Blockchain is a broken chain after all
The hype surrounding the blockchain, cryptocurrency and decentralized finance (DeFi) infrastructure was quite a show. Recent events have shown that a lack of understanding of new technology, exaggerated security features and an overstated absence of centralized control are responsible for the misconceptions about blockchain.
Anonymity was an important characteristic of cryptocurrency transactions and investments. However, it has been argued that if cryptocurrency transactions are supposed to be anonymous, then how were cybercriminals able to hack wallets and decentralized ledger systems? Reports of authorities being able to retrieve stolen bitcoins and ransoms have forced the move
The
It shouldn’t be a surprise that blockchain is under scrutiny due to cryptocurrency crashes and recent high-profile cyber incidents. While it’s easy to dismiss skepticism about blockchain’s ability to deliver the utopia popularized by opportunists and enthusiasts, the failure to recognize the limitations of the technology and its vulnerability to software bugs is partly responsible for the rise in successful cyber attacks.
So, what exactly is Blockchain?
Blockchain is a distributed ledger technology that allows the transparent sharing of transactions and assets in a network. As an advanced database system; blockchain records, stores and tracks blocks of transaction data.
The technology is based on shared consensus, record changeability and smart contracts. As a result of these features, records are trusted as no single network partner can change or delete data without the consensus of the network.
As a peer-to-peer technology, blockchain facilitates faster information transfer, transparency and trust among network participants. Other benefits include data accuracy, non-repudiation of transactions and improved efficiency.
Beyond theoretical benefits associated with blockchain, it has proven to be beneficial in the real world. In accordance
Recent Blockchain Cyber Events
In accordance
More than 98% of the hacks occurred on DeFi platforms, which points to the severity of exploitable flaws in one of the main features of blockchain technology – decentralization. Both BNB and Ethereum were the most targeted chains in Q3 2022. BNB was hit by 16 incidents (28.6%), while Ethereum recorded 13 incidents (23.2%).
An analysis of some of the projects affected by cyber attacks points to widespread deficient cyber security controls. Compromised companies included Binance (the world’s largest cryptocurrency exchange), Nomad Bridge (a cross-chain communication standard), Beanstalk (a decentralized stablecoin protocol), and Harmony Horizon (a layer-1 blockchain bridge protocol).
There was also Ronin Network (a crypto wallet and NFT gaming operator), Wintermute (a global crypto market marker), TribeDAO (a decentralized autonomous organization that controls three projects), Wormhole Network (a bridge that facilitates the movement of digital assets across blockchains), and many others.
*Photo by Sea and Sun - stock.adobe.com*
Broken links in Blockchain
Threat actors exploit vulnerabilities in blockchain to compromise projects and platforms. As DeFi platforms increase in adoption, their attack surfaces grow, leading to more exploits as seen in Q3.
DeFi projects are more vulnerable to cyber attacks due to lack of appropriate security controls. Mishandling fork code is another reason why DeFi is easily hacked. In 2021, the majority was off
The lack of secure key management exposes blockchain to exploitation. An automated cryptocurrency lending platform was exploited through a compromised private key, affecting team wallets on various chains.
Threat actors exploited vulnerabilities in the Domain Name System of an Interoperability Protocol to maintain a DNS hijack by redirecting users to a hacker-controlled front end.
Vulnerable blockchain endpoints provide threat actors with rewarding opportunities to wreak havoc. Threat actors also weaponized vulnerabilities in the contract’s source code, virtual machines and cryptographic algorithms.
Malicious mining software exploited unpatched vulnerabilities in operating systems. In accordance
Phishing attacks and other social engineering tactics affect blockchain networks. Although these attacks are not specific to blockchain, there has been a significant increase in blockchain phishing attacks.
Social engineering was responsible
In 2014, a
A consensus control attack focuses on achieving the majority of community consensus that gives a hacker control of the network. Two major examples include Sybil and 51% attack.
In a Sybil attack, the threat actor gains majority control by creating nodes to serve fake identities. A successful Sybil attack gives a hacker the ability to gain the majority of network influence, perform unauthorized actions, block users from the network, subvert legitimate network authority, and perform a 51% attack.
A 51% attack allows a threat actor to control at least 51% of a network’s hash rate. A successful 51% attack allows a hacker to alter or reverse completed transactions, enable double spending, prevent transaction confirmation, and destroy the integrity of a blockchain platform. Examples of
Insider threats are increasingly becoming a major concern for society. Recent cryptocurrency crash is a result of blanket pulling as project developers scam investors. In 2021 it was over
Other security issues include double-spending, transaction malleability, selfish mining, post-hold fork, and flash loan attacks. The community should also be on guard against Finney, eclipse, vector76, rase, proof-of-stake, and distributed denial-of-service attacks.
How to keep the blocks well linked
A securely implemented blockchain ecosystem provides a ton of opportunities for businesses and users. With any technology or business operation, there are always security issues that can cause adverse effects if the proper controls are not in place. Without a doubt, blockchain has several exploitable vulnerabilities.
However, the focus should be on cutting through the cloud of hype to ensure that adequate controls are implemented to protect the ecosystem. Here are some controls to reduce cyber attacks:
- Enforce acceptable consensus algorithms.
- Implement monitoring features to track changes in node behavior and mining pool.
- Install antivirus on endpoints and patch known vulnerabilities.
- Implement web application firewalls and secure routing protocols.
- Emphasize appropriate security awareness, especially common social engineering tactics.
- Improve browser security to prevent crypto-mining and crypto-jacking attacks
- Update vulnerabilities in contract source code, virtual machines and cryptographic algorithms.
- Ensure that strong access controls (such as strong passwords and MFA) are enforced.
- Implement proper key management and use strong encryption protocols.
- Verify that APIs have no inherent security flaws.
- Develop innovative blockchain governance.
Blockchain is not going away anytime soon. Cryptocurrencies and DeFi are only part of the innovative technology. Modern businesses will continue to disrupt due to blockchain innovation. Companies that shy away from adopting blockchain should learn from organizations that paid dearly for delayed cloud adoption. To prevent such a risk, organizations should implement secure blockchain adoption strategies.
LOAD
. . . comments & more!