Sunday, March 26, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > GoDaddy employees used in vishing attacks on cryptocurrency platforms

GoDaddy employees used in vishing attacks on cryptocurrency platforms

Cyberattackers redirected email and web traffic destined for several cryptocurrency trading platforms like liquid.com, NiceHash by using GoDaddy employees.


Seda Nur Cinar Seda Nur Cinar
November 23, 2020
4 min read
GoDaddy employees used in vishing attacks on cryptocurrency platforms

Fraudsters redirected email and web traffic destined for several cryptocurrency trading platforms like liquid.com, NiceHash by using GoDaddy employees. Their domain hosting provider, GoDaddy claims that a small number of customer domain names had been modified after a limited number of GoDaddy employees fell for a social engineering scam.

Table of Contents

  • Vishing scams on cryptocurrency trading platforms
  • DNS records were changed
  • GoDaddy: A limited number of employees has been affected
  • An advisory by FBI and CISA

Vishing scams on cryptocurrency trading platforms

In May of this year, GoDaddy disclosed that 28,000 of its customers’ web hosting accounts were compromised following a security incident in October 2019. The latest campaign is estimated to have begun on or around November 13 with an attack on cryptocurrency trading platform liquid.com. GoDaddy is the domain hosting provider of liquid.com.

Liquid CEO Mike Kayamori
Mike Kayamori, CEO, Liquid.com

Liquid CEO Mike Kayamori published this attack details in a blog post, saying,

“On the 13th of November 2020, a domain hosting provider ‘GoDaddy’ that manages one of our core domain names incorrectly transferred control of the account and domain to a malicious actor. This gave the actor the ability to change DNS records and in turn, take control of a number of internal email accounts. In due course, the malicious actor was able to partially compromise our infrastructure, and gain access to document storage.”

DNS records were changed

In other development, in the early morning (UTC) hours of November 18, 2020, cryptocurrency mining service NiceHash domain was not reachable. As a result of unauthorized access to the domain settings, the DNS records for the NiceHash.com domain were changed. To secure all user’s funds, NiceHash froze all customer funds for roughly 24 hours until it was able to verify that its domain settings had been changed back to their original settings. NiceHash founder Matjaz Skorjanc complained about being unable to reach GoDaddy by email or phone. Skorjanc talked about the attack, saying,

“The unauthorized changes were made from an Internet address at GoDaddy, and that the attackers tried to use their access to its incoming NiceHash emails to perform password resets on various third-party services, including Slack and Github. NiceHash’s email service was redirected to privateemail.com, an email platform run by Namecheap, another large domain name registrar.”

GoDaddy: A limited number of employees has been affected

According to GoDaddy, only “a small number” of customer domain names had been modified after a limited number of GoDaddy employees fell for a social engineering scam. The outage between 7:00 p.m. and 11:00 p.m. PST on Nov. 17 was not related to a security incident, but rather a technical issue that materialized during planned network maintenance.

On July 15, a number of high-profile Twitter accounts tweeted about a bitcoin scam that earned more than $100,000 in a few hours. Twitter said that attack succeeded as the perpetrators were able to apply social engineering several Twitter employees over the phone into giving away access to internal Twitter tools. Several other cryptocurrency services subsequently targeted by the fraudsters, according to the KrebsOnSecurity report.

An advisory by FBI and CISA

Large corporations have been targeted in sophisticated voice phishing or vishing scams. As many employees are working remotely due to the ongoing Coronavirus pandemic, these scams have been successful.

FBI and Cybersecurity and Infrastructure Security Agency (CISA) issued an alert on these vishing attacks and published an advisory includes a number of suggestions that companies can implement to help mitigate the threat from vishing attacks, including:

  • Restrict VPN connections to managed devices only, using mechanisms like hardware checks or installed certificates, so user input alone is not enough to access the corporate VPN.
  • Restrict VPN access hours, where applicable, to mitigate access outside of allowed times.
  • Employ domain monitoring to track the creation of, or changes to, corporate, brand-name domains.
  • Actively scan and monitor web applications for unauthorized access, modification, and anomalous activities.
  • Employ the principle of least privilege and implement software restriction policies or other controls; monitor authorized user accesses and usage.
  • Consider using a formalized authentication process for employee-to-employee communications made over the public telephone network where a second factor is used to authenticate the phone call before sensitive information can be discussed.
  • Improve 2FA and OTP messaging to reduce confusion about employee authentication attempts.
  • Verify web links do not have misspellings or contain the wrong domain.
  • Bookmark the correct corporate VPN URL and do not visit alternative URLs on the sole basis of an inbound phone call.
  • Be suspicious of unsolicited phone calls, visits, or email messages from unknown individuals claiming to be from a legitimate organization. Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information. If possible, try to verify the caller’s identity directly with the company.
  • If you receive a vishing call, document the phone number of the caller as well as the domain that the actor tried to send you to and relay this information to law enforcement.
  • Limit the amount of personal information you post on social networking sites. The internet is a public resource; only post information you are comfortable with anyone seeing
  •  Evaluate your settings: sites may change their options periodically, so review your security and privacy settings regularly to make sure that your choices are still appropriate.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: GoDaddyLiquid.comNiceHash
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Vantage Data Centers to acquire Hypertec's data center business

Vantage Data Centers to acquire Hypertec's data center business

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Weekly round-up: 20-24 March
  • Podman Desktop – Containers & Kubernetes (Podcast #15 w/ Markus Eisele)
  • What is a Daemon in Linux?
  • 7 best practices and tools to use for Linux security
  • Photopea review: The best free Photoshop alternative for Linux

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.