Hackers Breach Cryptocurrency Platform

The information of over 240,000 users was stolen after hackers managed to compromise the cryptocurrency investment platform Atlas Quantum.

Through this platform, users can add Bitcoin to their accounts and make profits by trading the cryptocurrency on various platforms. Atlas says it uses an automated arbitrage system to yield profits for customers based on real-time movements in the cryptocurrency market. 

The company says it has over 240,000 users in more than 50 countries and over $30 million in assets under its management. In 2017, the platform delivered a cumulative 38% return to investors, Atlas claims. In an announcement made on Facebook, the company revealed that it became aware of a data breach on last weeken and that, although no funds were stolen, it’s customers database was compromised. 

According to a tweet from HaveIBeenPwned, the service that allows users to check whether their accounts and passwords have appeared in any data breaches, the stolen data set had over 261,000 entries. The leaked information apparently includes affected individuals’ names, phone numbers, and email addresses, as well as their account balances.

“At the time of the incident, we took immediate steps to protect the database and passwords and private keys remain encrypted,” Atlas says. 

The investigation into the incident is ongoing, but the company also notes that, in addition to monitoring the affected accounts, they are working to add more protections against fraud. 

“Some features of the platform have been temporarily disabled, as a precaution, since we need to ensure security. We will notify you when they are reactivated,” Atlas says. 

“The Atlas Quantum data breach suggests that crypto services remain a high-profile target for hackers. Even those who do not actively use the platform to store or invest in crypto may have had their personal data exposed,” Bitglass CTO Anurag Kahol told SecurityWeek.

“For companies like Atlas, that store mass amounts of user data, reputation and user data security are closely tied. Quickly identifying the cause of this breach and mitigating the threat of further data loss is a critical next step for Atlas and prevention should be top of mind for all companies that store high-value data,” Kahol continued. 

The incident should be a wakeup call for cryptocurrency platforms, which are increasingly targeted by cybercriminals.

Security Week:

You Might Also Read:

Cryptocurrency Cybercrime Surging In The UK:

World's Biggest Ever Digital Currency Theft:

 

« Iranian Political Influence Campaign Goes Global
Digital Shock: Cybercrime & The Future Of Policing. Part 3 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

NextPlane

NextPlane

NextPlane provide secure real-time B2B unified communication and collaboration solutions within and across business systems.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

CyberArts

CyberArts

CyberArts is founded on the belief that every single organization deserves and requires the creme de la creme when there is a need for Cyber services.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.