ETHERLive delivers real-time price and volume data across 16+ exchanges to users in a clear and easy-to-understand package. Users can get up-to-the-second updates for each exchange/currency pair, as well as aggregated market averages for each exchange, currency, and the market as a whole. It also provides a global converted average of all the currency pairs monitored by ETHNews, converted to USD.


24hr ---

The Basics

Learn the basics of Ethereum and various cryptocurrency technologies

Learn More

What is Ethereum?

Understand the underlying principles of the Ethereum Platform

Learn More

The Blockchain

Discover the revolutionizing technology known as the blockchain

Learn More

Press Release

Submit a press release for consideration on ETHNews

Submit Press

Story / Dapp

Submit a story or DAPP to be considered for publication on ETHNews.

Submit Story


Submit "Ethereum Explainer" content for consideration to be featured on ETHNews

Submit Topic
ETHNews Logo
Ether Price Analysis
Contact Us

Individual Cyber Attacks: Know The Common Exploits




It’s big news when platforms are hacked, but more often, individuals find themselves targeted. Here's how to be vigilant.

Hollywood will feed moviegoers stories about how a hacker or spy might ply advanced technology to underscore the efforts of their espionage. While it's true micro-transmitters that are ridiculously small and easy to plant do exist, as well as devices that can read the RFID chips in credit cards without invitation, the methods of most hackers might be surprisingly low-tech when compared to their counterparts on the silver screen.

Although it makes sensational headlines when platforms fall under siege of hackers, reports of individual users who find themselves the targets of malicious actors often go ignored. ETHNews previously discussed some of the attack vectors that may threaten cryptocurrency systems. In this foray into cybersecurity, we'll focus on socially engineered attempts to get information; malicious software like key-loggers that create exploitable glitches, or make it possible obtain private information from various devices; and centralized databases that have previously been hacked and are subject to data dumps.

Paul Walsh, CEO of MetaCert, a data loss prevention company, has personal experience with socially engineered exploitation. He told ETHNews, "Specifically when it comes to social engineering, the biggest attack in the crypto-world right now is where the attackers will have your phone number changed to a new SIM [card]." To do this, attackers fool an employee of a service provider by providing information that can be found in social media accounts in order to impersonate a customer. Once the phone number has been paired with a new SIM card, the imposter can easily access other private accounts because they can bypass any 2-factor authentication associated with that phone number; the texts will be sent to the phone with the new SIM card. When this happens, the customer is often unaware until it is too late.

"Ironically, I gave a talk on this topic at the tech-focused MoNage conference in LA ... and my biggest point was: please don't use SMS based two-factor authentication," Walsh said. "Four hours later they did it to me. So, literally that evening I got a text message saying, 'Your number has been changed to a new SIM card. If it wasn't you, please call us.' And of course, when I called, T-Mobile said it wasn't me. They couldn't verify me because [the attacker] actually changed my password. That was a complete nightmare."

Walsh was prepared for the attack:

"I knew I would be a target, so I made sure some time ago that I didn't have root access to anything that could compromise MetaCert or any of our customers' data. I highly recommend high profile teams within the space do the same."

When Walsh went into one of the mobile carrier's brick and mortar locations, he found the resident staff's expertise to be severely lacking. "They didn't even know what I meant when I said my number has been hijacked and is compromised ... They had no idea what they were talking about."

Walsh said he was told that the employee wasn't able to immediately contact the fraud department, but someone would be in touch with him. When Walsh didn't hear from anyone, he took his frustration to twitter:


Suffice it to say, Walsh was nonplussed by T-Mobile's emoji-laden response. Since he had yet to receive a phone call from the company's fraud department, he continued to reach out to the cellular provider. With some prodding, however, he finally received more communication from T-Mobile regarding, well, the lack of communication:


Walsh's ordeal with T-Mobile is still ongoing, and he said the company has told him he'll need to file a FOIA request to discover just how his number was hijacked. However, he did confirm that a representative of the CEO's office eventually spoke to him and said he would be receiving a letter in the mail indicating whether he had been compromised. The message seems to have missed the mark; Walsh had obviously been compromised. The situation is a great case for users in the crypto-space to heed Walsh's warning and utilize ulterior methods of two-factor authentication other than SMS.

Moving on, a step up on the tech-scale from socially engineered attacks is a world of malware designed to spy on users. Some pieces of malware gather data or act behind the scenes, such as stealth mining software that commandeers CPUs or graphics cards. Other malware might encrypt a computer's files and ask for a ransom, often payable in some form of cryptocurrency. Sometimes the malware changes the way a computer's clipboard works, switching out complicated hex codes it identifies as wallet addresses. When the unknowing user copies and pastes an address, a different one that is controlled by the hacker gets pasted instead.

Constant vigilance is the key to surviving malware attacks. Just as a virus evolves in its host, malware engineers are constantly tweaking their programs to exploit bugs, glitches, or other holes in cybersecurity systems. Keeping a finger on the pulse of the community is a good way to learn about these security flaws.

Knowledge is power, but sometimes it's best to fight fire with fire, and there are many available options in the marketplace of security software. However, in order to be most effective, it may be necessary to utilize several pieces of software – and that can become expensive.

Hardware is another option users might employ; a computer with a closed architecture operating system (OS) offers users a chance to mitigate the types of software that can run within that OS's structure. This method helps protect against malware, but it may come at the cost of limiting the types of plugins and other software that machine is capable of running.

Why go through the trouble of hacking someone when others have already done the hard work? Many large institutions with centralized databases are prime targets for hackers. Precious user information including payment channels, pin numbers, and various other private data are stored within these databases. It spells bad news for consumers, and many times when a hack affects a company's network, disclosure comes months or years later. In some cases, the individuals put at risk have no choice in their participation with the platform, such being the case with the hacks of Equifax, which put the personal information of over 143 million users at risk. 

Sometimes hackers hold on to the information they steal for whatever nefarious purpose it may serve, but all too often, the data is dumped onto public servers where anyone can find it. When that happens, the only thing to do is reset every password that might have been affected. It's very difficult to work around these types of situations since many factors, including reliance on a centralized database, limit the user's ability to play it safe.

Everyone in the cryptocurrency community needs to consider themselves targets for phishing, socially engineered attacks, and malware. The attention that the industry is beginning to draw from mainstream media will also attract malicious actors. It is up to us to individually assess the threats that are out there and take care to protect ourselves and others, whenever possible, from transgression.

Jeremy Nation

Jeremy Nation is a writer living in Los Angeles with interests in technology, human rights, and cuisine.

ETHNews is committed to its Editorial Policy

Like what you read? Follow us on Twitter @ETHNews_ to receive the latest cybersecurity, cyber attack or other Ethereum technology news.