Digital ID

Livecoin halted operations after the December attack

The Russian cryptocurrency exchange Livecoin has announced it is terminating its operation following the December cyberattack.

The Russian cryptocurrency exchange was hacked on Christmas Eve, it published a message on its website warning customers to stop using its services.

“Dear clients, we ask you to stop using our service in all meanings: don’t deposit funds, don’t trade, don’t use API. We are under a carefully planned attack, which has been prepared, as we assume, over the last few months. We lost control of all of our servers, backend and nodes. Thus, we were not able to stop our service in time.” reads the message published on the website. “Our news channels were compromised as well. At the moment, we partially control frontend, and so we’re able to place this announcement. We’re fighting hard to get back our servers, nodes and funds, we’re working 24/7. News and next update will come up in the next few days. We’re working in contact with local police authorities. We really do our best to overcome this issue.”

Livecoin recommended users to stop depositing funds and making transactions, it also notified local law enforcement.

The administrators of the platforms informed its customers to have lost control of some of its servers, the attack was not opportunistic, it appears to be well planned.

The attack took place nighttime, between December 23 and December 24, the attackers modified exchange rates to absurd values (15 times their ordinary values). The Bitcoin exchange rate was set to over $450,000/BTC, while the value of ETH was increased from $600/ETH up to $15,000

Once pumped out the exchange rates, the attackers began cashing out accounts, making huge profits.

Now, Livecoin announced it is terminating its activity following the December cyberattack. 

“Dear clients, as we reported earlier, our service were under attack in December 2020. Investigation is in active phase right now. Our service has been damaged hard in technical and financial way. There is no way to continue operative business in these conditions, so we take a hard decision to close the business and paying the remaining funds to clients.” reads the announcement published by the exchange.

“Our clients have to contact us via email verification@livecoin.news to get payments after passing verification procedure. We accept claims for payments for the next 2 months. 17 March 2021 is the last day of accepting your requests, after this date no new requests will be accepted.”

The company announced that it will accept claims for payments until 17 March 2021.

CoinTelegraph reported that some users have refused to send their personal data to Livecoin fearing for their security and privacy. A user revealed that Livecoin is requesting documents and data that could be used by ill-intentioned to conduct scams ad frauds, including passport scans, residence information, high-resolution selfies, and data about the first transaction on the exchange.

“We apologize for an existing situation and ask you to keep calm, including your conversation with support officers. Our service and team bear hard losses as well as our clients. In case of abuse and threats in conversation, the claim can be declined.” Livecoin added.

“We have to warn you about tons of fake groups in different messengers and other channels, where people represent themselves as our team members, insiders, hackers etc. Participating in these groups you run a high risk, because we have no any groups. The only official statements are made on this website. Do not send money to anyone. You don’t have to pay to get back your funds from us, the only thing you need is to send a request and follow simple procedure.”

At the time of this writing, Livecoin’s old website domain displays the message “Oops! Time is over Livecoin….”.

As usual, some users speculate that this could be an Exit Scam.

If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Livecoin)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

12 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

1 day ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

1 day ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

2 days ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

2 days ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.