Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/13/2018
05:05 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Blockchain All the Rage But Comes With Numerous Risks

Researchers dig into four types of cyberattacks targeting blockchain, how they work, and why early adopters are the easiest targets.

If you haven't jumped into the blockchain frenzy, chances are you at least know about it. The Internet is flooded with talk about the up-and-coming technology, though little of it mentions security.

But, as with all new technology, security risks can be found beneath the hype. Indeed, threat actors are finding new targets amid the rise of blockchain as they serve up social-engineering attacks, malware, and exploits to businesses and consumers, according to a recently published report by McAfee's Advanced Threat Research Team.

"It's the Wild West," says Raj Samani, chief scientist at McAfee. "You're talking about an industry that's basically worth hundreds of millions of dollars being run by organizations that are, quite frankly, small businesses."

Cryptocurrency is the first and most prominent implementation for blockchain, which was first used for bitcoin in 2009. Since then the technology has skyrocketed, with people across all organizations and industries learning about what it is and how they can use it.  

"One of the reasons [security] hasn't been covered is there's been a lot of movement around blockchain," says Steve Povony, head of advanced threat research at McAfee. "Every major company and industry is buying and implementing some form of blockchain."

The problem, he continues, is a lack of understanding among users. This, combined with blockchain's myriad security complications, has created a rapidly growing technology that's misunderstood from a security perspective. Sure, blockchain is fundamentally secure, but it's also a deregulated, decentralized, and unmanaged platform. The power goes to end users, who are responsible for ensuring transactions are done right.

"We're not seeing new iterations or something fundamentally different about the way blockchain is being attacked and the ways it's being used maliciously," Povony explains. "The same problems that plague us with every security issue are present in blockchain as well."

Cybercriminals Target the Blockchain
However, variations related to blockchain pose new threats. Take "brain wallets," for example, which are designed to help people manage private keys. Brain wallets have keys generated by a word or easy-to-remember seed, which makes them susceptible to attacks.

In most cases, blockchain's consumers are the easiest targets. Researchers attribute this to a "start-up mentality" in which growth often trumps security. In its report, McAfee's team broke blockchain threats into four groups: phishing, malware, implementation exploits, and tech vulnerabilities.

Phishing attacks are the most familiar blockchain threats given their commonality and success rate. Most threat actors don't care who their victims are so long as they pay, and they're not picky about the currency. Attackers also use malware to obtain lesser-known cryptocurrencies, such as Monero and Dash, the latter seen in GandCrab ransomware.

Malware targeting blockchain takes several forms. One is cryptojacking, in which cybercriminals hijack a target browser to mine currency. Malicious coin mining on the endpoint had an "explosive resurgence" in late 2017 and early 2018, McAfee reports, as new miners appeared and old miners were reformatted with mining capabilities. While miners primarily target PCs, they've also been known to hit smartphones.

The third attack vector is blockchain implementation and its supporting tools. These threats are more like exploits of traditional software and Web applications, researchers explain, and attackers are less likely to succeed the closer they get to the blockchain. The threats go back to the root of a common problem: people who use blockchain without understanding it.

"Similar to any complex technology, if the person implementing or using blockchain or cryptocurrency doesn't fundamentally understand the tech, you have inherent weaknesses there," Povony explains. "When you don't think about the details, you end up with a widened attack base."

The last class of attacks is on how blockchain operates. Much of the security focus on blockchain relates to the integrity of the ledger and the tech supporting it. However, it's on users to adopt secure practices for this to work. Researchers cite the example of dictionary attacks, which try to break a victim's password or other means of authentication.

While the blockchain has been well-researched and has potential, you should still approach the technology with caution. Attackers are targeting the blockchain by revamping old threats with a modern twist; as a result, even phishing attacks can compromise blockchain users.

"The key message here is do your due diligence," Samani says. "Yes, there is money to be made, but honestly, with great opportunity comes great risk."

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
StephenGiderson
50%
50%
StephenGiderson,
User Rank: Strategist
7/18/2018 | 11:30:53 PM
hi
There are always going to be risks involving security when the internet is concerned. It is something that we cannot control but could prevent on a certain scale. However, with advances coming from both internal and external influences, this whole situation could become worrying. There are bound to be extreme cases that could lead to dire scenarios which get out of hand. As long as the internet remains at large to be used by just about anybody, the risks shall remain.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15564
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared region with the hypervisor. The region will be map...
CVE-2020-15565
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs....
CVE-2020-15566
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, o...
CVE-2020-15567
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes...
CVE-2020-15563
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM g...