Hacking has made the headlines and been prominent ever since the birth of cryptocurrency. By definition, the same talent and people will want to cause disruption as well as pioneer a new way of society.
AÂ study conducted by the American company Foley & LardnerÂ showedÂ that 71% of large cryptocurrency traders and investors attribute theft of cryptocurrency to the strongest risk that negatively affects the market. 31% reported hackersâ€™ activity threat to the global cryptocurrency industry as very high.
Hacking can be placed in to 3 categories:
- Attacks on the blockchains, cryptocurrency exchanges and ICOs;
- Distribution of software for hidden mining;
- Attacks directed at usersâ€™ wallets.
According toÂ researchÂ conducted by ING Bank NV and Ipsos, about 9% of Europeans and 8% of U.S. residents own cryptocurrencies, with 25% of the population planning to buy digital assets in the near future. Thus, almost a quarter of a billion potential victims could soon fall into the field of hacking activity.
We all have them and we all like and with smartphones, we all need them. Victims of hacking are most often smartphone owners specifically with the Android operating system. Usually, withoutÂ Two Factor Authentication (2FA)Â â€” this requires not only a password and username but also something that user has on them, i.e., a piece of information only they could know or have on hand immediately, such as a physical token.
The reason being is that Google Androidâ€™s open operating system makes it more open to viruses, and therefore less safe than the iPhone, according toÂ Forbes. When the application is launched, the user enters sensitive data to access their accounts and thereby gives hackers access to it.
One of the most famous examples of hacking attacks of this type were traders of the American cryptocurrency exchangeÂ Poloniex, whichÂ downloadedÂ mobile applications posted by hackers on Google Play, pretending to be a mobile gateway for the popular crypto exchange. However, the Poloniex team had not developed applications for Android and didnâ€™t have links to any mobile apps.
Users of iOS devices arenâ€™t immune but are more protected.Â Apple was forced to tighten the rules for admission of applications to its store in order to somehow suspend the distribution of such software. This is a completely different story; the damage from the hacking of wallets is much more severe, this way the miner only slows down the computer operations.
- Only install apps you need and have credible ratings and reviews
- Add two-factor authorization-identification on all apps, on all devices, all the time
- Check all links are genuine
Sites-clones and phishing
The oldest form and around since the “dot-com revolution,” or the dawn of true digital tech. As they say â€śthe old ones are the best.â€ť In the first case, attackers replicate to the near letter, an original website’s domain that is not quite the same. The goal of such a trick â€” including the substitution of the address in the browser address field â€” is to lure a user to the site-clone and force them to enter the account’s password or a secret key.
In the second case, they send an email that â€” by design â€” identically copies the letters of the official project, but â€” in fact â€” aims to force you to click the link and enter your personal data. Itâ€™s been reported that this method has led to $225 millionÂ in cryptocurrency being stolen.
- If something feels wrong or suspicious, close and delete accordingly
- Only interact with a crypto related site with genuine HTPPS protocol
This is probably the most naturally feared type of hacking by the average person. Put in very simple terms, the user’s device reconnects to the same Wi-Fi network of hackers due to a link or false Wi-Fi network choice. All the information downloaded or sent through the network by a user is available to attackers, especially the private keys from crypto wallets amongst other private details such as online banking and email passwords etc. This problem is especially urgent for public Wi-Fi networks at railway stations, airports, hotels and places where large groups of people visit and where a hacker can sit and wait incognito for one unsuspecting victim.
- Never use public Wi-Fi for cryptocurrency transactions, even with VPM
- Update your own router firmware due to consistent manufacture releases
Bots in Slack
Slack has recently been valued at about $5bn so itâ€™s not going anywhere fast. Slack is a corporate messenger application service but since mid-2017, Slack bots have been used for stealing crypto. Typically, hackers create a bot that notifies users about problems with their cryptos causing panic and fear (understandably). The goal is to force a person to click the link and enter a private key and, in the process, takes all details. They are then blocked by users.
The largest successful attack by hackers through Slack is considered to be the Enigma group hack â€“ a rogue Slack bot, defrauded a total ofÂ $500,000Â in Ethereum from unsuspecting users.
- Report suspicious activity and block where appropriate
- Ignore needless, irrelevant activity
- Use anti-virus software or built-in Google safe browsing
Add-ons for crypto trading
- Use a separate browser for crypto activity
- Go incognito on the browser
- Donâ€™t download any add-ons. Ever
- If you can afford it, get a separate device or machine for crypto trading
- Download antivirus and network protection
Authentication by SMS
SMS is probably the most preferred method of authentication because they are used to doing it, its fast, on the mobile and randomised each time its performed. Positive Technologies, a company that specializes in cybersecurity,Â has demonstratedÂ how easy it is to intercept an SMS with a password confirmation, transmitted practically worldwide by the Signaling System 7 (SS7) protocol. During a demonstration using the example ofÂ Coinbase accounts, experts intercepted the message and stolen the relevant data thanks to their own software theyâ€™ve developed. At a glance, this looks like a Coinbase vulnerability, which is partly true but the real weakness is in the cellular system itself. This proved that any system can be accessed directly via SMS, even if 2FA is used its just a matter of having the correct software.
- Turn off call forwarding to deny data access
- Down use two-factor authorisation on the phone, use a software solution
Featured image: Â© metamorworks – stock.adobe.com