Top

Singaporean authorities alert businesses to Bitcoin ransomware risk

Policy & Regulation·June 11, 2024, 6:07 AM

Akira ransomware, responsible for stealing $42 million from over 250 organizations across North America, Europe and Australia in just a year, is now targeting businesses in Singapore. In response, Singaporean authorities have issued a joint advisory warning local businesses about the increasing threat posed by a variant of this ransomware.

https://asset.coinness.com/en/news/2a60ac3f2278d1ab842181ec0c178bfb.webp
Photo by Mike Enerio on Unsplash

Alert follows complaints

The alert follows multiple complaints from victims, prompting agencies like the Cyber Security Agency of Singapore (CSA), the Singapore Police Force (SPF) and the Personal Data Protection Commission (PDPC) to take action. These agencies emphasize the urgency of recognizing and combating this threat.

 

How Akira operates

Akira affiliates employ various techniques to infiltrate a victim's network. These include exploiting known vulernabilities. For example, that could mean the targeting of services like Cisco virtual private networks (VPNs) that have been configured without multi-factor authentication (MFA).

 

Another approach that the ransomware incorporates is attacking external-facing services such as the Remote Desktop Protocol (RDP) via brute force. Social engineering is another tool within its repertoire. This involves tricking victims into downloading malicious software or entering credentials on phishing websites.

 

There is a marketplace for compromised credentials in the dark web. Akira also relies on such data, acquiring it from access brokers who sell network access. 

 

Once inside a network, Akira affiliates often create new domain accounts to maintain persistent access, even after reboots. They use numerous tools to steal user credentials, escalate privileges and spread throughout the network.

 

Detection and prevention measures

The Singaporean advisory outlines several strategies for detecting, deterring and neutralizing Akira attacks. Authorities strongly advise against paying ransoms, on the basis that doing so does not guarantee data recovery or prevent future attacks.

 

Authorities also warn that paying ransoms can encourage further attacks. The FBI has noted that Akira operators do not contact victims. Instead, they expect victims to initiate contact.

 

Payment in Bitcoin

The advisory outlines how Bitcoin is implicated in the ransomware scam. It states:

”Ransom payments are requested in Bitcoin, which are directed to cryptocurrency wallet addresses specified by the affiliates. The TOR site (.onion) where victims contact the affiliates, contains stolen information and a list of the affected organisations.”

 

It’s not the first time that Singaporean authorities have issued warnings that have implicated Bitcoin and crypto. In January, the CSA and SPF, in a joint advisory, suggested that people should use hardware wallets in an effort to guard against crypto-related malware and phishing attacks.

 

A number of weeks prior to that, Singapore’s former Prime Minister, Lee Hsien Loong, took to Facebook to issue a warning with regard to a crypto scam that involved the use of deceptive content generated using artificial intelligence (AI).

 

Mitigation techniques

Businesses are being urged by the authorities to adopt best practices to mitigate the Akira ransomware threat. They suggest the implementation of a recovery plan alongside the use of multi-factor authentication (MFA) in order to secure data and the access to that data. 

 

They also suggest filtering network traffic as it helps in identifying and blocking malicious activities. Meanwhile, disabling unused ports and hyperlinks curbs the risk further as it reduces the attack surface. Lastly, the authorities suggested the use of system-wide encryption to protect data even if it is accessed by unauthorized entities.

More to Read
View All
Web3 & Enterprise·

Nov 24, 2023

Planetarium Labs’ blockchain MMORPG Nine Chronicles M launches worldwide

Planetarium Labs’ blockchain MMORPG Nine Chronicles M launches worldwideWeb3 gaming company Planetarium Labs has officially released its mobile game Nine Chronicles M worldwide, which is now available for download on Google Play and the App Store.Photo by Jonas Leupe on UnsplashRedefining the MMORPG genreNine Chronicles M is the mobile version of the popular Nine Chronicles, a fully on-chain open-source massively multiplayer online role-playing game (MMORPG) — the first of its kind in the world — set against the backdrop of Norse mythology. The PC version of the game has consistently topped the ranks of dApp store DappRadar’s blockchain game listings with more than 200,000 users worldwide. Building on this experience, Planetarium Labs stated that the mobile version would provide an even more immersive game experience surpassing that of the original version.“With Nine Chronicles M, we aim to create an experience where the community not only enjoys the game but actually owns it,” said Kim Jae-seok, CEO of Planetarium Labs, referring to the game’s fully decentralized format and interactive open-source protocol. “From various events to creative and enhanced gameplay and the largest reward pool known in PvP battlegrounds, we promise to deliver an exciting and thrilling gaming experience.”Successful pre-registration turnoutThis latest release comes after the global pre-registration event that recently ended on Wednesday (UTC), which attracted some 200,000 gamers. Various rewards will be distributed to participants through a gacha game dubbed “Dvergr’s Gacha Workshop”. Such rewards include rare character costumes and allotted amounts of the in-game currency Nine Chronicles Gold (NCG), which can be used to purchase in-game items or staked to earn additional rewards. They can be claimed by downloading and logging into the game, Planetarium Labs explained.

news
Policy & Regulation·

Jan 17, 2024

Crypto exchange Flybit passes post-audit for ISMS-P certification

South Korean cryptocurrency exchange Flybit, which is operated by the Korean Fintech Industry Association, has passed the post-audit for its Information Security and Privacy Management System certification (ISMS-P), according to local news website News1 on Wednesday (KST).Photo by FlyD on UnsplashRigorous certification standardsThe ISMS-P is a security management system jointly operated by South Korea’s Ministry of Science and ICT and the Personal Information Protection Commission, representing the highest level of security management in the country. It combines 80 requirements for Information Security Management System (ISMS) certification and 22 requirements for Personal Information Management System (PIMS) certification, totaling 102 requirements that must be met. Once obtained, certification is valid for three years, and annual post-audits are required to maintain its validity. Flybit’s commitment to security"Cryptocurrency exchanges are businesses that manage customers' valuable assets. All Flybit members approach their work by recognizing the fact that the protection of personal information is our most important value,” the exchange said. "We will continually strive to maintain security accidents since the establishment of the exchange." Flybit first obtained the ISMS certification in December 2020 and the ISMS-P certification two years later in December 2022. The most recent ISMS-P follow-up audit was conducted last month. After a thorough examination, the results of the audit were delivered by the Korea Internet and Security Agency (KISA) on Dec. 12, which stated that the exchange could maintain its certification. In October last year, the firm also received the highest rating in the comprehensive anti-money laundering (AML) evaluation conducted annually by the Financial Intelligence Unit (FIU) under the Financial Services Commission.

news
Web3 & Enterprise·

Sep 28, 2023

Cartesi Launches Inaugural dApp on Ethereum Mainnet

Cartesi Launches Inaugural dApp on Ethereum MainnetSingapore-based Cartesi, the app-specific roll-up protocol with a virtual machine running Linux distributions, has introduced its inaugural dApp.The decentralized application, aptly named Honeypot, has been designed to serve as a platform for developers and ethical hackers to rigorously scrutinize the security of the Cartesi protocol’s underlying codebase, all in exchange for lucrative bounties.Photo by Michael Förtsch on UnsplashHoneypot deploymentAccording to a press release published on Tuesday, Honeypot is set to fulfill the vital role of stress-testing Cartesi’s foundational code on the Ethereum mainnet. The successful deployment of Honeypot will pave the way for Cartesi’s technology to be employed in a multitude of other dApps. Notably, a unique aspect of Honeypot is the tempting incentive it offers. The first individual to successfully hack it will be entitled to drain the sum of 1.77 million Cartesi tokens, equivalent to $220,000, after one year without any constraints.Embedded within the Honeypot dApp’s backend code is an algorithm that only permits the Cartesi Foundation’s depositor account to make fund withdrawals. Participants who dare to take on this code-breaking challenge must successfully navigate the intricacies of the algorithm to claim the reward.Developer Advocacy contributor to Cartesi, Gabriel Barros, stated: “We want to welcome all developers to test Cartesi’s Rollup infrastructure — but in a gamified challenge.”Aiding dApp developmentCartesi stands as a Layer 2 network specifically designed to streamline the development of intricate and powerful dApps. Its mission is to bridge the gap between conventional development practices and blockchain-based solutions, attempting to offer a seamless transition for developers.At its core, Cartesi introduces a mechanism that enables dApps to execute resource-intensive computations off-chain within a Linux environment. Crucially, these off-chain computations are verifiable by the blockchain, ensuring that the final results remain consistent across all nodes. This approach empowers developers to harness existing software and tools while ensuring compatibility with the blockchain.Linux insideThe choice of a Linux environment is pivotal to Cartesi’s framework. Linux enjoys widespread usage worldwide, particularly in server environments, making it a familiar and well-adopted platform. This familiarity extends to the extensive array of tools and libraries available within the Linux ecosystem, which are leveraged by developers for a myriad of traditional web applications.Gabriel Barros underlined Cartesi’s mission, stating:“Cartesi’s goal is to eliminate the limitations Web3 developers face by enabling them to import decades of familiar programming tools, libraries, and languages to the blockchain. By doing so, Cartesi unlocks a new realm of possibilities, allowing developers to surpass what was previously imaginable with earlier web3 applications.”Cartesi’s introduction of the Honeypot dApp on the Ethereum mainnet signifies a significant step towards ensuring the security and robustness of its protocol. Furthermore, it demonstrates Cartesi’s intentions in attempting to foster a vibrant and innovative ecosystem for developers in the blockchain space.

news
Loading