California cyber security firm unveils research results of Amazon DNS server hijack

    Source: Xinhua| 2018-05-18 07:50:55|Editor: Chengcheng
    Video PlayerClose

    SAN FRANCISCO, May 17 (Xinhua) -- A San Francisco-based cyber security firm Thursday revealed a report showing how hackers attacked an Amazon DNS server and stole users' crypto currency last month.

    RiskIQ, a global leader in digital threat management, profiled in the report a phishing automated transfer system (ATS) dubbed MEWKit, which targeted users of the crypto currency Ethereum exchange MyEtherWallet, and stole their virtual currency.

    The report said the newly discovered attack presents an entirely new threat to the crypto currency landscape, which exceeded "the capabilities of a typical phishing kit by leveraging characteristics of ATS malware to access and steal victims' Ethereum funds directly from the exchange."

    The attackers set up a phishing page mimicking the MyEtherWallet site and cheated users to log in, said the report.

    MEWKit simply abused MyEtherWallet's unique access to the Ethereum network to make the transactions in the background.

    Once a user logs in, MEWKit checks their wallet's balance and requests a receiver address from the server side, and then leverages the standard MyEtherWallet functionality by setting the attacker-owned wallet as the receiving address and transferring out the victim's entire fund, said the report.

    RiskIQ researchers discovered a link to the infamous attack on April 24, when hackers rerouted a significant portion of traffic intended for IP addresses operated by Amazon Web Services' DNS service, known as Route 53.

    Hackers made off with about 152,000 U.S. dollars worth of Ether in the attack that exploited weaknesses in DNS servers serving MyEtherWallet, earlier media reports said.

    DNS is a service that connects domain names of a website to whatever IP address it's hosted on.

    TOP STORIES
    EDITOR’S CHOICE
    MOST VIEWED
    EXPLORE XINHUANET
    010020070750000000000000011100001371877411
    主站蜘蛛池模板: 亚洲国产成人综合| 热久久这里是精品6免费观看| 精品国产不卡一区二区三区| 男人边吃奶边摸下边的视频| 欧美日韩国产在线人成| 日韩日韩日韩日韩日韩| 性猛交╳xxx乱大交| 在线观看国产精品麻豆| 国产欧美日韩综合| 嘘禁止想象免费观看| 亚洲精品午夜国产va久久成人| 亚洲不卡av不卡一区二区| 中文字幕日韩一区二区三区不卡| chinese打桩大学生twink| 另类欧美视频二区| 精品卡一卡2卡三卡免费观看| 欧美日韩成人在线观看| 日本三级特黄在线观看| 处破痛哭A√18成年片免费| 国产成人亚洲综合网站不卡| 免费黄色一级毛片| 亚洲一区二区三区影院| 两性色午夜视频免费网| 天堂资源最新版在线官网| 精品日本一区二区三区在线观看| 欧美人与动zooz| 强行交换配乱婬bd| 国产欧美va欧美va香蕉在| 免费女人18毛片a级毛片视频 | 天天干天天干天天操| 国产人成精品香港三级在| 亚洲成人高清在线观看| 三级网在线观看| 韩国一区二区视频| 欧美在线综合视频| 天天看天天摸天天操| 国产AV日韩A∨亚洲AV电影| 亚洲av中文无码乱人伦| 777成了人乱视频| 狠狠干最新网址| 成人亚洲成人影院|