Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime has morphed over the past decade or so. With unbreakable encryption making breaking directly into a network all but impossible, phishing, Distributed Denial of Service (DDoS) attacks, and other methods of indirect hacking have become en vogue. As a result, software companies are looking in some strange places to find building blocks for intrusion mitigation. One interesting emerging technology being used for this purpose is blockchain.

Developments in blockchain technology have begun to be stretched past keeping records and cryptocurrency. Today there are a couple companies using blockchain to create innovative cybersecurity solutions that aim to drastically reduce a company's exposure to cybercrime. No matter what vertical you work in, blockchain-integrated solutions have begun to pop up. Building new solutions with blockchain is incredibly popular nowadays, but is it just a buzzword used for its role in marketing, or is it making a discernible difference in these solutions?

Often thought to be “unhackable”, security professionals developing a blockchain-based cyber security platform isn’t all that noteworthy, until you realize how they are going about it. Developers have begun to create blockchain-based platforms that uses the distributed nature of the solution to power content delivery networks (CDN) and DDoS attack mitigation services. It does this by allowing users to rent out their spare bandwidth to use as security computing.

This will potentially reduce the ability for hackers to execute attacks, lower the cost for businesses to mitigate the effects of these attacks, and capitalize on their extra bandwidth. Other developers are using smart contract adoption to secure their interoperability and file security.

Is Blockchain Vulnerable?

Being a human invention, there have been some kinks in blockchain technology. For those of you who do not know how the blockchain works, here is a very stripped-down definition: Every transaction made through the blockchain, financial or contractual, is given a permanent, designated “block” in the chain. In order for it to be added to the ledger, the rest of the network (every other node) needs to approve this new block’s validity. Once it is added, it cannot be altered and provides an unchangeable record of the transaction. If a block needs to be changed, a new block would have to be entered. It is only then that the transaction is completed.

While this method may seem extraordinarily secure, this “unhackable” technology has its flaws. In 2018 alone just under one billion dollars' worth of cryptocurrency was stolen. Of the $927 million taken, $532.6 million of it was hacked from the Tokyo-based cryptocurrency company Coincheck where 500 million XEM coins up and vanished from the exchange.

Other Blockchain Vulnerabilities

To my surprise, one investigation found that some blockchain and cryptocurrency constructs has over 40 different vulnerabilities. Here are a couple:

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner and you accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Obviously popular blockchains, typically associated with renowned cryptocurrencies, have too big of a price tag to be practical targets for such a hack. Less expensive coins, however, are, and can be lucrative targets for hackers. In 2018, 51% attacks were leveraged against new cryptocurrencies, netting the attackers the equivalent to approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key to unlock the naturally encrypted platform. Naturally, if this key were to be stolen, the thief would be able to access the user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and, as designed, harder to undo.

It’s hard to forget in this world that is completely integrated with technology that some tech is just in its infancy. Blockchain, especially outside of the cryptocurrency sphere is only emerging and the tech built with it should be looked at through skeptical eyes. Stay up to date with the latest technology concerns and information, subscribe to Central Technology Solutions blogs.

SQL Server 2008 R2 Has Reached the End of the Line
Tip of the Week: Navigating the Taskbar in Windows...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 06 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Privacy Hosted Solutions Data Network Security IT Services Data Backup Email Malware Internet Hackers Software Efficiency IT Support Outsourced IT Microsoft Business Innovation Mobile Devices Productivity Data Recovery Computer Managed IT Services Hardware Small Business Google Upgrade Business Continuity IT Support Cloud Computing Backup Cybersecurity Ransomware Phishing User Tips Communication Collaboration Tech Term Managed IT Services Workplace Tips Managed Service Provider Business Management Disaster Recovery Windows 10 Smartphones Internet of Things VoIP Smartphone Android Paperless Office Mobile Device Remote Monitoring Social Media Data Management communications Managed IT Facebook Encryption Managed Service Windows 10 Office 365 Windows Network Browser Save Money Artificial Intelligence Server Quick Tips Virtualization Saving Money Miscellaneous BDR Passwords Holiday Help Desk Wi-Fi Risk Management BYOD Healthcare Vendor Management App Automation Password Government Business Technology Document Management Mobile Device Management Compliance Windows 7 Apps Health Bring Your Own Device Gmail Going Green Laptops Employer-Employee Relationship Microsoft Office Applications Recovery Remote Work Big Data Unified Threat Management Analytics Avoiding Downtime Users Chrome Firewall Bandwidth Robot Training Project Management Computing Mobility Antivirus Office Data storage File Sharing Content Filtering Computers Storage Infrastructure Wireless Data Security Data loss Vulnerability Two-factor Authentication Information Apple Blockchain IT Management Hosted Solution Redundancy Website Telephone Systems Tip of the week SaaS Processor Scam Money Machine Learning IT Service VPN Proactive Budget Tablet Meetings Customer Relationship Management Information Technology Virtual Private Network Printing Files Operating System Software as a Service Gadgets Router Remote Computing Maintenance Flexibility Politics Unified Communications Settings Work/Life Balance Customer Service IoT Downtime Virtual Reality Social Access Control OneDrive Company Culture Regulations RMM IT solutions Utility Computing Consulting Covid-19 Monitors Alert Time Management Networking Electronic Medical Records Patch Management Remote Worker Sports Augmented Reality Managed Services Provider Bitcoin Dark Web Employee-Employer Relationship How To Outlook The Internet of Things Samsung Network Management Remote Monitoring and Management Mobile Office Mouse Management Assessment Private Cloud How To Social Network Tech Support Server Management Remote Workers Google Drive Smart Technology Chromebook Net Neutrality File Management Consultation Spam Business Growth Uninterrupted Power Supply Digital Payment Hard Drive WiFi Websites Identity Theft YouTube Mobile Computing Upgrades Internet Exlporer Payment Cards Licensing Twitter Hacker HIPAA Word Search Electronic Health Records Administration Employees Cooperation Co-Managed IT Monitoring Solid State Drive Education Current Events Mobile Security LiFi Wireless Technology Display Legal Professional Services Managed Services End of Support Recycling Firefox Development Zero-Day Threat Office Tips SharePoint Staff Manufacturing Optimization Cryptocurrency Break Fix Social Networking Security Cameras User Management Managing Stress Instant Messaging Unified Threat Management Unsupported Software Hotspot Virus Transportation Mobile VoIP GPS Heating/Cooling IT Consulting OneNote Black Friday Update Roanoke — Central Technology Solutions Biometric Hacks Fraud Screen Reader Virtual Assistant Vendor Tech Terms Typing Mirgation Employer/Employee Relationships IT Assessment WannaCry eWaste Read Only Batteries Crowdsourcing Cables Backup and Disaster Recovery Best Practice Downloads Hard Disk Drives Virtual Machines Supercomputer Hacking Social Engineering USB Motherboard G Suite History Marketing Enterprise Content Management Finance User Error Mobile Data Language Cyber security Tracking Servers Data Breach Cyber Monday technology services provider Projects Gamification Smart Tech Wasting Time Smart Devices Taxes Buisness Theft Migration Proactive Maintenance Digitize Google Maps ROI Wires Human Error Dark Data Personal Information Operations Solid State Drives Credit Cards Disaster IT Budget Trending Cost Management E-Commerce Windows 8 Safety Save Time Data Warehousing Cabling Mail Merge Vulnerabilities Authentication Computing Infrastructure Teamwork Technology Laws Connectivity Identities Technology Assurance Group ’s 18 Return on Investment Notifications Database Sensors Touchscreen Techology WPA3 Financial Outsource IT Technology Tips Chatbots Database Management Shadow IT VoIP Sponsor Enterprise Resource Planning Bookmarks Modem Notes Point of Sale Lenovo Permission Google Wallet Multi-Factor Security Wearable Technology Options Holidays Features Microsoft Excel Black Market Cybercrime Address Geography Authorization Printer Alerts Shared resources Windows Server 2008 Statistics Hard Drives Writing Google Docs Distributed Denial of Service Emoji Annual Convention Active Directory Favorites Humor Voice over Internet Protocol Telephony Disaster Resistance Fleet Tracking Procurement Laptop Network Congestion Comparison Identity GDPR Outsourcing Sync Digital Obstacle Mobile Cookies PowerPoint Value of Managed Services Law Enforcement Superfish Test Drones Google Calendar Computer Repair 5G IT Public Cloud Cache Backups Travel High-Speed Internet Deep Learning Physical Security Botnet Bluetooth Star Wars Retail Managed IT Service Cortana San Diego Windows Server Conferencing 3D Printing Telephone Proactive IT Asset Tracking Remote Working Specifications Video Conferencing Mobile Device Managment Spyware Software Tips Course Permissions Processors Nanotechnology Gadget MSP Alt Codes Legislation IT Technicians Wireless Internet Business Telephone Automobile Computer Care Shortcut Virtual Desktop Cyberattacks Motion Sickness CCTV Administrator Emergency Relocation CrashOverride Students Peripheral Printers Webcam IT Consultant Error Web Server Regulation Cameras Hard Disk Drive