{"id":8247,"date":"2020-02-25T02:21:45","date_gmt":"2020-02-25T00:21:45","guid":{"rendered":"https:\/\/forklog.media\/?p=8247"},"modified":"2020-02-25T19:40:48","modified_gmt":"2020-02-25T17:40:48","slug":"bitcoin-in-cybercrime-questionable-choice-that-works","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/bitcoin-in-cybercrime-questionable-choice-that-works\/","title":{"rendered":"Bitcoin in Cybercrime: Questionable Choice That Works"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Looking through the news that came up during the month, one may notice several closely packed cases of hacking, extortion, and other unsavory activities involving Bitcoin. While there seems to be no particular connection between these cases, this is an unkind reminder not to be negligent about basic cybersecurity.<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">In this piece, we look into the recent events of Bitcoin extortion and figure out if there is something to be wary of.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybercrime February<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Right at the beginning of the month, <\/span><a href=\"https:\/\/cointelegraph.com\/news\/hackers-stole-and-encrypted-data-of-5-us-law-firms-demand-2-crypto-ransoms\"><span style=\"font-weight: 400;\">news<\/span><\/a><span style=\"font-weight: 400;\"> came through about a data breach affecting 5 law firms in the U.S. According to the report by Cointelegraph, hackers demanded two separate ransoms of 100 BTC from each firm. One would restore access to the data, and the other would buy the hackers\u2019 promise to delete whatever info they\u2019ve copied instead of selling it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All five hacks are attributed to a criminal group called Maze. The group would target companies and post their names on a website. If a company refuses to pay, the criminals start publishing portions of the stolen data until the ransom is paid. According to Coindesk\u2019s sources, the law firms in question faced a similar scenario.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Later, on February 12th, The New York Times <\/span><a href=\"https:\/\/www.nytimes.com\/2020\/02\/12\/world\/europe\/netherlands-mail-bombs-bitcoin.html\"><span style=\"font-weight: 400;\">wrote<\/span><\/a><span style=\"font-weight: 400;\"> about two mail bomb explosions in post offices in the Netherlands. The explosive devices were said to be not too powerful and luckily nobody got hurt. Notably, in both cases, the sender included notes in which they demand an undisclosed sum in Bitcoin to prevent subsequent attacks. There\u2019s been no news about the investigation so far, but at least the harm was minimal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adding to the cybercrime media coverage, in February, the French authorities <\/span><a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/actualites\/campagnes-darnaques-au-chantage-a-la-webcam-pretendue-piratee\"><span style=\"font-weight: 400;\">reported<\/span><\/a><span style=\"font-weight: 400;\"> that over the last year at least 90,000 people across the country were victims of \u201csextortion.\u201d These people paid from hundreds to thousands of euros, primarily in BTC, to prevent the criminals from publishing explicit materials obtained through their hacked webcams. For comparison, in 2018, only 28,885 people were registered with similar cases. This is less than a third from 2019\u2019s numbers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lastly, on February 18th, a cybersecurity blog KrebsOnSecurity <\/span><a href=\"https:\/\/krebsonsecurity.com\/2020\/02\/pay-up-or-well-make-google-ban-your-ads\/\"><span style=\"font-weight: 400;\">wrote<\/span><\/a><span style=\"font-weight: 400;\"> about the new wave of extortionists who target the users of Google AdSense. The criminals threaten to generate fake views for the ads, prompting Google to block the affected website. Those who want to avoid the trouble were asked for a ransom of $5,000 in Bitcoin.<\/span><\/p>\n<blockquote><p><b><i>\u201cVery soon the warning notice from above will appear at the dashboard of your AdSense account undoubtedly! This will happen due to the fact that we\u2019re about to flood your site with a huge amount of direct bot-generated web traffic with a 100% bounce ratio and thousands of IPs in rotation\u2014a nightmare for every AdSense publisher,\u201d <\/i><\/b><i><span style=\"font-weight: 400;\">reads the message a user got from the criminals.<\/span><\/i><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Google didn\u2019t comment on any particular cases of AdSense-related extortion but commented that the cases of such sabotage are rare and encouraged publishers to contact the company\u2019s support and check the \u201ctips for AdSense publishers on sabotage\u201d presented in Google\u2019s <\/span><a href=\"https:\/\/support.google.com\/adsense\/answer\/1348739?hl=en\"><span style=\"font-weight: 400;\">help center<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Bitcoin-Centric Culture<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While these are still separate cases of extortion, they are all similar in using Bitcoin for the ransom. This is a highly questionable way to go with cybercrime, considering the technical side of Bitcoin and a selection of alternative cryptocurrencies that seem like a better fit for the task.<\/span><\/p>\n<blockquote><p><b><i>\u201cIt isn&#8217;t obvious why in all these cases Bitcoin was the currency of choice. The anonymity of Bitcoin is a myth and there are cryptocurrencies that appear to be much more instrumental for a shady business like extortion. The people behind the crimes either know something very special or are simply arrogant,\u201d<\/i><\/b><i><span style=\"font-weight: 400;\"> an independent cybersecurity expert said in a comment to forklog.media.\u00a0<\/span><\/i><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">On the other hand, the most straightforward explanation is that almost any cryptocurrency would be better for the job than non-crypto options. Given that, Bitcoin stands out as the most alluring currency in the economic sense. Its popularity means that coins can be traded on any exchange with very few exceptions, while the users and also the victims face less friction when dealing with Bitcoin.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Combined with the hackers\u2019 ability to operate from an arbitrary point on Earth and the tools, such as coin mixers, that make transactions harder to trace, these aspects make Bitcoin not the best, but a viable option for cybercriminals.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Ransomware and extortion attacks have been part of the online world for a while now and <\/span><a href=\"https:\/\/forklog.com\/en\/bitcoin-extortion-and-hacked-gadgets-how-blockchain-will-repel-cyberattacks-in-2020\/\"><span style=\"font-weight: 400;\">may intensify<\/span><\/a><span style=\"font-weight: 400;\"> over the course of 2020. As the digitalization goes on, the criminals are getting better tools and the prey gets heftier.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While the volume of cybercrime involving Bitcoin and other cryptocurrencies is expected to grow along with the popularity of the currencies themselves, it nevertheless contributes to the negative portrayal of the entire crypto-industry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Importantly, this doesn\u2019t pose an immediate threat to those who follow basic precautions ranging from checking domain names and emails to putting a sticker over a laptop camera. You can only be safe entirely off the grid, but being cautious, and a bit lucky, is what works for most people.<\/span><\/p>\n<p><b>Follow us on\u00a0<\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b>\u00a0and\u00a0<\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b>\u00a0and join our\u00a0<\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b>\u00a0to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Looking through the news that came up during the month, one may notice several closely packed cases of hacking, extortion, and other unsavory activities involving Bitcoin. While there seems to be no particular connection between these cases, this is an unkind reminder not to be negligent about basic cybersecurity.<\/p>\n","protected":false},"author":6,"featured_media":8248,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[18,44,43,148],"class_list":["post-8247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-bitcoin","tag-cybercrime","tag-hackers","tag-security"],"aioseo_notices":[],"amp_enabled":true,"views":"597","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=8247"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8247\/revisions"}],"predecessor-version":[{"id":8251,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8247\/revisions\/8251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/8248"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=8247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=8247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=8247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}