1/30/2024 0 Comments Coincheck id verification![]() The hackers had control over the company’s domain until June 1 when the company regained access to its domain. The hackers instead sent spear-phishing emails to certain users by impersonating the domain and redirecting email replies to their own servers.Ĭoincheck detected the attack after finding some traffic abnormalities. However, hackers did not use this access to redirect the exchange’s entire web traffic to a Coincheck clone as it would be easy to detect such an attack. This allowed the hacker to manage DNS queries for the Coincheck portal. The researcher stated that the hacker registered a domain that looked similar to the AWS server and replaced the original with inside the backend. But a Japanese security researcher Masafumi Negishi said the hackers modified the primary DNS entry for Coincheck’s domain.Ĭoincheck uses Amazon’s managed DNS service to handle the operation of returning the server IP address where users’ clients (browser, mobile apps, wallets) needed to connect for the domain. Oname also confirmed the incident and any technical details of the attack is not provided by Coincheck so far. The hackers got access to Coincheck’s account at which is the domain registrar provider of the exchange. The company is investigating the incident and according to an incident report published by the company, the initial attack took place on May 31. The exchange halted all the remittance operations on its platform and operations such as withdrawals or deposits are not blocked. Coincheck, a Japanese cryptocurrency exchange reveals that hackers took control over its local domain registrar account and hijacked one of its domain names which was used to contact some of its customers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |