Skip to main content

Hackers hijacked traffic through Amazon servers for two hours, undetected

The event, which only lasted about two hours on Tuesday, April 24, saw traffic to Amazon’s cloud web hosting servers redirected to malicious websites. Not all of the traffic, just a small slice of it, about 1,300 IP addresses, according to Oracle. The attack saw traffic to MyEtherWallet redirected a malicious version of itself, where the attackers could siphon cryptocurrency off of users who thought they were logging into their cryptocurrency wallets.

One such site, MyEtherWallet, was cloned by attackers but likely didn’t result in the kind of massive theft we’re used to seeing when cryptocurrency wallets or exchanges are attacked. According to Ars Technica, the cryptocurrency wallet into which the fake MyEtherWallet site was dumping its cryptocurrency already had about $27 million worth of cryptocurrency in it.

Details like this have led some to believe the attack could have been state-sponsored, potentially with ties to Russia.

“So far the only known website to have traffic redirected was to MyEtherWallet.com, a cryptocurrency website. This traffic was redirected to a server hosted in Russia, which served the website using a fake certificate — they also stole the cryptocoins of customers,” wrote security researcher Kevin Beaumont. “The attacks only gained a relatively small amount of currency from MyEtherWallet.com — however their wallets in total already contained over [20 million pounds] of currency. Whoever the attackers were are not poor.”

It may not have been the first time these hackers have staged such an attack either, according to Ars. There were a couple suspiciously similar attacks in 2013 when hackers hijacked internet traffic to a number of U.S. companies, routing the traffic through Russian ISPs. Affected companies included Visa, MasterCard, Apple, and Symantec. Eight months later, another set of U.S. companies saw their traffic hijacked with the same kind of exploit.

These 2013 attacks used the same “border gateway protocol” exploit as today’s attack. Beaumont elaborated that today’s attack requires access to sophisticated equipment, which leads him to believe MyEtherWallet was not likely the only target — just the one we happened to notice.

“Mounting an attack of this scale requires access to BGP routers are major ISPs and real computing resource to deal with so much DNS traffic. It seems unlikely MyEtherWallet.com was the only target, when they had such levels of access,” Beaumont wrote. “Additionally, the attackers failed to obtain an SSL certificate while man-in-the-middle attacking the traffic — a very easy process — which alerted people to the issue at scale.”

Editors' Recommendations

Jayce Wagner
Former Digital Trends Contributor
A staff writer for the Computing section, Jayce covers a little bit of everything -- hardware, gaming, and occasionally VR.
A hacker terrorized this family through their smart camera and thermostat
nest cam iq outdoor 2 camera kit best buy deal press night 1500x1000

In spite of the many warnings about device security and the need for two-factor authentication, many people don't think it's necessary. After all, why would a hacker target a random person instead of a bank or somewhere they could make a profit? In the case of one family from Wisconsin whose home was hacked, though, the hacker did it to have some malevolent fun. According to a story from Newsweek, Samantha and Lamont Westmoreland came home only to hear an unfamiliar voice from their home's security camera.

After that, loud music began to play throughout their house and the Nest thermostat was raised to 90 degrees. The couple had used Google's Nest system since November 2018. Even after she changed the thermostat, Samantha said it went right back to its previous setting and someone started speaking to her and her husband through their camera. The couple unplugged the camera and contacted their internet provider to change their network.

Read more
Foxconn interns reportedly work long hours to produce Amazon Alexa products
foxconn factory

There have always been rumors of child labor surrounding iPhones and other products produced by the company Hengyang Foxconn, but a recent report from the China Labor Watch (CLW) says that many schoolchildren are allegedly working incredibly long hours to meet Amazon Echo production goals.

Under Chinese labor laws, factories can employ students age 16 or older as interns. These students are not allowed to work nights or overtime. However, the laws surrounding working conditions are often ignored in these factories. According to the report, for "interns who refuse to work overtime and night shifts, the factory requests teachers from their school to fire them."

Read more
Watch Amazon’s all-new delivery drone zipping through the sky
watch amazons all new delivery drone zipping through the sky amazon prime air  2019

Amazon Prime Air’s New Delivery Drone

Amazon has taken the wraps off the latest iteration of its Prime Air delivery drone that it says could be delivering online orders to customers’ doors “in the coming months.”

Read more