croom new

NuTech Services Blog

Is Blockchain a Shield for Cybercrime?

Is Blockchain a Shield for Cybercrime?

Blockchain technology is all the rage these days. Business owners are going to start hearing this buzzword as a bullet point in software solutions. Developers from all over the world are trying to harness the power of encrypted, distributed data, mainly due to the reputation that blockchain has regarding the “unhackable” permanence of the data stored upon it. However, it as powerful as blockchain is purported to be, it isn’t totally infallible.

How Blockchain Has Been Shown to Be Vulnerable

Let’s face it… blockchain technology is a human invention, which means that there are going to be some flaws.

Admittedly, the concept behind the blockchain makes this hard to believe: every transaction made through the blockchain, financial or data-based, is given a permanent, designated “block” in the chain. Before the transaction is completed, the rest of the network needs to approve this new block’s validity. The block is then added to the chain, where it cannot be altered and provides an unchangeable record of the transaction - to undo it, a new block would be created. It is only then that the transaction is completed.

While this method may seem foolproof, even “unhackable”, this just isn’t the case. In March of 2014, cybercriminals managed to steal $450,000,000 worth of Bitcoin through a transaction mutability vulnerability, and in June of 2016, cybercriminals managed to steal approximately $60,000,000 by leveraging a recursive calling vulnerability.

Additional Blockchain Vulnerabilities

Again, as a human creation, there are going to be some flaws in blockchain platforms. One investigation revealed that some blockchain and cryptocurrency platforms had over 40 vulnerabilities.

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability, and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner. If you manage to accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Naturally, more popular blockchains, like Bitcoin, are far too expensive to be practical targets, but smaller coins are much more affordable to attack and can be lucrative for hackers. In 2018, 51% attacks were leveraged against less popular cryptocurrencies, netting the attackers approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key. Naturally, if this key were to be stolen, those cybercriminals who stole it would be able to access and tamper with that user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and even harder to undo.

Breach Examples

As you might imagine, most breaches involving a blockchain are in some way tied to an end user. In 2017, a fraudulent cryptocurrency wallet service was left up for months as the cybercriminal responsible allowed people to funnel their cryptocurrencies into it before stealing $4,000,000 - out of a reported total of $2 billion being stolen since 2017 began. In January 2018, it was disclosed that hackers stole private keys with malware, taking over $500,000,000 in NEM coins (a now-effectively-worthless cryptocurrency established by a nonprofit).

If hackers are able to steal from a purportedly “unhackable” technology, what’s to stop them from stealing from your business?

Cybersecurity solutions from NuTech Services, that’s what. We can set up the security solutions your business needs to protect its data, and monitor your systems to detect breaches preemptively, preventing a security issue from happening. To learn more about what we can do, reach out to us at 810-230-9455.

What Does Your Business' IT Infrastructure Look Li...
Tip of the Week: Company Culture Can Be a Huge Bus...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 August 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hackers Google Hosted Solutions Microsoft Business Malware Email Workplace Tips Efficiency User Tips Internet Innovation Software Data Backup Mobile Devices Productivity Network Security Miscellaneous Computer Smartphones Hardware Productivity Windows 10 communications Android Browser Smartphone Business Continuity VoIP Small Business Business Management Windows Network Communication Tech Term IT Services Disaster Recovery Office Chrome Server Ransomware Upgrade Cloud Computing Data Backup Holiday Windows 10 Cybercrime IT Support Social Media Managed IT Services Collaboration Gadgets Alert Outsourced IT Data Recovery Mobile Device Save Money Microsoft Office Computers Automation Quick Tips Employer-Employee Relationship Spam Users Artificial Intelligence Managed IT Services Telephone Systems Virtualization Internet of Things Office 365 Router Phishing Operating System Hacking Cybersecurity Social Engineering Health Law Enforcement Facebook Passwords App Information Money Bandwidth Mobile Device Management Password Office Tips Applications How To Remote Computing Wi-Fi Marketing Mobility Google Drive BYOD Saving Money Big Data Bring Your Own Device Two-factor Authentication Encryption Word Work/Life Balance Networking Government Mobile Computing Mouse Managed Service Provider Gmail BDR Website Remote Monitoring Private Cloud Entertainment Application Settings Wireless Safety Training Data Management Keyboard The Internet of Things USB Recovery Managed Service Education Sports Staff Vulnerability Human Resources Data Breach Data Protection Scam Paperless Office Display VPN Cleaning Meetings Connectivity IT Support History Data Security Data Storage HaaS WiFi Windows 7 Apps Voice over Internet Protocol Virtual Reality Flexibility Lithium-ion battery Bluetooth Wearable Technology Data storage Battery Value Internet Exlporer IT Plan Hiring/Firing Fax Server Avoiding Downtime Public Cloud Legal Printer Automobile Digital Signage Patch Management Redundancy Virtual Assistant Unsupported Software Unified Threat Management Excel Vendor Management Retail Net Neutrality End of Support Comparison Humor OneNote Biometrics Telephone System Apple Black Market Identity Theft Hacker Charger Update CES PDF Robot Managed IT Infrastructure Environment DDoS Telephony Machine Learning YouTube eWaste Help Desk Computer Care IT solutions Google Docs Content Management Access Control Electronic Medical Records Worker Botnet Business Intelligence Augmented Reality Processor Computer Accessories User Error Downtime Fraud Physical Security Software as a Service Samsung Budget Blockchain IT Management Risk Management Save Time Spam Blocking Best Practice Cryptocurrency Firewall Social Servers Emergency Programming Manufacturing Outlook Investment Flash Amazon WIndows 7 Tablet Smart Office Shortcuts FENG Multi-Factor Security HIPAA Safe Mode Database Current Events Telecommuting Nanotechnology Microchip Windows 10s Shortcut Procurement Recycling Analytics Bloatware Workforce Practices Smart Technology Wiring Netflix Streaming Media Personal Information Tools Google Apps HVAC Public Computer Data loss People Chromecast Cabling webinar Frequently Asked Questions Running Cable Monitor ROI Amazon Web Services Relocation Managing Stress Document Management Vendor Loyalty Trending Business Technology Knowledge SharePoint Remote Work Addiction Search Engine Uninterrupted Power Supply Criminal Hybrid Cloud Experience Entrepreneur Mobile Office Hosted Computing Two Factor Authentication Social Networking Smart Tech Camera Employer Employee Relationship Financial Workers Printer Server Analyitcs Enterprise Content Management Google Search Screen Mirroring Windows Media Player MSP Cables Conferencing Tip of the week Reputation GDPR Sync Online Shopping Computing Infrastructure Tablets SaaS Biometric Security Network Congestion Software Tips Search Cache Bing Solid State Drive Music Going Green FCC Inventory Video Games Notifications Virtual Machine Internet exploMicrosoft Content Consultant Password Management Proactive IT IBM Cast Specifications Digital Signature Techology Transportation File Sharing Default App Emails Windows Server 2008 Customer Windows Server 2008 R2 Evernote Virus Hard Drives Security Cameras User 5G IT Consultant Credit Cards How to Science Wireless Internet Audit Tech Support PowerPoint Information Technology Troubleshooting Supercomputer Laptop Title II Scalability Customer Relationship Management Devices Warranty Maintenance Hypervisor Password Manager Advertising Audiobook Best Available NIST ISP Accountants Benefits Distributed Denial of Service Skype Wireless Charging iPhone Memory Smartwatch Assessment Root Cause Analysis NarrowBand OLED Leadership HBO IT Infrastructure Windows 8 Wire Computer Fan Shadow IT Books Touchpad Online Authentication Instant Messaging Customer Service Thought Leadership Administrator Rootkit Saving Time Travel Business Mangement Politics Cryptomining Millennials Remote Worker Hard Drive Start Menu Cortana Cameras Files Worker Commute Employee Television Wireless Technology Twitter Printers Phone System CrashOverride Compliance Webinar Company Culture Regulation IT solutions

Mobile? Grab this Article!

Qr Code

Upcoming Events

No events

Recent Comments

No comments yet.

Latest Blog Entry

Small business owners have a lot on their minds and a ton of responsibilities that the average employee doesn’t have. Small businesses often force business owners into taking on various roles that may or may not fit their specific skill set, including CIO or CTO. Of course, ...

Latest News

NuTech Services launches new website!

NuTech Services is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account Login