094 90 48200     Get SUPPORT

Aniar IT Services Blog

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Is Blockchain a Shield for Cybercrime?

Is Blockchain a Shield for Cybercrime?

Blockchain technology is all the rage these days. Business owners are going to start hearing this buzzword as a bullet point in software solutions. Developers from all over the world are trying to harness the power of encrypted, distributed data, mainly due to the reputation that blockchain has regarding the “unhackable” permanence of the data stored upon it. However, it as powerful as blockchain is purported to be, it isn’t totally infallible.

How Blockchain Has Been Shown to Be Vulnerable

Let’s face it… blockchain technology is a human invention, which means that there are going to be some flaws.

Admittedly, the concept behind the blockchain makes this hard to believe: every transaction made through the blockchain, financial or data-based, is given a permanent, designated “block” in the chain. Before the transaction is completed, the rest of the network needs to approve this new block’s validity. The block is then added to the chain, where it cannot be altered and provides an unchangeable record of the transaction - to undo it, a new block would be created. It is only then that the transaction is completed.

While this method may seem foolproof, even “unhackable”, this just isn’t the case. In March of 2014, cybercriminals managed to steal $450,000,000 worth of Bitcoin through a transaction mutability vulnerability, and in June of 2016, cybercriminals managed to steal approximately $60,000,000 by leveraging a recursive calling vulnerability.

Additional Blockchain Vulnerabilities

Again, as a human creation, there are going to be some flaws in blockchain platforms. One investigation revealed that some blockchain and cryptocurrency platforms had over 40 vulnerabilities.

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability, and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner. If you manage to accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Naturally, more popular blockchains, like Bitcoin, are far too expensive to be practical targets, but smaller coins are much more affordable to attack and can be lucrative for hackers. In 2018, 51% attacks were leveraged against less popular cryptocurrencies, netting the attackers approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key. Naturally, if this key were to be stolen, those cybercriminals who stole it would be able to access and tamper with that user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and even harder to undo.

Breach Examples

As you might imagine, most breaches involving a blockchain are in some way tied to an end user. In 2017, a fraudulent cryptocurrency wallet service was left up for months as the cybercriminal responsible allowed people to funnel their cryptocurrencies into it before stealing $4,000,000 - out of a reported total of $2 billion being stolen since 2017 began. In January 2018, it was disclosed that hackers stole private keys with malware, taking over $500,000,000 in NEM coins (a now-effectively-worthless cryptocurrency established by a nonprofit).

If hackers are able to steal from a purportedly “unhackable” technology, what’s to stop them from stealing from your business?

Cybersecurity solutions from Aniar IT Services, that’s what. We can set up the security solutions your business needs to protect its data, and monitor your systems to detect breaches preemptively, preventing a security issue from happening. To learn more about what we can do, reach out to us at 094 90 48200 .

What Does Your Business' IT Infrastructure Look Li...
Tip of the Week: Company Culture Can Be a Huge Bus...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 15 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Productivity Best Practices Cloud Privacy Network Security Email Innovation User Tips Workplace Tips Hosted Solutions Internet Microsoft Efficiency Data IT Support Software Hackers Google Hardware Data Backup Communication Data Recovery Business Cybersecurity Small Business Managed IT Services Tech Term Cloud Computing Smartphones VoIP Communications Collaboration IT Services Windows 10 Phishing Mobile Devices Computer Gadgets Android Backup Mobile Device Business Continuity Users Malware Smartphone Outsourced IT Network Browser Saving Money Artificial Intelligence Windows Disaster Recovery Business Management Information Facebook Miscellaneous Internet of Things Server Managed Service Upgrade Spam BDR Passwords Quick Tips Automation Office 365 Router Social Media Chrome How To Applications Windows 7 Apps Blockchain Microsoft Office BYOD Paperless Office Word Holiday Cybercrime Computers Data Security Data Storage Two-factor Authentication Display Wi-Fi Encryption Infrastructure Human Resources History Government Networking Vulnerability Remote Work Bandwidth Operating System Staff Patch Management Data Breach Data Protection Save Money HIPAA Ransomware Remote Monitoring Telephone System Settings Money Virtualization Connectivity Mobile Device Management Managed IT Update Cryptocurrency Employee/Employer Relationship CES Business Intelligence Fraud Software as a Service Training Augmented Reality Spam Blocking Botnet Keyboard Content Management VPN Managed IT services Bring Your Own Device Processor Password Redundancy Voice over Internet Protocol IT Management App Telephone Systems Virtual Assistant Meetings Vendor Management Social Engineering Business Technology Avoiding Downtime Big Data Hard Drive Google Drive Health Website Comparison Audit Servers Mobile Office Private Cloud IT Plan Education Managed Services Provider Identity Theft OneNote Google Docs Vendor Procurement Law Enforcement Help Desk Telephony Unsupported Software Machine Learning Access Control Scam Compliance Digital Signage Sports Computer Fan Default App Shopping Evernote Cleaning Windows Server 2008 Data loss Managed Services Mobile Computing HBO Virtual Machine AI Recycling Devices Cryptomining Software Tips Biometric Security Information Technology YouTube Mouse Windows Server 2008 R2 OneDrive Authentication Google Search Virtual Private Network Telecommuting FENG IT Infrastructure Social Network Practices Computer Care Safe Mode Security Cameras Cortana Alert Covid-19 Cache Policy 5G Smart Office Manufacturing Computing Amazon Outlook Shortcuts Hypervisor Remote eWaste Thought Leadership Skype Remote Worker Database The Internet of Things Microchip Copiers Hacker Save Time Remote Workers Travel Investment Printing Charger Hosted Computing Smartwatch Peripheral Wireless Internet Tools Work/Life Balance Procedure Document Management Camera Virtual Reality Professional Services Amazon Web Services Accountants Frequently Asked Questions Recovery Enterprise Content Management Mobility Going Green Legal Start Menu Wiring Solid State Drive Search Engine Downtime Development Password Manager Nanotechnology Sync Multi-Factor Security Proactive IT Windows 10s Managed IT Service Printers ROI Personal Wireless Charging Inventory WiFi Screen Mirroring Project Management Quick Tip USB Millennials FinTech Physical Security Cabling Fiber Optics Excel Password Management Social Employer-Employee Relationship Saving Time Office Criminal Twitter Firewall Bing Root Cause Analysis Messaging Business Mangement Smart Tech MSP Net Neutrality Digital Signature Entertainment Warranty GDPR Digitize Google Apps Flash Employee Cast Bitcoin Regulations Electronic Medical Records Wire Value Workforce Cables Trend Micro Online Shopping Tip of the week NIST Supply Chain Management Addiction Specifications Wireless Unified Threat Management Credit Cards PDF HVAC SMS Gmail Trending File Sharing ISP Public Cloud OLED Using Data Printer Remote Computing IT Assessment Workers HaaS Batteries PCI DSS Data Management Presentation Lithium-ion battery CrashOverride Regulation Tech Support Emergency Wireless Technology IBM Safety Productivity Company Culture Managed Service Provider Marketing Budget Customer Relationship Management Hiring/Firing Competition Managing Stress IP Address Fun Customer Service Personal Information Domains Windows 10 Hard Drives Financial Search Public Speaking