312-253-4321    Get SUPPORT

Alchetec Blog

By accepting you will be accessing a service provided by a third-party external to https://www.alchetec.com/

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime has morphed over the past decade or so. With unbreakable encryption making breaking directly into a network all but impossible, phishing, Distributed Denial of Service (DDoS) attacks, and other methods of indirect hacking have become en vogue. As a result, software companies are looking in some strange places to find building blocks for intrusion mitigation. One interesting emerging technology being used for this purpose is blockchain.

Developments in blockchain technology have begun to be stretched past keeping records and cryptocurrency. Today there are a couple companies using blockchain to create innovative cybersecurity solutions that aim to drastically reduce a company's exposure to cybercrime. No matter what vertical you work in, blockchain-integrated solutions have begun to pop up. Building new solutions with blockchain is incredibly popular nowadays, but is it just a buzzword used for its role in marketing, or is it making a discernible difference in these solutions?

Often thought to be “unhackable”, security professionals developing a blockchain-based cyber security platform isn’t all that noteworthy, until you realize how they are going about it. Developers have begun to create blockchain-based platforms that uses the distributed nature of the solution to power content delivery networks (CDN) and DDoS attack mitigation services. It does this by allowing users to rent out their spare bandwidth to use as security computing.

This will potentially reduce the ability for hackers to execute attacks, lower the cost for businesses to mitigate the effects of these attacks, and capitalize on their extra bandwidth. Other developers are using smart contract adoption to secure their interoperability and file security.

Is Blockchain Vulnerable?

Being a human invention, there have been some kinks in blockchain technology. For those of you who do not know how the blockchain works, here is a very stripped-down definition: Every transaction made through the blockchain, financial or contractual, is given a permanent, designated “block” in the chain. In order for it to be added to the ledger, the rest of the network (every other node) needs to approve this new block’s validity. Once it is added, it cannot be altered and provides an unchangeable record of the transaction. If a block needs to be changed, a new block would have to be entered. It is only then that the transaction is completed.

While this method may seem extraordinarily secure, this “unhackable” technology has its flaws. In 2018 alone just under one billion dollars' worth of cryptocurrency was stolen. Of the $927 million taken, $532.6 million of it was hacked from the Tokyo-based cryptocurrency company Coincheck where 500 million XEM coins up and vanished from the exchange.

Other Blockchain Vulnerabilities

To my surprise, one investigation found that some blockchain and cryptocurrency constructs has over 40 different vulnerabilities. Here are a couple:

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner and you accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Obviously popular blockchains, typically associated with renowned cryptocurrencies, have too big of a price tag to be practical targets for such a hack. Less expensive coins, however, are, and can be lucrative targets for hackers. In 2018, 51% attacks were leveraged against new cryptocurrencies, netting the attackers the equivalent to approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key to unlock the naturally encrypted platform. Naturally, if this key were to be stolen, the thief would be able to access the user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and, as designed, harder to undo.

It’s hard to forget in this world that is completely integrated with technology that some tech is just in its infancy. Blockchain, especially outside of the cryptocurrency sphere is only emerging and the tech built with it should be looked at through skeptical eyes. Stay up to date with the latest technology concerns and information, subscribe to Alchetec blogs.

SQL Server 2008 R2 Has Reached the End of the Line
Tip of the Week: Navigating the Taskbar in Windows...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 03 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Business Computing Cloud Network Security Data Backup Data IT Services Privacy Hosted Solutions IT Support Malware Software Internet Email Hackers Outsourced IT Efficiency Microsoft Data Recovery Innovation Computer Business Hardware Business Continuity Small Business Cloud Computing Cybersecurity Mobile Devices Managed IT Services Productivity Managed IT Services Backup User Tips Upgrade Google Ransomware Collaboration Tech Term Phishing Communication Business Management Windows 10 VoIP Workplace Tips IT Support Smartphones Mobile Device Android Paperless Office Disaster Recovery Remote Monitoring Data Management Managed Service Managed Service Provider Office 365 Managed IT Smartphone Server Communications Quick Tips Internet of Things Social Media Facebook Encryption Passwords Network Save Money Browser Miscellaneous Saving Money Wi-Fi BDR Virtualization Help Desk Holiday Artificial Intelligence Business Technology BYOD Windows 10 Healthcare Compliance Windows 7 Health Government Document Management Applications Training Employer-Employee Relationship Automation Password Remote Work Vendor Management Risk Management Laptops Microsoft Office Windows Office Data Security Infrastructure SaaS Tip of the week Data loss Storage Avoiding Downtime Telephone Systems Bandwidth Unified Threat Management File Sharing Two-factor Authentication Mobility Antivirus Recovery Redundancy Processor Going Green Maintenance Vulnerability IT Management Scam Apps Analytics Project Management Chrome Blockchain Users Information Hosted Solution Computers Robot Firewall Company Culture Tablet Wireless Gmail Software as a Service Computing App Mobile Device Management Proactive Files Money Router Meetings OneDrive Data Storage RMM Word Regulations Politics VPN Gadgets Flexibility Machine Learning Customer Relationship Management IoT Access Control Virtual Reality Big Data Virtual Private Network IT Service Work/Life Balance Website Bring Your Own Device Customer Service Digital Payment Covid-19 Mobile Security Outlook Identity Theft Mobile Office Upgrades Licensing Monitoring Recycling Display Assessment Alert Utility Computing Electronic Health Records Dark Web How To Consulting Apple Time Management Patch Management How To Monitors Consultation Samsung Unified Communications Uninterrupted Power Supply Social Network Employees Managed Services Provider Augmented Reality Smart Technology Search Employee-Employer Relationship Network Management File Management Management Remote Monitoring and Management Net Neutrality Chromebook Twitter Professional Services Server Management The Internet of Things Payment Cards HIPAA Settings Remote Workers Co-Managed IT Operating System Networking Social Internet Exlporer Hard Drive Solid State Drive Remote Computing Printing Downtime Electronic Medical Records Managed Services Cooperation Optimization Social Networking Fleet Tracking Tech Terms Google Drive User Management Cache Taxes Hard Disk Drive Bookmarks Emoji Spyware Human Error Firefox IT Solutions Processors Current Events Biometric Permissions Star Wars Features Wasting Time Statistics SharePoint Mobile VoIP Mirgation High-Speed Internet Authentication Mail Merge USB Database Management IT Assessment Break Fix Nanotechnology ROI Technology Laws Legal Law Enforcement Vendor Staff Private Cloud Solid State Drives Spam Virtual Machines Black Friday Motherboard Asset Tracking Theft Techology Personal Information Batteries Hotspot Unsupported Software Favorites Teamwork Shortcut MSP Permission Lenovo Projects Gamification Fraud Disaster 3D Printing Database Bluetooth Downloads Update Cyber security Migration Development Authorization Address GDPR Digitize Screen Reader Software Tips Notes Heating/Cooling Unified Threat Management Gadget Smart Devices Operations Managing Stress WiFi VoIP Dark Data Options Credit Cards Cyber Monday Mobile Computing Social Engineering OneNote Financial Disaster Resistance Virus Language eWaste Mobile Data Conferencing Shared resources Technology Tips Chatbots Cables Test Superfish Return on Investment Outsource IT Cybercrime Cyberattacks Voice over Internet Protocol Multi-Factor Security Black Market Shadow IT Data Warehousing Smart Tech PowerPoint Servers User Error Sensors Wearable Technology Enterprise Content Management GPS YouTube Wireless Internet Tech Support Holidays Google Maps Procurement Proactive IT Computer Repair Crowdsourcing Wireless Technology 5G Computing Infrastructure Information Technology Mouse Identity Supercomputer Notifications Active Directory Safety Laptop Cost Management Travel Read Only Hacking Google Calendar Botnet IBM Windows Server 2008 Network Congestion Wires Zero-Day Threat Physical Security Hacker Outsourcing Microsoft Excel Connectivity Content Filtering History Point of Sale Printer Sports Vulnerabilities Tracking Comparison Business Growth Employer/Employee Relationships Budget IT Distributed Denial of Service Modem Security Cameras Touchscreen IT Consulting Value of Managed Services Alerts Enterprise Resource Planning Corporate Profile Humor Instant Messaging Manufacturing IT Budget End of Support WPA3 Windows Server Remote Working Cortana Transportation Trending Legislation Education Backup and Disaster Recovery Bitcoin Video Conferencing G Suite Cabling E-Commerce Virtual Assistant Websites Telephony Telephone IT Technicians Geography Digital Specifications Automobile Proactive Maintenance Business Telephone Managed IT Service Cookies Remote Worker Data Breach Mobile Computer Care WannaCry Office Tips Finance Hard Disk Drives Students Relocation Regulation Hiring/Firing Sync Domains Staffing Fun IT Consultant CrashOverride Mobile Device Managment Public Speaking Error Administrator Presentation Lithium-ion battery Hard Drives Public Cloud Marketing Cleaning Hacks Competition Motion Sickness Printers Emergency IP Address