Cryptocurrency hackers or fraudsters have been utilizing social media platforms such as Twitter for conducting digital currency scams in the past. We have seen attackers hacking Twitter accounts of famous personalities such as Donald Trump for scamming people. Now, they have brought a change into their scheme of attacking cryptocurrency firms. They have started attacking cryptocurrency firms’ domains. According to a report, hackers have used employees of the major domain name registrar GoDaddy for attacking cryptocurrency trading services providing firms.
KrebsOnSecurity, a famous cyber crime bog has reported on the 21st of November that earlier this month, numerous employees of GoDaddy were used by hackers in attacks on various digital currency services. These particular fraudsters basically tricked GoDaddy’s employees in a bid to gain control of the famous cryptocurrency firms’ domains.
Reportedly, these malicious actors are said to have gained control of domains of at least six cryptocurrency firms last week. Two of these crypto firms are cryptocurrency mining company NiceHash and the digital currency trading platform Liquid.com. Liquid was attacked on the 13th of November. Such kind of attack was confirmed by the Chief Executive Officer (CEO) of Liquid Mike Kayamori in a blog post on November 18, 2020.
While informing users of this security incident, Liquid CEO said in the blog post that GoDaddy has mistakenly handed over the firm’s domain and account to a fraudster.
“This gave the actor the ability to change DNS records and in turn, take control of a number of internal email accounts. In due course, the malicious actor was able to partially compromise our infrastructure, and gain access to document storage,” he added.
A few days after this attack, the cryptocurrency mining firm NiceHash also had to face such kind of attack on the 18th of November. Following the attack, the company claimed in a blog post that they did not find any unauthorized access to emails, passwords, or any of its employees’ personal data. However, it advised employees to reset their passwords while suggesting them to activate Two Factor Authentication (2FA).
However, it could not be made clear whether these attacks caused any loss of funds or not.