Celsius Email System Breach Leads To Phishing Attack On Customers

Celsius Email System Breach Leads To Phishing Attack On Customers

Cryptocurrency rewards platform Celsius Network has disclosed a security breach exposing customer information that led to a phishing attack.

Today, Celsius CEO Alex Mashinsky stated that Celsius’ third-party marketing server was compromised, and threat actors gained access to a partial Celsius customer list.

“An unauthorized party managed to gain access to a back-up third-party email distribution system which had connections to a partial customer email list. Once inside the system, this unauthorized party sent a fraudulent email announcement, of which we know some of the recipients to be Celsius customers.”

“The intent was to make the recipients believe the fraudulent email came from Celsius, that the fraudulent site was a true Celsius site, and to take ownership of recipients’ cryptocurrency assets from their personal (non-Celsius) wallet by prompting the user to provide the seed phrase to their personal wallet address,” disclosed a Celsius advisory.

After gaining access to the customer list, the threat actors impersonated Celsius Networks in phishing texts and emails that promoted a new Celsius Web Wallet. As an incentive to get people to visit the site, the text states Celsius is offering $500 in the CEL cryptocurrency if they create a wallet and enter a special promo code.

Celsius phishing text message
Source: Twitter

Also Read: PDPA Singapore Guidelines: 16 Key Concepts For Your Business

Clicking on the link led recipients to the phishing site celsiuswallet[.]network, which is now down, that asked visitors to create a Celsius Web Wallet.

When you attempted to create this fake wallet, the site asked visitors to link their other online wallets and input those wallet’s seed phrases. Once this seed phrase is provided, the threat actors can import your wallet and steal any cryptocurrency within it.

Celsius phishing site
Source: Twitter

VirusTotal shows that the celsiuswallet[.]network phishing domain initially had a DNS SOA record that indicated it was registered at the Njalla registrar.

Njalla SOA

Njalla is a registrar located in Sweden that is a favorite for certain threat actors, such as the Fancy Bear and Cozy Bear Russian hacking groups.

Also Read: Data Protection Officer Singapore | 10 FAQs

A recent scam site using Njalla called ‘Solar Leaks’ was created to allegedly sell data stolen during the SolarWinds attacks.

Privacy Ninja

Recent Posts

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

2 weeks ago

Prioritizing Security Measures When Launching Webpage

Prioritizing Security Measures When Launching a Webpage That Every Organisation in Singapore should take note…

3 weeks ago

The Importance of Regularly Changing Passwords for Enhanced Online Security

Importance of Regularly Changing Passwords for Enhance Online Security that every Organisation in Singapore should…

3 weeks ago

Mitigating Human Errors in Organizations: A Comprehensive Approach to Data Protection and Operational Integrity

Comprehensive Approach to Data Protection and Operational Integrity that every Organsiation in Singapore should know…

4 weeks ago

The Importance of Pre-Launch Testing in IT Systems Implementation

Here's the importance of Pre-Launch Testing in IT Systems Implementation for Organisations in Singapore. The…

1 month ago

Understanding Liability in IT Vendor Relationships

Understanding Liability in IT Vendor Relationships that every Organisation in Singapore should look at. Understanding…

1 month ago