Hackers Scoop $20 Million in ETH From Exposed Ethereum Nodes

Published on by Cryptoslate | Published on

Mentioned in this article
The first half of June has seen a series of high profile attacks rock the cryptocurrency ecosystem, with the recent South Korean exchange Coinrail hacked to the tune of around $40 million and ZenCash targeted by a successful 51% attack.

One of the most successful hacks of 2018 didn't occur with a bang, but with a whisper - the discrete siphoning of over $20 million in ETH from poorly-configured Ethereum nodes.

Hackers have succeeded in stealing over $20 million by hijacking insecure Ethereum nodes - an issue that was highlighted in March this year by Chinese security giant Qihoo 360, who notably raised concerns recently regarding the security of the soon-to-launch EOS blockchain.

Someone tries to make quick money by scanning port 8545, looking for geth clients and stealing their cryptocurrency, good thing geth by default only listens on local 8545 port.

Qihoo 360 attempted to alert the Ethereum community several months ago, warning users of the Geth Ethereum client that malicious parties were scanning port 8545 - the default listening port for the client.

At the time of the report, hackers had only captured a little under 4 ETH for their effort, resulting in these warnings being largely ignored by the Ethereum community.

6 ETH haul - worth over $18 million at the time of this report.

The wallet associated with the hackers, to which all of the siphoned ETH has been sent, has received roughly 5,000 transactions to date, with an average transaction amount of around 7 ETH. This entire haul was accumulated simply by scanning the internet for Geth users that left their JSON-RPC port 8545 open to the world and hijacking their wallets.

Almost three years ago, the Ethereum project issued a security alert regarding the high risk associated with insecurely configured Ethereum clients with no firewall, specifically mentioning the built-in security placed on the JSON-RPC interface.

According to 360, scanning attempts on port 8545 have now increased dramatically as a result, with copycat hackers moving in on weak targets.

x