{"id":25632,"date":"2022-08-11T15:38:33","date_gmt":"2022-08-11T15:38:33","guid":{"rendered":"http:\/\/egrowonline.com\/?p=25632"},"modified":"2022-08-11T15:38:33","modified_gmt":"2022-08-11T15:38:33","slug":"why-hackers-are-able-to-steal-billions-of-dollars-worth-of-cryptocurrency","status":"publish","type":"post","link":"http:\/\/egrowonline.com\/?p=25632","title":{"rendered":"Why hackers are able to steal billions of dollars worth of cryptocurrency"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<div class=\"wpds-c-grBDNq hide-for-print mb-sm undefined\"><title id=\"sc-article-actions-skeleton-react-aria-1-aria\">Placeholder while article actions load<\/title><\/div>\n<div class=\"teaser-content grid-center\">\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><strong>Welcome to The Cybersecurity 202!<\/strong> If you\u2019re a regular reader you might have noticed we\u2019ve been on a bit of an abbreviated schedule of late, but the noob whose name is atop this newsletter now (ahem, this Starks guy) has been lax about informing you of this. I\u2019m making it up to you now: we&#8217;ll be back at you Tuesday.<\/p>\n<\/div>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><strong>Below:<\/strong> European lawmakers find out how many E.U. countries use NSO spyware, and the FTC is investigating a crypto hack.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<h4 data-qa=\"article-header\" class=\" pb-sm pt-lgmod\" id=\"LXYZXO4DERFATEQPFOCMFEAABI\">\n<p>What&#8217;s behind a wild stretch of cryptocurrency theft<\/p>\n<\/h4>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">In <a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/politics\/2022\/08\/04\/did-russia-mess-up-its-cyberwar-with-ukraine-before-it-even-invaded\/?itid=lk_inline_manual_6\" rel=\"noopener\">two<\/a> <a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/politics\/2022\/08\/03\/those-pelosi-inspired-cyberattacks-taiwan-probably-werent-all-they-were-cracked-up-be\/?itid=lk_inline_manual_6\" rel=\"noopener\">incidents<\/a> over the past week, hackers pilfered a total of nearly $200 million in cryptocurrency, piling on to a record year of <a target=\"_blank\" href=\"https:\/\/www.certik.com\/resources\/blog\/7fuXtbfo4CXEXcwy5Pqijp-hack3d-the-web3-security-quarterly-report-q2-2022\" rel=\"noopener\">$2 billion in industry losses<\/a> to internet thieves and scammers.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/politics\/2022\/08\/09\/treasury-cracks-down-tool-that-helped-launder-billions\/?itid=lk_inline_manual_8\" rel=\"noopener\">The Treasury Department also sanctioned an anonymization service this week<\/a> for its alleged role in laundering billions in cryptocurrency. The agency cited hackers\u2019 use of Tornado Cash to <a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/business\/2022\/04\/23\/north-korea-hack-crypto-access\/?itid=lk_inline_manual_8\" rel=\"noopener\">disguise proceeds from the largest known crypto hack to date<\/a>, March\u2019s heist of $620 million.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><strong>So why are these big-ticket crypto hacks happening? <\/strong>There\u2019s no one answer, and there\u2019s plenty of reason to think they\u2019ll keep occurring.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<h4 data-qa=\"article-header\" class=\" pb-sm pt-lgmod\" id=\"BZ7FGH5DD5EINFUHFONUWM6JDM\">\n<p>Answer No. 1: It\u2019s where the money is<\/p>\n<\/h4>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">The first and shortest major answer might sound snarky.<strong> It\u2019s Willie Sutton\u2019s answer to why he robbed banks: \u201cIt\u2019s where the money is.\u201d<\/strong><\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">The covid-19 pandemic saw a <a target=\"_blank\" href=\"https:\/\/www.cbsnews.com\/news\/ransomware-phishing-cybercrime-pandemic\/\" rel=\"noopener\">rise in cyberattacks<\/a> as well as <a target=\"_blank\" href=\"https:\/\/unctad.org\/news\/unctad-spells-out-actions-curb-cryptocurrencies-developing-countries\" rel=\"noopener\">the proliferation of cryptocurrency wallets<\/a>,<strong> <\/strong>observed <strong>Brenda Sharton,<\/strong> global chair of the privacy and security practice at the Dechert law firm. Those two phenomena go hand-in-hand, she told me.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">One specific variety of cryptocurrency tech has proven a particularly ripe target \u2014 and increasingly so: cross-chain bridges.\u00a0<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<ul class=\"font--article-body font-copy gray-darkest mt-0 mr-lg ml-lg mb-md list\">\n<li class=\"pb-xs\"><span><a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/technology\/2022\/08\/03\/solana-nomad-hacks-security-questions\/?itid=lk_inline_manual_16\" rel=\"noopener\">My colleague <strong>Steven Zeitchik<\/strong> explains<\/a>: \u201cA blockchain bridge allows consumers to swap crypto from one blockchain to another \u2014 say, from bitcoin to ethereum \u2014 making it vulnerable on what security experts call \u2018both sides,\u2019 weaknesses on either blockchain.\u201d<\/span><\/li>\n<li class=\"pb-xs\"><span>Blockchain analytics company Chainalysis estimated last week that such attacks <a target=\"_blank\" href=\"https:\/\/blog.chainalysis.com\/reports\/cross-chain-bridge-hacks-2022\/\" rel=\"noopener\">account for 69 percent of funds<\/a> hackers have stolen this year.<\/span><\/li>\n<\/ul>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<h4 data-qa=\"article-header\" class=\" pb-sm pt-lgmod\" id=\"EDKU6MBV6FBBRDPL2UYFQCHLHQ\">\n<p>Answer No. 2: It\u2019s an industry maturity and demeanor thing<\/p>\n<\/h4>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">\u201cFintech is very fast-moving,\u201d <strong>Adam Meyer, <\/strong>the senior vice president of intelligence at cybersecurity firm CrowdStrike, told me. \u201cIt\u2019s a lot of start-ups that are what they say about start-ups: \u2018Move quickly and break things.\u2019 \u2026 Some of the things that are out there are really, really new, and so they haven\u2019t really thought through the attack vectors.\u201d<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><strong>Crypto start-ups\u2019 more established financial industry siblings, banks, invest deeply in cybersecurity.<\/strong> Bank of America <a target=\"_blank\" href=\"https:\/\/www.cnbc.com\/2021\/06\/14\/bank-of-america-spends-over-1-billion-per-year-on-cybersecurity.html\" rel=\"noopener\">spends more than $1 billion<\/a> annually on cyberdefense, the company\u2019s chief executive said last year. Over the course of hundreds of years, banks have learned to prioritize security of all kinds, <strong>Scott Carlson<\/strong>, head of blockchain and digital asset security at Kudelski Security, told me.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">What\u2019s more, some cybersecurity companies are loath to get involved in the cryptocurrency sector, said <strong>Ryan Spanier,<\/strong> Carlson\u2019s Kudelski Security teammate.They might consider crypto firms to be a fad, one that\u2019s difficult to adapt existing protections for or an area of the economy that is <a target=\"_blank\" href=\"https:\/\/www.cnbc.com\/2022\/07\/18\/democrats-crypto-miners-should-report-more-energy-usage-info.html\" rel=\"noopener\">bad for the environment<\/a>.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><strong>It\u2019s not 100 percent negative news.<\/strong> Several crypto exchanges that have suffered major hacks declined interviews or didn\u2019t answer requests for comment, but some directed me to <a target=\"_blank\" href=\"https:\/\/roninblockchain.substack.com\/p\/the-ronin-bridge-is-open-\" rel=\"noopener\">lengthy lists<\/a> of <a target=\"_blank\" href=\"https:\/\/wormhole.com\/security\/\" rel=\"noopener\">security improvements<\/a> they\u2019ve made in the aftermath.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">In addition, some technology is springing up to protect cryptocurrency from theft, <a target=\"_blank\" href=\"https:\/\/tokenist.com\/hardware-wallets-not-affected-by-solana-hack-8m-drained-so-far\/\" rel=\"noopener\">like hardware wallets<\/a>, and some older cybersecurity practices have caught on in the community, like bug bounty programs where ethical hackers help organizations find their weaknesses.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<h4 data-qa=\"article-header\" class=\" pb-sm pt-lgmod\" id=\"UMPQEBKUWZBZPDQOWVQFKOMG3I\">\n<p>Answer No. 3: Crypto is the regulatory Wild West<\/p>\n<\/h4>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">Those traditional financial services firms? They have federal agency overlords \u2014 be they the Securities and Exchange Commission (SEC) or Financial Industry Regulatory Authority (FINRA) \u2014 that have made the sector one of the most strictly regulated when it comes to cybersecurity. <strong>Crypto organizations don\u2019t fall neatly into any existing regulatory turf, and some maintain that\u2019s why they\u2019re getting hacked.<\/strong><\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">\u201cThe reason first and foremost is that crypto exchanges, unlike U.S. financial firms, don\u2019t have to meet any of the rigorous cybersecurity standards and requirements that the SEC and FINRA and the banking regulations have in place,\u201d independent consultant <strong>John Reed Stark<\/strong> told me. \u201cSo you have no idea what sort of cybersecurity protections go on in these entities.\u201d<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">By their nature, the blockchain community prefers to be \u201clightly regulated because they want to free themselves from what they perceive as problems in the existing system,\u201d Carlson said.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">It\u2019s a hot subject on Capitol Hill, where <a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/business\/2022\/06\/07\/crypto-lummis-gillibrand-regulation\/?itid=lk_inline_manual_34\" rel=\"noopener\">bipartisan legislation would define who is responsible<\/a> for overseeing the crypto industry and direct agencies to develop cybersecurity rules for digital assets like cryptocurrency. The bipartisan bill from Sens. <strong>Kirsten Gillibrand<\/strong> (D-N.Y.) and <strong>Cynthia M. Lummis<\/strong> (R-Wyo.) would grant oversight to the Commodity Future Futures Trading Commission, as opposed to the SEC, which has taken a hard stance against crypto abuses.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">But the focus on regulation is misplaced, Sharton said. The government can best help by putting crypto thieves in prison, she said. (In one peculiar case, a $500 Walmart<a target=\"_blank\" href=\"https:\/\/www.wsj.com\/articles\/bitcoin-bitfinex-hack-crypto-laundering-morgan-lichtenstein-11644953617\" rel=\"noopener\"> gift card<\/a> led law enforcement to the alleged culprits behind a considerable 2016 hack.)<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><strong>There is an assortment of other possible explanations, too.<\/strong><\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">For years, analysts have been trying to get to the bottom of what\u2019s behind the spiral of crypto hacks. Other avenues:\u00a0<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<ul class=\"font--article-body font-copy gray-darkest mt-0 mr-lg ml-lg mb-md list\">\n<li class=\"pb-xs\"><span>It\u2019s <a target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/technology-60933174\" rel=\"noopener\">easier than other kinds<\/a> of hacks.<\/span><\/li>\n<li class=\"pb-xs\"><span>Targets have <a target=\"_blank\" href=\"https:\/\/www.nbcnews.com\/tech\/security\/bitcoin-crypto-exchange-hacks-little-anyone-can-do-rcna7870\" rel=\"noopener\">smaller cybersecurity staffs<\/a>.<\/span><\/li>\n<li class=\"pb-xs\"><span><a target=\"_blank\" href=\"https:\/\/www.marketplace.org\/shows\/marketplace-tech\/why-does-the-crypto-industry-keep-getting-hacked\/\" rel=\"noopener\">Stealing passwords and other key information<\/a> is possible on a wider scale.<\/span><\/li>\n<li class=\"pb-xs\"><span>Sometimes the causes of a theft vary from case-to-case, like <a target=\"_blank\" href=\"https:\/\/www.theblock.co\/post\/156038\/how-a-fake-job-offer-took-down-the-worlds-most-popular-crypto-game\" rel=\"noopener\">a fake job offer<\/a>, of all things.<\/span><\/li>\n<\/ul>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><strong>What\u2019s certain is that crypto hacks are costing a lot of money.<\/strong> Only last month, creditors of defunct cryptocurrency exchange Mt. Gox said they were <a target=\"_blank\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-07-07\/mt-gox-creditors-inch-closer-to-repayment-as-bitcoin-dump-looms\" rel=\"noopener\">close to being repaid<\/a> \u2014 from the fallout of a hack in 2014.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<h4 data-qa=\"article-header\" class=\" pb-sm pt-lgmod\" id=\"MIM7AYMO4RAZBALVARY67XQZJU\">\n<p>Many E.U. countries have used spyware firm NSO Group\u2019s technologies, lawmakers find<\/p>\n<\/h4>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">Law enforcement agencies in 12 of the European Union\u2019s 27 member states use NSO spyware, and ties with two other European countries have been cut, <strong>Haaretz<\/strong>\u2019s Omer Benjakob <a target=\"_blank\" href=\"https:\/\/www.haaretz.com\/israel-news\/security-aviation\/2022-08-09\/ty-article\/.premium\/israeli-spyware-maker-nso-has-22-customers-in-12-eu-countries-and-its-not-alone\/00000182-8403-df1d-a3a7-ae9bce800000\" rel=\"noopener\">reports<\/a>. All told, NSO has 22 European clients, some of which hail from the same country, Benjakob reports.\u00a0<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">The discovery of those figures by a European Parliament committee investigating use of NSO and other spyware sheds light on how widespread use of such tools is on the continent. NSO&#8217;s Pegasus spyware has been used to hack journalists, activists and executives, an investigation by The Post and 16 media partners <a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/investigations\/2021\/07\/18\/takeaways-nso-pegasus-project\/?itid=lk_inline_manual_51\" rel=\"noopener\">found<\/a>.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">\u201cIf just one company has 14 member states for customers, you can imagine how big the sector is overall,\u201d committee member <strong>Sophie in \u2018t Veld<\/strong> told Haaretz. \u201cThere seems to be a huge market for commercial spyware, and E.U. governments are very eager buyers. But they are very quiet about it, keeping it from the public eye.\u201d<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<h4 data-qa=\"article-header\" class=\" pb-sm pt-lgmod\" id=\"LGULCDBT6REMPPUG6MOG5SXMKY\">\n<p>The FTC is investigating a hack of a cryptocurrency exchange<\/p>\n<\/h4>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">The Federal Trade Commission probe into a December 2021 hack of the BitMart cryptocurrency exchange represents the first known investigation into cryptocurrency markets by the regulator, <strong>Bloomberg News<\/strong>\u2019s Leah Nylen <a target=\"_blank\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-08-10\/ftc-probes-bitmart-exchange-breach-marking-first-crypto-case\" rel=\"noopener\">reports<\/a>. The FTC disclosed the investigation in an order denying an attempt by BitMart\u2019s operators to block an FTC demand for information, which operators Bachi.Tech and Spread Technologies said was too broad and involved information that is located overseas.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">\u201cThe FTC had sent civil subpoenas in May to the BitMart operators, seeking details on what the companies told consumers about the security of their crypto assets and how they have handled customer complaints. The consumer-protection agency \u2014 which has penalized dozens of companies from Wyndham Hotels &amp; Resorts Inc. to Uber Technologies Inc. over lax cyber practices \u2014 expects these details to help it determine whether the firms engaged in unfair or deceptive business practices.\u201d The FTC is also investigating compliance with the Gramm-Leach-Bliley Act, which requires financial institutions to secure important data.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">The FTC declined to comment to Bloomberg News. Lawyers representing BitMart\u2019s operators didn\u2019t respond to the outlet\u2019s requests for comment.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<h4 data-qa=\"article-header\" class=\" pb-sm pt-lgmod\" id=\"5JQGYE3GPJGKZNYWLUJVM4LSSM\">\n<p>CISA releases guide for election workers to deal with digital threats ahead of midterm elections<\/p>\n<\/h4>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">The Cybersecurity and Infrastructure Security Agency\u2019s <a target=\"_blank\" href=\"https:\/\/www.cisa.gov\/cybersecurity-toolkit-protect-elections\" rel=\"noopener\">new tool kit<\/a> warns election workers about threats like phishing and ransomware, <strong>StateScoop<\/strong>\u2019s Benjamin Freed <a target=\"_blank\" href=\"https:\/\/statescoop.com\/cisa-cyber-toolkit-elections\/\" rel=\"noopener\">reports<\/a>. It comes from the agency\u2019s Joint Cyber Defense Collaborative, an initiative that aims to boost the agency\u2019s private-sector collaboration.<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\">\u201cMuch of the recent national discussion on election security has focused on harassment of election workers, disinformation and misinformation and insider threats at local election offices \u2014 all largely fueled by ongoing falsehoods about the 2020 presidential election,\u201d Freed writes. \u201cThe cyber tool kit, CISA said, is meant to help address technological resiliency.\u201d<\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><a target=\"_blank\" href=\"https:\/\/thehill.com\/policy\/technology\/3595917-finlands-parliament-hit-with-cyberattack-following-us-move-to-admit-the-country-to-nato\/\" rel=\"noopener\">Finland\u2019s parliament hit with cyberattack following US move to admit the country to NATO (The Hill)<\/a><\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><a target=\"_blank\" href=\"https:\/\/apnews.com\/article\/technology-india-hacking-insurance-brokerage-79916cea672d4d91d83fd8b0e63ebc07\" rel=\"noopener\">Security firm finds flaws in Indian online insurance broker (Associated Press)<\/a><\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/7-eleven-denmark-confirms-ransomware-attack-behind-store-closures\/\" rel=\"noopener\">7-Eleven Denmark confirms ransomware attack behind store closures (Bleeping Computer)<\/a><\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><a target=\"_blank\" href=\"https:\/\/www.nextgov.com\/cybersecurity\/2022\/08\/hack-dhs-bug-bounty-program-begin-second-phase-new-contract-request\/375656\/\" rel=\"noopener\">&#8216;Hack DHS&#8217; bug bounty program to begin second phase with new contract request (NextGov)<\/a><\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><a target=\"_blank\" href=\"https:\/\/fcw.com\/security\/2022\/08\/former-cisa-chief-wants-new-cross-cutting-new-agency-lead-federal-cyber\/375670\/\" rel=\"noopener\">Former CISA chief wants a new, cross-cutting new agency to lead federal cyber (FCW)<\/a><\/p>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<ul class=\"font--article-body font-copy gray-darkest mt-0 mr-lg ml-lg mb-md list\">\n<li class=\"pb-xs\"><span>National Cyber Director <strong>Chris Inglis<\/strong> and CISA Director <strong>Jen Easterly<\/strong> <a target=\"_blank\" href=\"https:\/\/defcon.org\/html\/defcon-30\/dc-30-schedule.html\" rel=\"noopener\">speak<\/a> at the annual DEF CON hacking conference on Friday.<\/span><\/li>\n<\/ul>\n<\/div>\n<div class=\"article-body\" data-qa=\"article-body\">\n<p data-qa=\"drop-cap-letter\" data-el=\"text\" class=\"font-copy font--article-body gray-darkest ma-0 pb-md\"><span>Thanks for reading. See you next week.<\/span><\/p>\n<\/div>\n<section class=\"b bt bc-offblack dn-ns hide-for-print\" data-testid=\"mostRead\" \/><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.washingtonpost.com\/politics\/2022\/08\/11\/why-hackers-are-able-steal-billions-dollars-worth-cryptocurrency\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Placeholder while article actions load Welcome to The Cybersecurity 202! If you\u2019re a regular reader you might have noticed we\u2019ve been on a bit of an abbreviated schedule of late, but the noob whose name is atop this newsletter now (ahem, this Starks guy) has been lax about informing you of this. I\u2019m making it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25633,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[36],"tags":[4891,52,1980,3562,4372,341],"class_list":["post-25632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","tag-billions","tag-cryptocurrency","tag-dollars","tag-hackers","tag-steal","tag-worth"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"http:\/\/egrowonline.com\/wp-content\/uploads\/2022\/08\/QBSTUVAY5AI63OMYWKVWR5MENA.jpgw1440.webp","_links":{"self":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/25632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25632"}],"version-history":[{"count":1,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/25632\/revisions"}],"predecessor-version":[{"id":25634,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/25632\/revisions\/25634"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/media\/25633"}],"wp:attachment":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25632"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}