ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

Latest Paper from Cloud Security Alliance Examines Top 10 Blockchain Attacks, Vulnerabilities, and Weaknesses

ⓘ This article is third-party content and does not represent the views of this site. We make no guarantees regarding its accuracy or completeness.

In the last five years, 43 exchanges have been publicly hacked, and more than 49 Decentralized Finance protocols have been exploited, resulting in a loss of more than $2.8 billion

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released Top 10 Blockchain Attacks, Vulnerabilities, and Weaknesses, the latest research from the CSA Blockchain/Distributed Ledger working group. The report offers a high-level overview of the top 10 attack vectors targeting cryptocurrency and distributed ledger technology (DLT), namely exchange hacks, Decentralized Finance (DeFi) hacks, 51% attacks, phishing (for private keys), rug pull/exit scams, ransomware, SIM swaps, investment scams, high-profile doubler scams, and extortion. Illustrative examples are provided for each vector, along with an overview of the costly lessons that can result.

As the authors note, unaudited smart contracts and lapses in security protocols can result in major losses for centralized and decentralized exchanges. In the last five years, for example, 43 exchanges have been publicly hacked, and more than 49 DeFi protocols have been exploited, resulting in a loss of more than $2.8 billion. The paper aims to educate everyone from developers to compliance officers and day-to-day cryptocurrency users so that they might avoid the same pitfalls.

“There is a strong misconception that the immutable nature of DLT systems makes them inherently secure. The reality, however, is that cryptocurrencies and the ecosystem of platforms that enable their usage have been the target of attacks since the inception of bitcoin over 12 years ago. As centralized exchanges have hardened their cloud security controls, attackers have pivoted to target the human users with social engineering attacks and confidence schemes. Fortunately, because of the open nature of most blockchains, blockchain analytics tools provide unprecedented capabilities to trace virtual assets in order to investigate crypto crimes, seize assets, and prosecute bad actors,” said Bill Izzo, co-chair of the Blockchain/DLT Working Group and a contributor to the paper.

There are a broad range of attack vectors targeting blockchain applications, targeting anything from cryptographic primitives to consensus mechanism vulnerabilities or smart contract exploits. Nascent crypto companies with inadequate security protocols can suffer unrecoverable losses if administrators with access to hot and cold wallet storage fall victims to any of these attack vectors. Additionally, unaudited smart contracts and lapses in security protocols can result in major losses for centralized and decentralized exchanges.

“People new to the space can also easily fall victim to common scams and extortion techniques. Phishing attacks will continue to target the human element behind DLT systems, resulting in anything from centralized exchange hacks to loss of personal private keys. With the proper security training as outlined in this document, many of these attacks can be prevented,” said Dave Jevans, CEO of CipherTrace and a contributor to the paper.

The Blockchain/Distributed Ledger Working Group strives to produce useful content to educate different industries on blockchain and its proper use, as well as define blockchain security and compliance requirements based upon different industries and use cases. Individuals interested in becoming involved in Blockchain/Distributed Ledger future research and initiatives are invited to join the working group.

Download the complete report.

About Cloud Security Alliance

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.

Contacts

Report this content

If you believe this article contains misleading, harmful, or spam content, please let us know.

Report this article

Recent Quotes

View More
Symbol Price Change (%)
AMZN  248.28
+0.00 (0.00%)
AAPL  273.05
+0.00 (0.00%)
AMD  274.95
+0.00 (0.00%)
BAC  53.95
+0.00 (0.00%)
GOOG  335.40
+0.00 (0.00%)
META  670.91
+0.00 (0.00%)
MSFT  418.07
+0.00 (0.00%)
NVDA  202.06
+0.00 (0.00%)
ORCL  177.58
+0.00 (0.00%)
TSLA  392.50
+0.00 (0.00%)
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.