Story image

Police making progress into Cryptopia breach

23 Jan 2019

New Zealand Police say they are making ‘good progress’ into the investigation of an alleged cryptocurrency theft from Christchurch-based crypto exchange Cryptopia.

On Tuesday police released a further media statement that said they are developing positive lines of enquiry that will help to identify the source of the transfer, and when the cryptocurrency was sent to.

The investigation comes after Cryptopia suffered a breach on January 13 and 14. The breach resulted in ‘a significant amount’ of stolen cryptocurrency, which was then transferred to another location.

“This is a very complex investigation, involving expert digital forensic investigators from within New Zealand and in various overseas jurisdictions, as well as overseas authorities,” says a statement.

This week investigation team has met with Cryptopia’s management and staff to outline how the investigation has been going.

Police are also working with the larger cryptocurrency community to help with the investigation.

Cryptopia management and staff have been co-operating with Police and providing considerable assistance in the investigation.  

The investigation is expected to take some to time complete, and the digital forensic team will be on-site at Cryptopia’s premises for some days to come.

According to a blog from cryptocurrency firm Elementus, not much is known about the breach and some reports pitch the amount of money lost as between US$3-16 million (NZ$4.4million-23.5 million).

Elementus broke down the losses by cryptoasset (in USD). It speculated that the most losses came from Ethereum ($3.6m USD), followed by other tokens ($3.0 million USD), Dentacoin, Oyster Pearl, and Lisk ML. Centrality, Mothership, Ormeus, DAPS, Zap, and Pillar were also affected.

Elementus also speculates that the thief has tried to cash out at least US$882,000 from various exchanges.

“The lack of urgency on the part of the thieves is striking. Rather than withdrawing the funds as fast as possible, as is the case in most crypto hacks, they took their time extracting the assets over the course of nearly five days,” Elementus says in a blog.

“After Cryptopia discovered the hack, they watched the funds continue to flow out of their wallets for four more days, seemingly powerless to stop it. As these wallets were not smart contracts, there should have been no technical complications preventing Cryptopia from securing the funds. The only plausible explanation for Cryptopia's inaction is that they no longer had access to their own wallets,” Elementus continues.

Elementus speculates that 1948 Ethereum wallets and US$46,000 worth of Ether are still at risk.

Anyone with information which could assist the investigation can contact police by email at crypto@police.govt.nz. 

Read more here.

Chillisoft rounds out portfolio with file integrity vendor
Tripwire is the fourth vendor for Chillisoft in six months, adding critical security controls, vulnerability management and file integrity monitoring.
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Optic Security Group celebrates Axis accolade
Auckland-based business security systems provider Fortlock has picked up an award at Axis Communications’ annual Oceania Axis Partner Summit 2019.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.