by hi on 8/9/19, 5:48 PM with 93 comments
by Deimorz on 8/9/19, 6:10 PM
HN discussion: https://news.ycombinator.com/item?id=20283922
by londons_explore on 8/9/19, 7:53 PM
Any insider shouldn't be able to steal more than the hot wallet, and even that should be hard.
I actually wouldn't put much effort into border security. At coinbases level of risk, evildoers will have no qualms bribing an employee to install a backdoor in their machine.
by ChrisCinelli on 8/9/19, 9:41 PM
At least another time in the last week I read on other threads on HN or related links that vulnerability were found almost the same time by independent people.
Here we have a researcher from Google’s Project Zero and the attacker.
How do you explain these coincidences?
What is the chance that some prominent researchers being targeted and their systems are actually exploited?
by flyGuyOnTheSly on 8/9/19, 9:23 PM
Can someone explain what they mean by IOCs?
by victor22 on 8/9/19, 10:27 PM
by anhldbk on 8/10/19, 3:02 AM
> The attackers went through a qualification process and multiple rounds of emails with potential victims, making sure they were high-payoff targets before they directed victims to the page containing the exploit payload.
It's a well-prepared plan combining social engineering and technical exploits
by xchaotic on 8/9/19, 9:05 PM
by ianhawes on 8/9/19, 8:54 PM
by wyldfire on 8/9/19, 7:28 PM
by dmortin on 8/9/19, 8:01 PM
They can then break out from the browser, but only get to docker with that exploit, and it's unlikely they have a docker exploit too at hand, is it?
by auslander on 8/10/19, 7:23 AM
They paid some registrar for the domain. Can police request payment details? Can someone buy domain on stolen credit card?
by vbezhenar on 8/9/19, 8:58 PM