What's new
Carding forum - Trusted Carding Forum - ATN card the World - Carding Forums - Carders Forums - Dread Forums.-

Welcome to legitcarding.net, your premier destination for all things carding! Dive into the world's top legit carding community, offering worldwide transfers via PayPal, Cashapp, Venmo, Western Union, and beyond. Gain access to credit card fullz, CC dumps, bank logs, and an array of premium services. Plus, enjoy complimentary gift cards and exclusive bonuses. Don't wait—unlock instant access now to scripts, carding guides, and more! Join us today and elevate your carding experience to new heights

Viper Carder

Legendary Vouched Carder♛
Staff member
Premium User
Support Staff
Verified Seller
♛ Forum Elite ♛
Registered
Joined
Feb 28, 2024
Messages
1,699
Reaction score
49
Points
48
Awards
3
Theft was obtained due to the naivety of one of the company's employees.


o4ngmygpscz74rqo9vatz3f9p0kecrca.jpg


The Coinbase cryptocurrency platform reported that an unknown attacker stole the credentials of one of the employees, trying to get remote access to the company's systems.

The cybercriminal received contact information from several Coinbase <TAG1 employees> names, phone numbers, email addresses (, but the funds and customer data are not affected.

Coinbase said the cybersecurity did not allow the hacker to gain direct access to the system and prevented any loss of funds or compromising customer information. Only a limited amount of data from the Coinbase corporate catalog was disclosed.

Coinbase shared the results of her investigation to help other companies determine the tactics, methods and procedures of the attacker ( TTPs ) and establish appropriate protection.

Attack details

The attack began on February 5, when an attacker sent several Coinbase SMS engineers urging them to enter their corporate accounts to read an important notice.

Most employees ignored the messages, but one of them fell into the – trick, he went over to the link to the phishing page and entered his credentials. Then the hacker tried to enter the internal systems of Coinbase using stolen credentials, but could not do this, since access was protected by multifactorial authentication ( MFA ).

After 20 minutes, the attacker called the company employee and introduced himself as an IT specialist for Coinbase. He convinced the victim to enter his workstation and perform some actions. The CSIRT Coinbase team discovered unusual activity within 10 minutes from the start of the attack and contacted the victim to find out about unusual actions from the account. Then the employee realized that there was a cyber attack, and stopped talking with an attacker.

Will Thomas from the Equinix Threat Analysis Center ( ETAC ) discovered several additional domains related to Coinbase and corresponding to the company description, which may have been used in the attack:
  • sso-cbhq [. ] com;
  • sso-cb [. ] com;
  • coinbase [. ] sso-cloud [. ] com.
It is worth noting that the course of action of the attacker is similar to what was observed during the 0ktapus phishing campaign last year.
__________________
 
Back
Top