💎 Fed’s first rate cut since 2020 set to trigger market. Find undervalued gems with Fair ValueSee Undervalued Stocks

Essential Strategies for Securing Your Business' Crypto Assets

Published 11/04/2019, 11:47 AM
Updated 11/04/2019, 01:01 PM
 Essential Strategies for Securing Your Business' Crypto Assets
MSFT
-
EXPE
-

Crypto assets are often associated with numerous advantages, including the transparency and security of transactions. However, these don’t mean that cryptographic assets have immunity from theft. They can be stolen by cybercriminals in more ways than one.

According to a report by cybersecurity firm CipherTrace, cryptocurrency theft amounted to $1.7 billion in 2018. This figure is more than 400% higher than the amount of stolen crypto money in the previous year. The bulk of the amounts stolen is attributed to thefts from cryptocurrency exchanges and cryptocurrency infrastructure services -- online wallets in particular.

On the other hand, cybersecurity company Carbon Black reported that while the most common targets of cryptocurrency theft are exchanges (27%), businesses are a close second (21%). It only makes sense for cryptocurrency-owning businesses to put security measures in place as a growing number of businesses are already accepting bitcoins and other crypto assets as payments. These include Microsoft (NASDAQ:MSFT), Overstock, and Expedia (NASDAQ:EXPE). Even KFC-Canada, Virgin Galactic, and several branches of Subway already include cryptocurrency in their list of payment options.

The Nature of Crypto Asset Theft


How are cryptocurrencies and other cryptography-based assets stolen? Before going into the details of this topic, it’s important to know the basics of how the supposedly unbreakable encryption behind bitcoin and other cryptography-based assets is defeated. With all the lengthy strings of characters used to identify a transaction and the similarly kilometric private keys needed to access wallets, how come cryptocurrencies are still compromised?

A good way to answer this question is by comparing cryptocurrency to a fortress with indestructible walls. Attacks may not be able to pierce through the walls, but the fortress has openings intentionally added for the entry and exit of the users. These points of entry/exit are what hackers exploit. Cryptography, at least before quantum computers become viable, is still virtually impenetrable. That’s why it’s not what cybercriminals attack, it’s the specific accounts whose owners fail to take advantage of security measures.

One of the common ways to steal cryptocurrency is clipboard hijacking. This is done by introducing “clipper” malware to computers. These “clippers” copy and submit data stored in the clipboard, which may include the private keys for cryptocurrency wallets. Many of the malware used to steal crypto asset details are concealed as cryptocurrency trading add-ons, slack bots, and supposedly mundane apps laced with malicious codes.

Some attacks may be o...

This article appeared first on Cryptovest

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.