Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A Canadian high school student has been identified as the most likely suspect behind a phishing site that allegedly ripped off thousands of dollars worth of Bitcoins from unsuspecting users.
The student, according to an ongoing investigation initiated by private individuals, has been in possessions of sold Bitcoin wallets loaded with thousands of dollars worth of the digital currency.
A profile linked to the suspect on public site HackForums claimed to have sold two accounts each containing 40 Bitcoins today alone, worth about $7000 at the time of writing.
It was also selling hacked LiteCoin account.
How the BitCoins were stolen
The phishing site used to launch the attacks, Mt Gox-Chat, hosted a Java exploit which hijacked user machines with what researchers said appeared to be an Autoit script.
The malware was then used to drain the digital currency from victims' Bitcoin wallets in a series of non-reversible transactions.
One victim using the handle BitBully wrote on the Bitcointalk forum they lost 34 Bitcoins to the scammer, worth anywhere between $3500 to $8000 due to the fluctuating value of Bitcoins this week.
The transaction pointed to an account that held 72 Bitcoins, worth around $8000 at the time of writing.
The victim was compromised after they clicked through Java warnings prompted by the MtGox-Chat site.
He told SC he wanted to warn others of the attack and attempt to get the stolen Bitcoins returned.
Following the victim accounts, a small group of online sleuths began the investigation to identify the perpetrator and invited SC Magazine to bear witness to their collaboration.
Analysis of the malware by a member of the anonymous group of sleuths, who claimed to be a security researcher, pointed to IP addresses which were linked to other accounts used by the suspect.
This information led the group to suspect the scammer was using his Canadian residential address to host a command and control server.
The research also revealed a series of domain information and months of login data, along with website profiles - including the suspects' Facebook account, which provided further evidence of the man's identity.
The party investigating the scam engaged in a Skype chat with their suspect hacker, but he claimed the information gathered was fake and promptly terminated the conversation.
At the time of writing, those investigating the scammer had threatened to reveal the data gathered in the investigation unless the suspect returned the stolen Bitcoins to victims.
SC Magazine recommends that Bitcoin users operate online with a heightened awareness of security. Users should activate two-factor authentication for online accounts where possible, disable Java in web browsers used for BitCoin transactions and be extremely cautious about following links posted in forums and chat rooms.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.