” that managed one the core domain names incorrectly transferred control of the account and domain to a malicious actor. As ZDNet reports, the stolen information included real name, home address, emails, and encrypted passwords.

Providing commentary on the incident for Digital Journal is Dr. Vinay Sridhara, CTO of Balbix.

Sridhara begins by stating that the incident exposes serious system flaws: “This incident is another reminder of the importance of basic cyber hygiene, as Domain Name Server (DNS) hijacking attacks have been fairly common against cryptocurrency services over the past few years.”

With this form of attack, Sridhara says: “DHS hijackings happen when users are unknowingly redirected to a malicious site. In this incident, Liquid’s employees were redirected to fake login pages where their email credentials were collected and later used to access the company’s internal infrastructure. Through this, the intruder was able to obtain the names, home addresses, emails, and encrypted passwords of users.”

In terms of what needs to be done, Sridhara recommends: “Cryptocurrency organizations that collect transactional data must be continuously monitoring all IT assets across hundreds of potential attack vectors to detect vulnerabilities. This involves analyzing tens of billions of time-varying data signals, a task that is not a human-scale problem anymore.”

In terms of more general lessons, Sridhara proposes: “Organizations must leverage security tools that observe these data points in real-time and employ AI and ML to analyze and derive insights in order to prioritize the vulnerabilities that need to get fixed first. Proactively managing risk must become the new norm and is a requirement for successful cybersecurity practice.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

US President Joe Biden delivers remarks after signing legislation authorizing aid for Ukraine, Israel and Taiwan at the White House on April 24, 2024...

Business

Meta's growth is due in particular to its sophisticated advertising tools and the success of "Reels" - Copyright AFP SEBASTIEN BOZONJulie JAMMOTFacebook-owner Meta on...

Business

Tony Fernandes bought AirAsia for a token one ringgitt after the September 11 attacks on the United States - Copyright AFP Arif KartonoMalaysia’s Tony...

World

AfD leaders Alice Weidel and Tino Chrupalla face damaging allegations about an EU parliamentarian's aide accused of spying for China - Copyright AFP Odd...