Hackers steal $305M from DMM Bitcoin crypto exchange

A stack of Bitcoin coins with the Japanese flag in the background.

Image Credits: btgbtg/iStock / Getty Images

Japanese crypto exchange DMM Bitcoin confirmed on Friday that it had been the victim of a hack resulting in the theft of 4,502.9 bitcoin, or about $305 million. 

According to crypto security firm Elliptic, this is the eighth largest crypto theft in history. 

DMM Bitcoin said it detected “an unauthorized leak of Bitcoin (BTC) from our wallet” on Friday and that it was still investigating and had taken measures to stop further thefts. The crypto exchange said it also “implemented restrictions on the use of some services to ensure additional safety,” according to a machine translation of the company’s official blog post (written in Japanese).

The company also promised that all customers’ Bitcoin deposits “will be fully guaranteed as we will procure the equivalent amount of BTC that was leaked with support from our group companies.”

DMM Bitcoin did not immediately respond to a request for comment. 

According to De.Fi, the web3 security firm that tracks crypto thefts and scams, hackers stole around $2 billion in crypto across dozens of cyberattacks and thefts last year. While that is still a gargantuan amount of crypto, the total was the lowest since 2020.

Hackers steal $112 million of XRP Ripple cryptocurrency

Chris Larsen, co-founder and executive chairman of Ripple Labs, during a Bloomberg Television interview in San Francisco, California, US, on Tuesday, Sept. 5, 2023.

Image Credits: David Paul Morris/Bloomberg via Getty Images

On Tuesday, hackers stole around $112 million of the Ripple-focused cryptocurrency XRP from a crypto wallet, Ripple’s co-founder and executive chairman has disclosed.

Ripple’s Chris Larsen said on Wednesday that the stolen crypto was his. Larsen wrote on X (previously Twitter) that “there was unauthorized access to a few of my personal XRP accounts (not Ripple) — we were quickly able to catch the problem and notify exchanges to freeze the affected addresses. Law enforcement is already involved.”

Larsen wrote the post less than an hour after the well-known crypto security researcher ZachXBT broke news of the hack.

Contact Us

Do you have more information about this hack? We’d love to hear from you. From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email [email protected]. You also can contact TechCrunch via SecureDrop.

In a post on X, the crypto security researcher added that the stolen XRP funds have already been laundered through several crypto exchanges and platforms, including Binance and Kraken. Binance spokesperson Simon Matthews told TechCrunch that the company is “aware and actively supporting the investigation.”

“We are aware of the incident. We have an incident response capability and undertake proactive review of open source to identify incidents such as this, engage with victims and prevent Kraken from being used in this way,” Kraken spokesperson Megan Thorpe told TechCrunch in an email.

However, the details of who controls and owns the hacked wallet is murky, as it may — or may not be — Ripple’s wallet.

According to on-chain data from XRPScan, the hacked wallet was called “Ripple (50)” and was activated by a separate wallet called “~FundingWallet1” on November 5, 2018. The ~FundingWallet1 was activated by Larsen’s account on February 6, 2013, about a month after his own account, ~chrislarsen, was created.

When TechCrunch reached out to Ripple, the company’s spokesperson Stacey Ngo referred to Larsen’s post and said that “Ripple was not impacted.”

Ripple has been around since 2012 and aims to be a payments and enterprise infrastructure provider made up of a network, protocol and decentralized public ledger called XRP Ledger. The network’s token, XRP, has a market capitalization of $27.4 billion and has fallen about 4% on the day following the news of the hack, according to CoinMarketCap data.

Now, some XRP holders are calling for the co-founders to disclose their crypto wallets and XRP holdings in an effort to improve transparency, while others like Thinking Crypto podcast host Tony Edward are calling for Larsen to “distance himself from Ripple as much as possible.”

This hack is the largest theft of cryptocurrency in 2024 so far, and the twentieth largest theft of cryptocurrency in recorded history, based on data collected by Rekt, a website that tracks web3 and crypto breaches.

Last year, hackers stole around $2 billion in cryptocurrency, according to crypto security firms that track these types of hacks.

This story was updated to include a statement from Kraken’s spokesperson.

'Got that boomer!': How cybercriminals steal one-time passcodes for SIM swap attacks and raiding bank accounts

a noir-style graphic of a photo of a woman holding a phone receiver to her ear, with scattered six-digit two-factor codes scattered around the image

Image Credits: Bryce Durbin / TechCrunch

The incoming phone call flashes on a victim’s phone. It may only last a few seconds, but can end with the victim handing over codes that give cybercriminals the ability to hijack their online accounts or drain their crypto and digital wallets.

“This is the PayPal security team here. We’ve detected some unusual activity on your account and are calling you as a precautionary measure,” the caller’s robotic voice says. “Please enter the six-digit security code that we’ve sent to your mobile device.”

The victim, ignorant of the caller’s malicious intentions, taps into their phone keypad the six-digit code they just received by text message.

“Got that boomer!” a message reads on the attacker’s console.

In some cases, the attacker might also send a phishing email with the aim of capturing the victim’s password. But oftentimes, that code from their phone is all the attacker needs to break into a victim’s online account. By the time the victim ends the call, the attacker has already used the code to log in to the victim’s account as if they were the rightful owner.

Since mid-2023, an interception operation called Estate has enabled hundreds of members to carry out thousands of automated phone calls to trick victims into entering one-time passcodes, TechCrunch has learned. Estate helps attackers defeat security features like multi-factor authentication, which rely on a one-time passcode either sent to a person’s phone or email or generated from their device using an authenticator app. Stolen one-time passcodes can grant attackers access to a victim’s bank accounts, credit cards, crypto and digital wallets and online services. Most of the victims have been in the United States.

But a bug in Estate’s code exposed the site’s back-end database, which was not encrypted. Estate’s database contains details of the site’s founder and its members, and line-by-line logs of each attack since the site launched, including the phone numbers of victims that were targeted, when and by which member. 

Vangelis Stykas, a security researcher and chief technology officer at Atropos.ai, provided the Estate database to TechCrunch for analysis.

The back-end database provides a rare insight into how a one-time passcode interception operation works. Services like Estate advertise their offerings under the guise of providing an ostensibly legitimate service for allowing security practitioners to stress-test resilience to social engineering attacks, but fall in a legal gray space because they allow their members to use these services for malicious cyberattacks. In the past, authorities have prosecuted operators of similar sites dedicated to automating cyberattacks for supplying their services to criminals. 

The database contains logs for more than 93,000 attacks since Estate launched last year, targeting victims who have accounts with Amazon, Bank of America, Capital One, Chase, Coinbase, Instagram, Mastercard, PayPal, Venmo, Yahoo (which owns TechCrunch) and many others.

Some of the attacks also show efforts to hijack phone numbers by carrying out SIM swap attacks — one campaign was simply titled “ur getting sim swapped buddy” — and threatening to dox victims.

The founder of Estate, a Danish programmer in their early 20s, told TechCrunch in an email last week, “I do not operate the site anymore.” The founder, despite efforts to conceal Estate’s online operations, misconfigured Estate’s server that exposed its real-world location in a data center in the Netherlands.

a photo showing the attacker's calling console, which shows where the attacker keeps track of the attack in progress.
The attacker’s console in Estate.
Image Credits: TechCrunch

Estate advertises itself as able to “create tailored OTP solutions that match your needs perfectly,” and explains that “our custom scripting option puts you in control.” Estate members tap into the global phone network by posing as legitimate users to gain access to upstream communications providers. One provider was Telnyx, whose chief executive David Casem told TechCrunch that the company blocked Estate’s accounts and that an investigation was underway.

Although Estate is careful not to outwardly use explicit language that could incite or encourage malicious cyberattacks, the database shows that Estate is used almost exclusively for criminality. 

“These kinds of services form the backbone of the criminal economy,” said Allison Nixon, chief research officer at Unit 221B, a cybersecurity firm known for investigating cybercrime groups. “They make slow tasks efficient. This means more people receive scams and threats in general. More old people lose their retirement due to crime — compared to the days before these types of services existed.”

How Estate operates

Estate tried to keep a low profile by hiding its website from search engines and bringing on new members by word of mouth. According to its website, new members can sign in to Estate only with a referral code from an existing member, which keeps the number of users low to avoid detection by the upstream communications providers that Estate relies on.

Once through the door, Estate provides members with tools for searching for previously breached account passwords of their would-be victims, leaving one-time codes as the only obstacle to hijack the targets’ accounts. Estate’s tools also allow members to use custom-made scripts containing instructions for tricking targets into turning over their one-time passcodes. 

Some attack scripts are designed instead to validate stolen credit card numbers by tricking the victim into turning over the security code on the back of their payment card.

According to the database, one of the biggest calling campaigns on Estate targeted older victims under the assumption that “boomers” are more likely to take an unsolicited phone call than younger generations. The campaign, which accounted for about a thousand phone calls, relied on a script that kept the cybercriminal apprised of each attempted attack.

“The old f— answered!” would flash in the console when their victim picked up the call, and “Life support unplugged” would show when the attack succeeded.

The database shows that Estate’s founder is aware that their clientele are largely criminal actors, and Estate has long promised privacy for its members.

“We do not log any data, and we do not require any personal information to use our services,” reads Estate’s website, a snub to the identity checks that upstream telecom providers and tech companies typically require before letting customers onto their networks.

But that isn’t strictly true. Estate logged every attack its members carried out in granular detail dating back to the site’s launch in mid-2023. And the site’s founder retained access to server logs that provided a real-time window into what was happening on Estate’s server at any given time, including every call made by its members, as well as any time a member loaded a page on Estate’s website.

The database shows that Estate also keeps track of email addresses of prospective members. One of those users said they wanted to join Estate because they recently “started buying ccs” — referring to credit cards — and believed Estate was more trustworthy than buying a bot from an unknown seller. The user was later approved to become an Estate member, the records show.

The exposed database shows that some members trusted Estate’s promise of anonymity by leaving fragments of their own identifiable information — including email addresses and online handles — in the scripts they wrote and attacks they carried out.

Estate’s database also contains its members’ attack scripts, which reveal the specific ways that attackers exploit weaknesses in how tech giants and banks implement security features, like one-time passcodes, for verifying customer identities. TechCrunch is not describing the scripts in detail, as doing so could aid cybercriminals in carrying out attacks.

Veteran security reporter Brian Krebs, who previously reported on a one-time passcode operation in 2021, said these kinds of criminal operations make clear why you should “never provide any information in response to an unsolicited phone call.”

“It doesn’t matter who claims to be calling: If you didn’t initiate the contact, hang up,” Krebs wrote. That advice still holds true today.

But while services that offer using one-time passcodes still provide better security to users than services that don’t, the ability for cybercriminals to circumvent these defenses shows that tech companies, banks, crypto wallets and exchanges, and telecom companies have more work to do. 

Unit 221B’s Nixon said companies are in a “forever battle” with bad actors looking to abuse their networks, and that authorities should step up efforts to crack down on these services.

“The missing piece is we need law enforcement to arrest crime actors that make themselves such a nuisance,” said Nixon. “Young people are deliberately making a career out of this, because they convince themselves they’re ‘just a platform’ and ‘not responsible for crime’ facilitated by their project.”

“They hope to make easy money in the scam economy. There are influencers that encourage unethical ways to make money online. Law enforcement needs to stop this.”

Read more on TechCrunch:

Threat actor scraped 49M Dell customer addressesEncrypted services Apple, Proton and Wire helped Spanish police identify activistUHG CEO says ‘maybe a third’ of US citizens affected by recent hackWhat we learned from the indictment of LockBit’s mastermind

How to verify a data breach