top of page

CYBER & INFOSEC

"blogger, InfoSec specialist, super hero ... and all round good guy" 

DISCUSSIONS, CONCEPTS & TECHNOLOGIES FOR THE WORLD OF

JOIN THE DISCUSSION

If You Invest In Crypto, Your Funds Could Be At Risk from Hackers

Cryptocurrency’s popularity has skyrocketed over the past few years. Many private investors and companies are embracing these assets for their independence and security, but the latter may be misleading. Crypto funds are vulnerable to hackers, too.


Blockchain technology, which cryptocurrency runs on, has many security benefits. These networks’ complexity and near-constant reviewing mean successful hacks against the blockchain itself are unlikely. However, hackers can still steal crypto by other means.


Cryptocurrency Security Issues


Cybercriminals stole $1.9 billion in cryptocurrency in 2020, despite many people thinking crypto is unhackable. Here are a few common ways that hackers can steal cryptocurrency despite its built-in protections.


Hacking Crypto Exchanges and Wallets


While blockchain technology itself is secure, you have to use a crypto exchange to buy and sell cryptocurrency. These exchanges are a favorite target for hackers. Since exchanges serve as an intermediary for crypto transactions, they have access to users’ wallets. Consequently, if a hacker infiltrates the exchange, they could access funds in these wallets.


Investors can move their cryptocurrency to wallets away from these exchanges, but even these are susceptible to hacking. Users need a key to access their wallets, and if that key is not in a secure location, hackers could steal it and unlock their wallets.


MFA Exploits


Multi-factor authentication (MFA) is an essential security feature, but it can also provide a gateway for hackers. Attackers can use SIM swapping, where they impersonate a target and convince telecom companies to give them control of a SIM card, to intercept MFA tokens. Alternatively, they could employ man-in-the-middle attacks to intercept MFA messages and gain account access.


Exploits like these have led to some of the most infamous crypto hacking incidents. In 2021, an MFA bug let threat actors steal cryptocurrency from more than 6,000 users on Coinbase, a major crypto exchange. A similar attack struck Crypto.com later the same year.


Social Engineering


Hackers can also steal cryptocurrency through social engineering techniques. Phishing scams could give attackers phone numbers or the contact information they need to answer security questions to bypass MFA. Fake exchanges, crypto wallets, and investment opportunities are also increasingly common.


Social engineering can also give cybercriminals access to users’ crypto wallets. Once they have login credentials or MFA information, they can access wallet keys to empty them of their cryptocurrency. When that happens, the unchangeable nature of the blockchain makes it difficult to get those funds back.


How to Protect Crypto Investments


These attacks are becoming increasingly threatening as crypto becomes more popular. While Bitcoin has proven to be less resistant to inflation than people originally thought, it’s still growing. As more businesses and individual investors buy more cryptocurrency, crypto hacks will become more popular among cybercriminals.


Thankfully, there are solutions to this problem. Organizations and individuals should verify crypto exchanges’ security before using them. That includes checking for transparency, security certifications, and insurance in case something goes wrong.


It’s also important to store crypto investments away from exchanges and offline. Hardware wallets, small storage devices that hold cryptocurrency offline and behind password protection, help avoid risks related to exchange hacks. Be careful, though, as people have lost roughly $66.5 billion in cryptocurrency by losing these devices or forgetting their PINs.


As in any other cybersecurity endeavor, training is also crucial. Anyone with access to crypto wallets or exchanges should know how to spot and avoid phishing attempts and practice strong password management.


Cryptocurrency Isn’t Immune to Security Risks


Companies and investors should approach cryptocurrency with the same security reservations as anything else. While blockchain technology has substantial security benefits, it’s not a cure-all for hacking.


Understanding how cryptocurrency is vulnerable to hackers is the first step in protecting it. When you

8 comments

8 comentarios


IT in DFW
IT in DFW
29 nov 2024
Me gusta


Titan Link
Titan Link
25 nov 2024

Der 407-BBXZ Dell ist ein 10-Gigabit-Ethernet-Transceiver im SFP+ Formfaktor, der eine zuverlässige und schnelle Netzwerkverbindung bietet. Mit einer Reichweite von bis zu 300 Metern über Kupferkabel eignet sich dieser Transceiver hervorragend für den Einsatz in Rechenzentren und Unternehmensnetzwerken. TitanLink bietet Ihnen den 407-BBXZ Dell für Ihre Netzwerkoptimierung an. Kontaktieren Sie uns noch heute, um mehr zu erfahren und Ihre Netzwerkleistung zu steigern!


Me gusta

Josh Smith
Josh Smith
24 nov 2024

I enjoyed reading this! The article covers some important aspects that often get overlooked. Thanks for shedding light on them in such a clear and concise manner.


Me gusta

Clark benson
Clark benson
03 jun 2024

Peer and Self Assessment Some courses incorporate peer review and self-assessment as part of the evaluation process. Peer assessment involves students evaluating and providing feedback on each other's work, fostering collaboration, critical thinking, and communication skills. Self-assessment encourages students to reflect on their own learning, strengths, weaknesses, and progress.Assessment methods vary based on course objectives, content, teaching philosophy, and learning outcomes. someone write my assignment Professors and teaching assistants may use a combination of these methods to provide a comprehensive evaluation of student performance and provide feedback for improvement

Me gusta
bottom of page