TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Coinbase: Responding to Firefox 0-days in the wild

288 点作者 hi将近 6 年前

12 条评论

Deimorz将近 6 年前
This was the original article that talked about this attempt: <a href="https:&#x2F;&#x2F;robertheaton.com&#x2F;2019&#x2F;06&#x2F;24&#x2F;i-was-7-words-away-from-being-spear-phished&#x2F;" rel="nofollow">https:&#x2F;&#x2F;robertheaton.com&#x2F;2019&#x2F;06&#x2F;24&#x2F;i-was-7-words-away-from-...</a><p>HN discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=20283922" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=20283922</a>
londons_explore将近 6 年前
Coinbase should be hiring pentesters and giving them employee level access - even access to commit and deploy code.<p>Any insider shouldn&#x27;t be able to steal more than the hot wallet, and even that should be hard.<p>I actually <i>wouldn&#x27;t</i> put much effort into border security. At coinbases level of risk, evildoers will have no qualms bribing an employee to install a backdoor in their machine.
评论 #20658537 未加载
评论 #20658484 未加载
评论 #20657821 未加载
ChrisCinelli将近 6 年前
&gt; CVE-2019–11707 was simultaneously discovered by Samuel Groß of Google’s Project Zero and the attacker.<p>At least another time in the last week I read on other threads on HN or related links that vulnerability were found almost the same time by independent people.<p>Here we have a researcher from Google’s Project Zero and the attacker.<p>How do you explain these coincidences?<p>What is the chance that some prominent researchers being targeted and their systems are actually exploited?
评论 #20658471 未加载
评论 #20658536 未加载
评论 #20658550 未加载
评论 #20660710 未加载
flyGuyOnTheSly将近 6 年前
&gt;We collected IOCs from the host in question and started hunting broadly in our network. We did not see any of the IOCs anywhere else in our environment, and blacklisted all the IOCs that we had at that time.<p>Can someone explain what they mean by IOCs?
评论 #20658352 未加载
victor22将近 6 年前
Remember, not your keys, not your bitcoin. Stay off coinbase.
评论 #20659055 未加载
评论 #20660414 未加载
评论 #20659294 未加载
评论 #20658791 未加载
anhldbk将近 6 年前
I find this info is interesting<p>&gt; The attackers went through a qualification process and multiple rounds of emails with potential victims, making sure they were high-payoff targets before they directed victims to the page containing the exploit payload.<p>It&#x27;s a well-prepared plan combining social engineering and technical exploits
xchaotic将近 6 年前
This point to an actual use of the cryptocurrency - exploiting a 0 day against someone who might have a crypto wallet means you can actually directly make money off exploits. Prior to crypto, having a 0 day wasn&#x27;t equal with ability to make blackhat money with it...
评论 #20659179 未加载
评论 #20660339 未加载
ianhawes将近 6 年前
Interesting to me that the attackers were well equipped in their phish and 0days, but then opted to drop fairly detectable RATs.
评论 #20658565 未加载
评论 #20662928 未加载
评论 #20661335 未加载
wyldfire将近 6 年前
This is among the critical differences between MtGox and Coinbase.
评论 #20657578 未加载
评论 #20657633 未加载
dmortin将近 6 年前
Does it a help in this case if one runs the browser in a sandbox? E.g. in docker?<p>They can then break out from the browser, but only get to docker with that exploit, and it&#x27;s unlikely they have a docker exploit too at hand, is it?
评论 #20658075 未加载
评论 #20658776 未加载
评论 #20657835 未加载
评论 #20659114 未加载
评论 #20660100 未加载
评论 #20660358 未加载
auslander将近 6 年前
&gt; exploit code was delivered from a separate domain, analyticsfit[.]com<p>They paid some registrar for the domain. Can police request payment details? Can someone buy domain on stolen credit card?
vbezhenar将近 6 年前
Those attacks would not work if they did not enable JavaScript on every website by default.
评论 #20658243 未加载
评论 #20661132 未加载