💎 Fed’s first rate cut since 2020 set to trigger market. Find undervalued gems with Fair ValueSee Undervalued Stocks

Security Takes a Backseat to Growth: New McAfee Report Reveals Weaknesses in Crypto World

Published 06/14/2018, 08:15 AM
Updated 06/14/2018, 08:21 AM
 Security Takes a Backseat to Growth: New McAfee Report Reveals Weaknesses in Crypto World
BTG/USD
-

The latest McAfee report on blockchain security points out the most common threats against blockchain users and owners of digital assets. Those include phishing and malware as the leading cause of troubles.

“Bad actors have already targeted many blockchain implementations using social engineering, malware, and exploits,” states the report.

Phishing scams are the most common attack to steal private seeds. The McAfee report points out that a site generating IOTA seeds managed to fool customers by providing tainted wallet seeds. In 2018, there is a marked uptrend in mining malware, outpacing previous years and expanding to millions of computers.

“In the past six months, many malware developers appear to have migrated from ransomware to cryptocurrency mining, according to McAfee® Global Threat Intelligence data that show ransomware attacks declining 32% in Q1 2018 from Q4 2017 while coin mining increased by 1,189%,” discovered the latest report.

Mining malware is using more sophisticated techniques for infection, often targeting gaming communities, or using other approaches to make users download the miner, believing it is another type of software.

51% attacks were also among the chief risks, and were performed against prominent coins, including Verge (XVG), as well as Bitcoin Gold (BTG) and ZenCash (ZEN).

As for the protection of a complex hash function, even that may not be enough and expose users to a Dictionary Attack, or attempts to guess familiar phrases and words that produce the hash. But those attacks are comparably more rare than tainted wallets and other ways to gain control of private keys.

https://twitter.com/paulcdwyer/status/1006995025887186945

Other attacks and vulnerabilities include smart contracts, as well as various exploits of blockchain technology itself. Client-side security remains important, and a lot of the attacks are due to human error, especially when it comes to stolen exchange accounts by impersonating a site.

Other threats include requirements to use the private key - a move that should be rare and only performed with verified services. The latest threat has been seen around the EOS voting process, where there are suspicions of tainted third-party voting services.


This article appeared first on Cryptovest

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.