Friday, August 19, 2016
Toronto-based Bitfinex disclosed a $69-million-dollar security breach on Aug. 2, 2016, followed by continuous updates on the ongoing investigation and remediation efforts. The company has engaged blockchain forensics firm Ledger Labs Inc. to investigate the occurrence and recommend security measures. Ledger Labs will also audit the company's balance sheet, including cryptocurrency and fiat asset resources, Bitfinex stated.
Early in the investigation, Ledger Labs identified weaknesses in backend architecture at Bitfinex, according to company sources. Bitfinex operations personnel have already implemented many of Ledger Labs' recommendations and teams from both companies are evaluating data from the BitGo wallet alert system to determine why it failed to react during the heist.
"We have currently suspended use of the BitGo segregated multi-signature wallet solution and have re-implemented robust and safe multi-signature cold storage procedures, with minimal coins exposed on our hot wallet," Bitfinex stated. "We are reassessing our storage options, both internally and with potential third party multi-sig vendors."
Bitfinex management is currently exploring ways to compensate customers for losses resulting from the security breach. The company is "committed to making our customers whole," and to building a more secure infrastructure to prevent similar attacks. Representatives acknowledged these efforts will take time and money, and thanked customers who continue to trade on their platform for helping to rebuild their brand.
"The biggest issue with bitcoin trading is in the unregulated landscape that enables bitcoin exchanges and resellers to store customer credentials," said a source familiar with the matter. "If you buy bitcoins and the exchange holding your unique key gets hacked, you will lose your bitcoins. No one should be able to buy bitcoins without being able to control their own keys."
Cybercriminals are increasingly attacking large cryptocurrency exchanges and enterprise-scale merchant environments with multiple outlets. The recent attack at HEI Hospitality LLC, disclosed Aug. 15, 2016, involved malware that infected 20 properties, including Starwood, Marriott, Hyatt and InterContinental hotels between March 2015 and June 2016, according to the HEI website.
Security analysts have speculated that the malware was capable of extracting payment data in real time, including names, account numbers, expiration dates and verification codes; HEI stated it does not store credit card data. The company posted a list of affected properties, frequently asked questions (FAQ) and a toll free support number for affected customers on its website.
"Unfortunately, like many other organizations, we recently became aware that several of our properties may have been the victim of a security incident that could have affected the payment card information of certain individuals who used payment cards at point-of-sale terminals, such as food and beverage outlets, at some of our properties," HEI stated. "We are pleased to report that the incident has now been contained and individuals can safely use payment cards at all of our properties."
Employee fraud is also a prevalent threat to enterprise-scale organizations worldwide. Sage Group, a global provider of software, accounting, asset management and payments services headquartered in the United Kingdom with U.S. offices in Atlanta, recently reported a security breach caused by an unauthorized log-in. The incident may affect up to 300 British customers.
In a blog post titled "What do you do after a security breach?" www.sage.com/us/Sage-Advice/Articles/18366/2015/8/20/What-do-you-do-after-a-security-breach , Sage noted the rising costs and frequency of data breaches and recommended the following remedial approach:
The Green Sheet Inc. is now a proud affiliate of Bankcard Life, a premier community that provides industry-leading training and resources for payment professionals. Click here for more information.
Notice to readers: These are archived articles. Contact names or information may be out of date. We regret any inconvenience.