croom new

NuTech Services Blog

Is Blockchain a Shield for Cybercrime?

Is Blockchain a Shield for Cybercrime?

Blockchain technology is all the rage these days. Business owners are going to start hearing this buzzword as a bullet point in software solutions. Developers from all over the world are trying to harness the power of encrypted, distributed data, mainly due to the reputation that blockchain has regarding the “unhackable” permanence of the data stored upon it. However, it as powerful as blockchain is purported to be, it isn’t totally infallible.

How Blockchain Has Been Shown to Be Vulnerable

Let’s face it… blockchain technology is a human invention, which means that there are going to be some flaws.

Admittedly, the concept behind the blockchain makes this hard to believe: every transaction made through the blockchain, financial or data-based, is given a permanent, designated “block” in the chain. Before the transaction is completed, the rest of the network needs to approve this new block’s validity. The block is then added to the chain, where it cannot be altered and provides an unchangeable record of the transaction - to undo it, a new block would be created. It is only then that the transaction is completed.

While this method may seem foolproof, even “unhackable”, this just isn’t the case. In March of 2014, cybercriminals managed to steal $450,000,000 worth of Bitcoin through a transaction mutability vulnerability, and in June of 2016, cybercriminals managed to steal approximately $60,000,000 by leveraging a recursive calling vulnerability.

Additional Blockchain Vulnerabilities

Again, as a human creation, there are going to be some flaws in blockchain platforms. One investigation revealed that some blockchain and cryptocurrency platforms had over 40 vulnerabilities.

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability, and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner. If you manage to accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Naturally, more popular blockchains, like Bitcoin, are far too expensive to be practical targets, but smaller coins are much more affordable to attack and can be lucrative for hackers. In 2018, 51% attacks were leveraged against less popular cryptocurrencies, netting the attackers approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key. Naturally, if this key were to be stolen, those cybercriminals who stole it would be able to access and tamper with that user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and even harder to undo.

Breach Examples

As you might imagine, most breaches involving a blockchain are in some way tied to an end user. In 2017, a fraudulent cryptocurrency wallet service was left up for months as the cybercriminal responsible allowed people to funnel their cryptocurrencies into it before stealing $4,000,000 - out of a reported total of $2 billion being stolen since 2017 began. In January 2018, it was disclosed that hackers stole private keys with malware, taking over $500,000,000 in NEM coins (a now-effectively-worthless cryptocurrency established by a nonprofit).

If hackers are able to steal from a purportedly “unhackable” technology, what’s to stop them from stealing from your business?

Cybersecurity solutions from NuTech Services, that’s what. We can set up the security solutions your business needs to protect its data, and monitor your systems to detect breaches preemptively, preventing a security issue from happening. To learn more about what we can do, reach out to us at 810-230-9455.

What Does Your Business' IT Infrastructure Look Li...
Tip of the Week: Company Culture Can Be a Huge Bus...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 16 June 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hosted Solutions Hackers Microsoft Business Malware User Tips Internet Email Innovation Backup Efficiency Mobile Devices Workplace Tips Data Productivity Network Security Software Hardware Miscellaneous Windows 10 Productivity Android Smartphones Browser Smartphone Business Continuity VoIP Computer communications Business Management Network Small Business Tech Term IT Services Windows Chrome Disaster Recovery Server Office Ransomware Cloud Computing Communication Data Backup Cybercrime Holiday Upgrade Social Media Windows 10 Data Recovery IT Support Save Money Managed IT Services Automation Computers Alert Outsourced IT Gadgets Artificial Intelligence Managed IT Services Mobile Device Telephone Systems Microsoft Office Internet of Things Virtualization Router Quick Tips Collaboration Employer-Employee Relationship Operating System Cybersecurity Law Enforcement Facebook Social Engineering Health Hacking Office 365 Passwords App Spam Users Office Tips Password Mobile Device Management Applications How To Wi-Fi Mobility Information Phishing Marketing Money Bandwidth Two-factor Authentication Encryption Word Work/Life Balance Networking Bring Your Own Device BYOD Government Saving Money Big Data Mobile Computing Mouse Gmail Remote Computing Private Cloud BDR Remote Monitoring Application Settings Managed Service Provider Google Drive Website Entertainment Education Sports Staff USB Recovery Managed Service Vulnerability Data Breach Human Resources Paperless Office VPN Data Protection Scam Cleaning Meetings Connectivity History Data Security IT Support HaaS Apps Voice over Internet Protocol WiFi Virtual Reality Flexibility Lithium-ion battery Training Data Management Keyboard Wireless Safety The Internet of Things Patch Management Redundancy Excel Retail Virtual Assistant Unsupported Software Printer End of Support Net Neutrality Display OneNote Comparison Hacker Charger Update CES PDF Biometrics Telephone System Apple Black Market Unified Threat Management Identity Theft Managed IT Infrastructure Environment Robot Telephony Machine Learning YouTube Humor DDoS Computer Care IT solutions Google Docs Content Management eWaste Worker Botnet Data Storage Access Control Electronic Medical Records Business Intelligence Augmented Reality Software as a Service Samsung Budget Blockchain User Error Downtime Windows 7 Fraud Physical Security Spam Blocking Best Practice Cryptocurrency IT Management Risk Management Save Time Computer Accessories Servers Firewall Social Battery Value Internet Exlporer Bluetooth Wearable Technology Data storage Avoiding Downtime Public Cloud IT Plan Hiring/Firing Fax Server Automobile Legal Amazon Web Services Relocation Managing Stress Document Management Vendor Loyalty Trending Cabling webinar Frequently Asked Questions Running Cable Monitor Addiction Search Engine Vendor Management Uninterrupted Power Supply Analytics Criminal Hybrid Cloud Experience Entrepreneur Business Technology Knowledge SharePoint Remote Work Workers Analyitcs Enterprise Content Management Google Search Screen Mirroring Mobile Office Hosted Computing Two Factor Authentication Social Networking Smart Tech Camera Employer Employee Relationship Sync Online Shopping Computing Infrastructure Tablets SaaS MSP Cables Conferencing Tip of the week Reputation Cache Bing Solid State Drive Music Biometric Security Network Congestion Software Tips Search Notifications Printer Server Internet exploMicrosoft Content Consultant Password Management Proactive IT IBM Cast Going Green FCC Inventory Video Games Evernote Hard Drives Security Cameras Windows Media Player Specifications Digital Signature Techology Transportation File Sharing Default App Emails Windows Server 2008 Customer Science Wireless Internet Help Desk Audit Tech Support Information Technology Troubleshooting User 5G IT Consultant Credit Cards How to Maintenance Password Manager Advertising Audiobook Best Available NIST ISP Supercomputer Laptop Title II Scalability Customer Relationship Management Devices Warranty Virus Skype Wireless Charging iPhone Memory Smartwatch Assessment Root Cause Analysis NarrowBand Accountants Benefits Distributed Denial of Service Windows 8 Wire Computer Fan Shadow IT PowerPoint Books OLED Leadership HBO IT Infrastructure Administrator Rootkit Travel Business Mangement Politics Cryptomining Touchpad Online Authentication Instant Messaging Customer Service Thought Leadership Start Menu Cortana Files Worker Commute Employee Television Wireless Technology Millennials Remote Worker WIndows 7 Tablet Smart Office Shortcuts FENG Multi-Factor Security HIPAA Emergency Programming Manufacturing Outlook Flash Amazon Microchip Windows 10s Shortcut Recycling Bloatware Safe Mode Database Current Events Telecommuting Nanotechnology Streaming Media Cameras Tools Google Apps HVAC Digital Signage Public Computer Data loss People Chromecast Workforce Practices Smart Technology Wiring Netflix ROI Printers Phone System CrashOverride Compliance Company Culture Webinar Regulation IT solutions Investment Twitter

Mobile? Grab this Article!

Qr Code

Upcoming Events

No events

Recent Comments

No comments yet.

Latest Blog Entry

In a perfect world, keeping your antivirus updated and having a good firewall in place would be enough to protect your business from cybersecurity threats.

Latest News

NuTech Services launches new website!

NuTech Services is proud to announce the launch of our new website at www.nutechology.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account Login