Breaking

Crypto Heist had $300 million stolen by-passing two-factor authentication

Crypto.com has been hit by a major heist that has affected 483 user accounts stealing $34.65 million worth of cryptocurrency including Bitcoin and Ethereum by getting over two-factor authentication (2FA). On January 17th, Crypto.com wrote on twitter that a small number of users reporting suspicious activity on their accounts, but claimed the funds are safe.

This Monday, Kris Marszalek, the CEO of Crpto.com mentioned in a tweet that the user’s funds weren’t lost and crypto.com will ensure the funds are with the users. However, Crypto.com later mentioned that there is a loss of $300 million overall, which is even more than their initial finding, but their customers whose funds were stolen have been reimbursed. The entire crypto theft was performed by getting over two-factor authentication.

The Crypto Heist and the exploitation of two-factor authentication

Crypto’s exchange risk monitoring system found there is a unauthorized transaction happening in 483 accounts and that is working without users 2FA authentication approval. To handle the situation Crypto.com halted withdrawals as they needed to investigate the situation, and later revoked the 2FA tokens to enhance additional security measures and hardening their protection protocols. Later, requested their users to update their login credentials along with their 2FA token.

The withdrawal halt was in place for around 14 hours. The halt had some adverse effects on Crypt.com as it lost around $66,200 worth of currencies because of their operational block. Later this week, Marszalek had an interview with Bloomberg stating that 400 user accounts were affected by the heist.

Crypto has now updated its 2FA to a completely new infrastructure, however, the new infrastructure implementation was done after proper 2FA policies by deploying it both at frontend and backend to keep their transition safe.

Though the exact means of 2FA compromise is yet to be determined, meanwhile Crypto.com improved their security layers by deploying a mandatory 24 delay between new registration, withdrawal address and a first withdrawal. There will be withdrawal alerts to give some time for users to respond and act upon the same. Crypto has already done a complete audit and inspection of their security infrastructure and has also included a third-party security firms to enhance their overall security of their organization.

Crypto is planning to upgrade its 2FA with MFA along with Worldwide Account Protection Program (WAPP) to increase further security and protection over user funds and the exchange’s safety. The security hardening is also done with jailbroken devices, anti-phishing code with at least 21 days prior notification for any unauthorized transaction, and a few other steps to ensure strong security posture.

Improving security by replacing 2FA with MFA

Since 2FA uses an already existing parameter for the authentication purpose, for example a password, PIN, mobile phone, USB token, fingerprints, etc the chances of these being compromised is increasing and are easy to be manipulated using social engineering, cookie session hijacking, man-in-the-browser attacks, device take over, overlay payloads, spyware, duplicate code generators and other nefarious actions.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

3 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

3 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

4 months ago