Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime has morphed over the past decade or so. With unbreakable encryption making breaking directly into a network all but impossible, phishing, Distributed Denial of Service (DDoS) attacks, and other methods of indirect hacking have become en vogue. As a result, software companies are looking in some strange places to find building blocks for intrusion mitigation. One interesting emerging technology being used for this purpose is blockchain.

Developments in blockchain technology have begun to be stretched past keeping records and cryptocurrency. Today there are a couple companies using blockchain to create innovative cybersecurity solutions that aim to drastically reduce a company's exposure to cybercrime. No matter what vertical you work in, blockchain-integrated solutions have begun to pop up. Building new solutions with blockchain is incredibly popular nowadays, but is it just a buzzword used for its role in marketing, or is it making a discernible difference in these solutions?

Often thought to be “unhackable”, security professionals developing a blockchain-based cyber security platform isn’t all that noteworthy, until you realize how they are going about it. Developers have begun to create blockchain-based platforms that uses the distributed nature of the solution to power content delivery networks (CDN) and DDoS attack mitigation services. It does this by allowing users to rent out their spare bandwidth to use as security computing.

This will potentially reduce the ability for hackers to execute attacks, lower the cost for businesses to mitigate the effects of these attacks, and capitalize on their extra bandwidth. Other developers are using smart contract adoption to secure their interoperability and file security.

Is Blockchain Vulnerable?

Being a human invention, there have been some kinks in blockchain technology. For those of you who do not know how the blockchain works, here is a very stripped-down definition: Every transaction made through the blockchain, financial or contractual, is given a permanent, designated “block” in the chain. In order for it to be added to the ledger, the rest of the network (every other node) needs to approve this new block’s validity. Once it is added, it cannot be altered and provides an unchangeable record of the transaction. If a block needs to be changed, a new block would have to be entered. It is only then that the transaction is completed.

While this method may seem extraordinarily secure, this “unhackable” technology has its flaws. In 2018 alone just under one billion dollars' worth of cryptocurrency was stolen. Of the $927 million taken, $532.6 million of it was hacked from the Tokyo-based cryptocurrency company Coincheck where 500 million XEM coins up and vanished from the exchange.

Other Blockchain Vulnerabilities

To my surprise, one investigation found that some blockchain and cryptocurrency constructs has over 40 different vulnerabilities. Here are a couple:

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner and you accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Obviously popular blockchains, typically associated with renowned cryptocurrencies, have too big of a price tag to be practical targets for such a hack. Less expensive coins, however, are, and can be lucrative targets for hackers. In 2018, 51% attacks were leveraged against new cryptocurrencies, netting the attackers the equivalent to approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key to unlock the naturally encrypted platform. Naturally, if this key were to be stolen, the thief would be able to access the user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and, as designed, harder to undo.

It’s hard to forget in this world that is completely integrated with technology that some tech is just in its infancy. Blockchain, especially outside of the cryptocurrency sphere is only emerging and the tech built with it should be looked at through skeptical eyes. Stay up to date with the latest technology concerns and information, subscribe to 415 IT blogs.

SQL Server 2008 R2 Has Reached the End of the Line
Tip of the Week: Navigating the Taskbar in Windows...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Hosted Solutions Network Security Privacy Software Cloud Data Recovery Data IT Support Email Malware Tech Term Outsourced IT IT Services Business Internet Computer Innovation Hackers Managed IT Services Business Management Cloud Computing User Tips Small Business Collaboration Ransomware Windows 10 Microsoft Mobile Devices Android Paperless Office Upgrade Hardware Efficiency Google Encryption Server Phishing Business Continuity Managed Service Provider VoIp Communication Communications Remote Monitoring Vulnerability Smartphones Backup Cybersecurity Browser Applications Internet of Things Managed IT services Passwords Artificial Intelligence Office 365 Laptops Business Technology Holiday Data Management Managed IT Managed Service Quick Tips Workplace Tips Healthcare Saving Money Compliance Blockchain Mobile Device Processor Smartphone Tip of the week Project Management Employer-Employee Relationship Information Disaster Recovery Scam Wi-Fi Government Save Money Document Management Bandwidth Antivirus BYOD Automation Social Media Website Microsoft Office Windows Data Security Infrastructure BDR Two-factor Authentication Vendor Management Chrome IT Management Router Analytics VPN Customer Relationship Management Consultation Mobile Security Employees Unified Communications Files Access Control Facebook Downtime Virtual Private Network The Internet of Things Company Culture Gmail Network Risk Management Cooperation Word Remote Workers Unified Threat Management IoT Software as a Service Net Neutrality Regulations Patch Management Management RMM Tablet File Sharing Internet Exlporer Server Management Data Loss Alert Proactive Smart Technology Redundancy Maintenance Storage Assessment HIPAA Bring Your Own Device Help Desk Remote Monitoring and Management Windows 7 Users Machine Learning Networking Operating System Network Management Office Private Cloud Data Warehousing Flexibility Professional Services Training Tech Support Search How To Test Technology Tips OneDrive SaaS G Suite Unified Threat Management Database Management Smart Tech WPA3 Legislation Shared resources Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Development Instant Messaging Settings Recycling Consulting Specifications 5G Touchscreen Hacking Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Employee-Employer Relationship Digital Payment Hotspot Manufacturing Time Management Motherboard Chromebook GDPR Connectivity Samsung Fleet Tracking Zero-Day Threat Virtualization Heating/Cooling IT Consulting Cyberattacks Social Managed IT Service Trending Cookies Cables SharePoint Customer Service Transportation Migration eWaste Managed Services Provider Mobile Device Management Black Friday Wireless Internet Favorites Apps Money Wasting Time Current Events Superfish Wireless Mouse Language Password Statistics Vulnerabilities Mail Merge User Error Asset Tracking Backup and Disaster Recovery CIO applications Servers Managing Stress Data Breach Read Only Security Cameras Break Fix Mobility Nanotechnology Wires Downloads MSP Finance Permissions Chatbots Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships WiFi Conferencing Microsoft Excel Database Miscellaneous Recovery Mirgation Hard Drive Computing Infrastructure Hard Disk Drives Bluetooth Mobile Computing Address Dark Web Augmented Reality Notes Wearable Technology Star Wars Human Error Spam Enterprise Content Management Printing Proactive Maintenance App Authentication Google Calendar Fraud Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Meetings Voice over Internet Protocol Gadgets Projects Cache Monitoring Electronic Medical Records Computing Alerts Solid State Drives Geography Remote Worker Virtual Reality PowerPoint Display Utility Computing OneNote Permission Travel Avoiding Downtime Websites Social Networking Technology Laws Cybercrime Screen Reader Emergency Multi-Factor Security Authorization Teamwork Identity Outlook Disaster Resistance Features Financial Firewall Printer Politics Return on Investment Remote Computing Comparison Licensing Options Modem High-Speed Internet Regulation Twitter Education CEO Printers Students Marketing Daniel Stevens

Latest Blog

As you company grows, you will need to invest a good deal of the revenue that you take in to keep operations from falling into complacency. In order to get a good idea what investments would be most advantageous, doing a proactive ROI analysis of project you plan to undertak...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...