Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime has morphed over the past decade or so. With unbreakable encryption making breaking directly into a network all but impossible, phishing, Distributed Denial of Service (DDoS) attacks, and other methods of indirect hacking have become en vogue. As a result, software companies are looking in some strange places to find building blocks for intrusion mitigation. One interesting emerging technology being used for this purpose is blockchain.

Developments in blockchain technology have begun to be stretched past keeping records and cryptocurrency. Today there are a couple companies using blockchain to create innovative cybersecurity solutions that aim to drastically reduce a company's exposure to cybercrime. No matter what vertical you work in, blockchain-integrated solutions have begun to pop up. Building new solutions with blockchain is incredibly popular nowadays, but is it just a buzzword used for its role in marketing, or is it making a discernible difference in these solutions?

Often thought to be “unhackable”, security professionals developing a blockchain-based cyber security platform isn’t all that noteworthy, until you realize how they are going about it. Developers have begun to create blockchain-based platforms that uses the distributed nature of the solution to power content delivery networks (CDN) and DDoS attack mitigation services. It does this by allowing users to rent out their spare bandwidth to use as security computing.

This will potentially reduce the ability for hackers to execute attacks, lower the cost for businesses to mitigate the effects of these attacks, and capitalize on their extra bandwidth. Other developers are using smart contract adoption to secure their interoperability and file security.

Is Blockchain Vulnerable?

Being a human invention, there have been some kinks in blockchain technology. For those of you who do not know how the blockchain works, here is a very stripped-down definition: Every transaction made through the blockchain, financial or contractual, is given a permanent, designated “block” in the chain. In order for it to be added to the ledger, the rest of the network (every other node) needs to approve this new block’s validity. Once it is added, it cannot be altered and provides an unchangeable record of the transaction. If a block needs to be changed, a new block would have to be entered. It is only then that the transaction is completed.

While this method may seem extraordinarily secure, this “unhackable” technology has its flaws. In 2018 alone just under one billion dollars' worth of cryptocurrency was stolen. Of the $927 million taken, $532.6 million of it was hacked from the Tokyo-based cryptocurrency company Coincheck where 500 million XEM coins up and vanished from the exchange.

Other Blockchain Vulnerabilities

To my surprise, one investigation found that some blockchain and cryptocurrency constructs has over 40 different vulnerabilities. Here are a couple:

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner and you accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Obviously popular blockchains, typically associated with renowned cryptocurrencies, have too big of a price tag to be practical targets for such a hack. Less expensive coins, however, are, and can be lucrative targets for hackers. In 2018, 51% attacks were leveraged against new cryptocurrencies, netting the attackers the equivalent to approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key to unlock the naturally encrypted platform. Naturally, if this key were to be stolen, the thief would be able to access the user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and, as designed, harder to undo.

It’s hard to forget in this world that is completely integrated with technology that some tech is just in its infancy. Blockchain, especially outside of the cryptocurrency sphere is only emerging and the tech built with it should be looked at through skeptical eyes. Stay up to date with the latest technology concerns and information, subscribe to Central Technology Solutions blogs.

SQL Server 2008 R2 Has Reached the End of the Line
Tip of the Week: Navigating the Taskbar in Windows...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Hosted Solutions Email Malware Privacy IT Services Network Security Hackers Data Internet Software Data Backup Productivity Outsourced IT Managed IT Services Computer Business Microsoft IT Support Innovation Data Recovery Mobile Devices Ransomware Hardware Tech Term Efficiency IT Support Google User Tips Cloud Computing Small Business Upgrade Business Continuity Backup Managed Service Provider Internet of Things Collaboration Smartphone Android Windows 10 Business Management Communication Remote Monitoring Phishing Smartphones Paperless Office Disaster Recovery VoIP Windows Workplace Tips Encryption Managed IT Managed IT Services Save Money Artificial Intelligence Social Media Data Management Windows 10 Cybersecurity communications Browser Server Facebook Office 365 Risk Management Mobile Device BYOD BDR App Automation Mobile Device Management Saving Money Holiday Quick Tips Passwords Managed Service Business Technology Training Vendor Management Microsoft Office Network Password Recovery Analytics Virtualization Chrome Laptops Applications Government Firewall Help Desk Bandwidth Unified Threat Management Wi-Fi Document Management Employer-Employee Relationship Compliance Apps Robot Bring Your Own Device Gmail Going Green Vulnerability Blockchain Information Wireless Big Data Processor File Sharing IT Management Tip of the week Avoiding Downtime Scam Hosted Solution Healthcare Antivirus Website Project Management Infrastructure Miscellaneous Money Data storage Telephone Systems Content Filtering SaaS Data Security Regulations Data loss Office IT Service Access Control Information Technology Operating System Printing Computers Storage Windows 7 Tablet RMM Unified Communications Remote Computing Users Files Settings Downtime Customer Service Apple Router Social Two-factor Authentication Politics Work/Life Balance VPN Virtual Reality Customer Relationship Management Computing Network Management Internet Exlporer End of Support Health Sports IoT HIPAA Budget Assessment Bitcoin Server Management Cooperation How To Monitors Alert Mobile Security Electronic Medical Records Gadgets Machine Learning Mobility Consultation Outlook Monitoring Uninterrupted Power Supply Mouse Employees Company Culture Google Drive How To Samsung Spam Word WiFi Flexibility YouTube Business Growth Redundancy Chromebook Private Cloud Proactive The Internet of Things Mobile Computing Software as a Service Tech Support Administration Hacker Digital Payment Remote Monitoring and Management Upgrades LiFi Maintenance Management Education Smart Technology Networking Twitter Net Neutrality Current Events Patch Management Websites Identity Theft Wireless Technology Legal IT solutions Licensing Remote Workers Virtual Private Network Display Permission Processors Active Directory Travel Hard Drive Features Shared resources Comparison Identity Botnet GDPR Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Authorization Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Gadget Best Practice Mobile Favorites Mail Merge Update Marketing 5G Test Touchscreen Techology Buisness Windows Server Cache Electronic Health Records VoIP Sponsor OneDrive Specifications Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Legislation IT Technicians GPS High-Speed Internet Wireless Internet Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Professional Services SharePoint Staff Conferencing Address Supercomputer Identities MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Recycling Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Superfish Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Dark Data Personal Information Transportation Mirgation Tracking Development Zero-Day Threat Employer/Employee Relationships Dark Web Motherboard Google Maps OneNote Bluetooth Virtual Assistant Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker User Error Language eWaste Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Humor Managed Services Provider Shortcut Migration Emoji Proactive Maintenance Data Warehousing Backups Employee-Employer Relationship Wasting Time Operations Drones Enterprise Content Management Finance Firefox Writing Solid State Drive Theft Heating/Cooling IT Consulting ROI Computing Infrastructure Point of Sale Deep Learning Network Congestion Solid State Drives Technology Assurance Group ’s 18 Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce WannaCry Computer Repair Teamwork Virtual Desktop Technology Tips Chatbots Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Options Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam Hard Disk Drive Students IT Consultant Error Printers Emergency Web Server CrashOverride