Cyber Attack On London Crypto Exchange

The National Cyber Security Centre (NCSC), part of GCHQ, and London's Metropolitan Police have been investigating  a series of large scale cyber attacks targeting on Currency.com, a London cryptocurrency exchange, using distributed denial of service (DDoS)) attack .

Millions of computers around the world coerced to bombard the company’s website with multiple requests, in an attempt to take-down its systems. At the peak the exchange was bombarded at the rate of 2,500 times a second

The cyber attack began in April after Viktor Prokopenya, founder of Currency.com, announced he was pulling his company out of Russia in protest about the Russian invasion of Ukraine. His firm issued a statement condemning Russian “aggression” and the “terrible war.” Within hours, the exchange was hit by what is believed to have been the first suspected Russian cyber attack on a UK company, after the country proffered economic and military aid to Ukraine. Documents seen by The Telegraph newspaper indicate that computers involved in the cyber attack are located in Russia and Belarus, a supporter of the Russian invasion of Ukraine.

Prokopenya, a Fintech entrepreneur originally from Belarus, initially reported the attack to Action Fraud, the UK's national reporting centre for fraud and cyber crime.

A report was sent to the National Fraud Intelligence Bureau, which had analysed the cyber attack and alerted the Metropolitan Police in London, where the Currency.com’s servers are based. However, the Metropolitan Police are reported to have decided against a detailed investigation because of the problems of identifying the criminals.

The NCSC is not thought to believe the attack was carried out directly by the Russian government, but by Russian criminals, most likely working under government direction

Currency.com:    MSN:      Telegraph:   Canada Today

You Might Also Read:

Putin Lashes Out After His Speech Is Delayed By DDoS:

 

« Phishing Scams In 2022
CISA & ACSC Name 2021’s Top Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Telspace Systems

Telspace Systems

Telspace Systems provides penetration testing, vulnerability assessment and training services.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Vericlave

Vericlave

At Vericlave we prevent cyberattacks on critical assets with a simple to deploy, proven solution that mitigates risks and addresses security challenges.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

i-Trace

i-Trace

i-Trace is securing IoT, protecting it from threats and building trust in the infrastructure of tomorrow using blockchain and artificial intelligence.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.