Why Your Crypto Coin Is Not as Secure as You Think
Pinterest Stumbleupon Whatsapp
Advertisement

Bitcoin continues to hit new highs. Cryptocurrency newcomer Ethereum threatens to explode into its own bubble What's the Best Computer to Mine Ethereum? What's the Best Computer to Mine Ethereum? Ethereum usurped Bitcoin as the hottest cryptocurrency. Like Bitcoin mining, Ethereum mining is growing in popularity. While devices such as FPGAs and ASICs are viable options, GPUs make fantastic cryptocurrency mining hardware options. Read More . Interest in blockchain, mining, and cryptocurrency is at an all-time high.

So why are cryptocurrency enthusiasts under threat?

Securing Digital Currency

Cryptocurrency is extremely popular. The early rise and boom of Bitcoin piqued interest for casual miners and international investment firms alike. The appeal is clear: a currency with a finite reserve, decentralized, and entirely digital. Cryptocurrencies are easily associated with darknet markets — where they’re put to “good” use — but developers are shrugging that image off. Bitcoin, and the underlying blockchain technology, can do more than line the pockets of drug-dealers.

bitcoin with motherboard
Image Credit: InkedPixels via Shutterstock

But just as fiat currency is liable to theft and fraud, so are cryptocurrencies. And the allure is greater, too.

Thievery in the real, analog world requires direct action: finding a target, making a plan, executing it, hoping authorities don’t notice. Furthermore, there is a significant chance of error, and those errors can result in immediate death (you won’t rob many banks).

Whereas cryptocurrency is faceless. It is an anonymous wallet hash that is suddenly empty. The crime is remote, and the gains are easily tumbled (the digital equivalent of washing the cash). Tracking down stolen cryptocurrency is near impossible. And you have to believe that if someone has the technical nous to hack a website, or use malware to steal a cryptocurrency wallet’s contents, they’re going to know how to cover their digital tracks.

As such, the crimes (e.g. theft, fraud) are the same. But they have different outcomes after the fact.

Only as Strong as Code

The major issue is that cryptocurrency services are only as strong as the code their built upon. Meaning, if there is an obvious vulnerability in a website, you’d better believe someone will take advantage of it.

Case in point: over $30 million in Ethereum disappears because of a coding error. Luckily, a further $75 million was recovered by vigilante white-hat hackers and returned to their rightful owners. This massive theft comes just days after an Israeli startup, CoinDash, had $7 million worth of Ethereum hijacked.

“It is unfortunate for us to announce that we have suffered a hacking attack during our Token Sale event. During the attack, $7 million were stolen by a currently unknown perpetrator. The CoinDash Token Sale secured $6.4 million from our early contributors and whitelist participants and we are grateful for your support and contribution.”

CoinDash pledged to replace the stolen coins. But as Mikko Hypponen of F-Secure states, “If they cash in (and don’t think through how to do it right) they can be found. Not holding my breath.” Confidence in finding stolen cryptocurrency is extremely low throughout the security industry.

How Do They Actually Steal the Coins?

Well, duh, Bitcoins are just 1s and 0s, right? So you find a wallet, press Ctrl + C, and voila! The coins are yours.

Did you fall for it? Stealing cryptocurrency isn’t that easy. If it was, no one would bother mining or holding any coins, period. No, stealing cryptocurrency is a little more sophisticated than that.

Malware

Malware is one of the primary routes for cryptocurrency theft. Attackers use Trojans to infect coin exchanges and other services. Furthermore, there are widespread phishing attempts for Bitcoin and other cryptocurrency credentials. Alternatively, a Trojan infects a regular user, creates a backdoor for a RAT (remote access tool), and an attacker can gain direct wallet access. Then, transferring coins to another address is simple.

Hacking/Vulnerabilities

Unfortunately, specific details of hacks aren’t always available. The public normally just hear “something happened.” For instance, the $30 million Ethereum heist was due to “a vulnerability in Parity Wallet’s variant of the standard multi-sig contract.” The vulnerability allowed any person to call initWallet() and replace the site wallet address with their own. For an ambitious company? Mind-boggling.

Botnet

Security researchers recently found code in the massive Mirai botnet designed to mine Bitcoin using IoT devices. Now, IoT devices are by-and-large extremely low power. It’ll be worthless if you turn your IoT kettle into a miner. However, hook hundreds of thousands of IoT devices up at the same time, and you have a different result. Yet another reason why IoT is a security nightmare Why The Internet of Things Is The Biggest Security Nightmare Why The Internet of Things Is The Biggest Security Nightmare One day, you arrive home from work to discover that your cloud-enabled home security system has been breached. How could this happen? With Internet of Things (IoT), you could find out the hard way. Read More .

Scams

As well as the massive amount of phishing for credentials, there are numerous scams designed to defraud cryptocurrency users. And they’re extremely similar to their offline counterparts. Classic Ponzi schemes, trust scams, con men, non-existent cloud mining schemes… the list is massive, and continues to grow.

“The company seems to have targeted a global category of aspirational investors who noticed the breathless coverage and booming valuations of cryptocurrencies and blockchain companies, but weren’t savvy enough to understand the difference between the real thing and a sham.”

How Do I Stay Safe?

Staying safe with cryptocurrency isn’t that difficult. As with all new and evolving technologies, it is about education. Cryptocurrencies are constantly evolving. New currencies appear. Older seemingly stable currencies die. And, at times, someone will disappear with $450 million in Bitcoin. Does The Fall Of Mt. Gox Mark The Beginning Of The End For Bitcoin? [MUO Debates] Does The Fall Of Mt. Gox Mark The Beginning Of The End For Bitcoin? [MUO Debates] Does 2014 mark the beginning of the end for Bitcoin?Or, is this only a bump in the road along the evolution of this new form of currency? MakeUseOf.com debates. Read More

bitcoin with dollar
Image Credit: Lightboxx via Shutterstock

Furthermore, popularity encourages newcomers, of all technical abilities. It is easy to become a victim in a marketplace where you see nobody, numbers and currency are never physical, and the technology is evolving.

That said, the majority of cryptocurrency users have an excellent time. More people are mining than ever How to Build an Energy-Efficient Ethereum Mining Rig How to Build an Energy-Efficient Ethereum Mining Rig Ethereum is an up and coming cryptocurrency. In this article, we cover everything you need to know to build you own mining rig. Read More (hence the ridiculous prices for GPUs at the moment With GPUs Skyrocketing in Price, Should You Buy a Graphics Card? With GPUs Skyrocketing in Price, Should You Buy a Graphics Card? Because of cryptocurrency mining popularity, the demand for graphics cards (GPUs) skyrocketed. Find out if you should buy a graphics card or not, and what the best alternatives are! Read More ), and new crypto-services are appearing all the time. Let alone those services using blockchain technology How Bitcoin's Blockchain Is Making the World More Secure How Bitcoin's Blockchain Is Making the World More Secure Bitcoin's greatest legacy will always be its blockchain, and this magnificent piece of technology is set to revolutionize the world in ways we always thought improbable... until now. Read More .

Break It Down

Staying safe means considering a few different aspects of the cryptocurrency process.

  • Computer security — You need to keep your computer updated. It needs antivirus and anti-malware software. Those programs must remain updated.
  • Operational security — Strong, single-use passwords are a must. Many sites and services offer two-factor authentication What Is Two-Factor Authentication, And Why You Should Use It What Is Two-Factor Authentication, And Why You Should Use It Two-factor authentication (2FA) is a security method that requires two different ways of proving your identity. It is commonly used in everyday life. For example paying with a credit card not only requires the card,... Read More so use it! Create secure, offline backups of your crypto-credentials. Buy a logless VPN 6 Logless VPNs That Take Your Privacy Seriously 6 Logless VPNs That Take Your Privacy Seriously In an age where every online movement is tracked and logged, a VPN seems a logical choice. We've taken a look at six VPNs that take your anonymity seriously. Read More , use that at home and in public. Seriously consider encrypting your technology.
  • Cold storage — Keeping your cryptocurrency all in one place, and always online, is probably not a good idea (given that it can be stolen, or worse, “misplaced”). Cold storage refers to keeping your cryptocurrency reserve offline.
  • Exchanges — Tying into cold storage is the next tip: don’t leave assets on an exchange. It might make things slightly easier, but you’re potentially setting yourself up for a big loss.
  • Wallet — Use a cryptocurrency wallet that you hold both the public and private keys for. If a third-party has access to your private key, it is a potential vulnerability.
  • Triple-check — Before you send cryptocurrency to an address, make sure it is the right one. I know, I know, sounds simple. But once that transaction is complete, there is no getting the currency back if you realize it is the wrong address.
  • Research — Too good to be true? It probably is. Stop, search, read, and think before parting with your cryptocurrency.

Reality Check

Bitcoin, LiteCoin, Ethereum, and other popular cryptocurrencies are an exciting development in privacy, security, freedom, and currency. There are always setbacks with new technologies, and new ventures, too.

People get robbed every day. Bankers commit billions of dollars of fraud, and governments play fast and loose with gold reserves and more. The point being, we still use money, because it has value. Cryptocurrencies have value… and we’ll see how that value grows over time.

Do you have any cryptocurrency storage tips? What about any scams or tricks you’ve spotted? Let us know in the comments below!

Image Credits: tommaso79/Shutterstock

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. BILL
    December 8, 2017 at 5:43 am

    Crypto bullshit with great risks.