Ga naar de inhoud

Blockchain News Feed

All the latest news on Blockchain & Cryptocurrencies

Menu
  • Home
  • News
  • Exchanges
  • Market Analysis
  • YouTube
  • Brave Browser
Menu

Why Does Your Crypto Project Need a Controlled Hack?

Geplaatst op september 29, 2018 door Blockchain News

Running your crypto project or ICO? Be prepared in advance that your startup may not only attract investors but also hunters for their money and data. According to the Ernst and Young report, which analyzed more than 370 tokens sales, every tenth dollar earned or invested in ICOs becomes prey to hackers. The authors also point to even more significant losses of crypto exchanges, which are deprived of two million dollars every month due to hacker attacks.

In addition, you can become a victim of DDoS-attack, extortion, phishing attack or malicious program due to vulnerabilities that you did not even suspect, neglecting the security audit. Meanwhile, your colleagues and competitors are already set for spend the budget on an independent security assessment.

The weak protection of projects – especially ones originating from the CIS and Asia – provoked a downturn in the market, says Dmitry Budorin, CEO of Hacken and HackIT 4.0, the annual forum on cybersecurity held in Ukraine.

Millions stolen

Apart from the sensational collapse of The DAO in 2016, when a promising project lost $ 60 mln, there’s a mass of less memorable attacks, in which millions were also stolen.

In 2017, a New York-based blockchain startup Veritaseum (p2p-platform, focused on financial markets) lost more than $8 million, which were injected by investors during the ICO. An unknown attacker (or group) stole tokens and immediately managed to sell them. Fortunately for investors, the tokens belonged to the project, so none of the users suffered financial losses.

In the same year, KICKICO platform underwent DDoS attacks twice while conducting its pre-sale. The website received a lot of requests which it couldn’t cope with and was forced to suspend service to all users. Later, the KICKICO team received a letter from the scammers with a proposal to provide security against similar DDoS-attacks. However, the developers connected a service that protected the site.

Later, in July 2018, hackers gained direct access to KickCoin smart contracts and took possession of 40 accounts, destroying them and creating 40 identical accounts. The platform’s team didn’t know about the breach until several victims turned to complaints. Users discovered the loss of tokens totaling $ 800,000 in their wallets.

“To prevent such situations, which puts the reputation of your project at stake, it’s worth to spend on assessing security and implementing compensation measures than to lose reputation or even business in the future”, Dmitry says.

An independent audit by specialists is much preferable to self-testing, at least when it comes to the application and infrastructure pen test, the social and technical testing of the development team. But ideally, those going to launch their product have to use the bug bounty and vulnerability reward platform.

Typically, the security assessment consists of:

  • collecting information: obtaining data from the client or other open resources,
  • use of the threat model – a plan for entering the system,
  • performing the manual and automatic analysis to identify vulnerabilities,
  • exploiting vulnerabilities to understand how the attackers can use them and whether they are able to damage the system and the company as a whole.

Consequently, a report should appear, where all actions at each stage are documented, as well as recommendations for eliminating the vulnerabilities.

In accordance with safety assessment standards, the auditor must validate the source code of the contract, confirm that it operates in accordance with the specified public specification and confirm that there are no errors and “backdoor” for the developer.

“Today, after experiencing the consequences of the Wild West in crypto, many projects understand the need for an audit. A project dealing with their security in the long term can already be considered half-valid”, Dmitry adds.

In order to better understand the weaknesses of your project, arrange its “white” hack. The closest opportunity to look at how controlled hacking of crypto projects takes place is HackIT cybersecurity forum which will be held from October 8 to 11 in Kiev. In addition to the two-day conference and exhibition area, the program includes CTF (Capture the Flag) competition and the guided tour to the Chernobyl nuclear power plant to illustrate the consequences of man-made disasters.

 

The post Why Does Your Crypto Project Need a Controlled Hack? appeared first on NewsBTC.


Source: News BTC
Original Post: Why Does Your Crypto Project Need a Controlled Hack?

Ledger Nano X - The secure hardware wallet

Recente berichten

  • Midnight Goes Live As Cardano Founder Targets A $10 Billion Ecosystem
  • Syz Bank Deepens Strategic Collaboration With Taurus to Expand Crypto Services
  • Silk Road-linked Bitcoin wallets move $3M to new address
  • Key Bitcoin price levels to watch ahead of 2025’s last FOMC meeting
  • Binance co-CEO Yi He hit by WeChat hack amid growing Web2 risks for crypto execs

Categorieën

  • Altcoin Buzz
  • Altcoin Buzz News
  • AMBcrypto
  • Bitcoin.com
  • Bitcoinist
  • BTC Manager
  • CCN
  • Coin Mastery
  • Coindesk
  • Coinpower News
  • Cointelegraph
  • CryproSlate
  • Crypto Daily
  • Crypto News (.net)
  • Cryptocoin News
  • Cryptocurrency News
  • CryptoDaily.co.uk
  • CryptoPotato
  • CryptosRUs
  • Daily HODL
  • DataDash
  • Ethereum Worldnews
  • Exchanges
  • ICO's
  • Invest in Blockchain
  • Market Analysis
  • News
  • News BTC
  • Newsbit
  • Portfolio
  • Pricecheck
  • Ready Set Crypto
  • The Modern Investor
  • ToshiTimes
  • Use The Bitcoin

Archieven

  • december 2025
  • november 2025
  • oktober 2025
  • september 2025
  • augustus 2025
  • juli 2025
  • juni 2025
  • mei 2025
  • april 2025
  • maart 2025
  • februari 2025
  • januari 2025
  • december 2024
  • november 2024
  • oktober 2024
  • september 2024
  • augustus 2024
  • juli 2024
  • juni 2024
  • mei 2024
  • april 2024
  • maart 2024
  • februari 2024
  • januari 2024
  • december 2023
  • november 2023
  • oktober 2023
  • september 2023
  • augustus 2023
  • juli 2023
  • juni 2023
  • mei 2023
  • april 2023
  • maart 2023
  • februari 2023
  • januari 2023
  • december 2022
  • november 2022
  • oktober 2022
  • september 2022
  • augustus 2022
  • juli 2022
  • juni 2022
  • mei 2022
  • april 2022
  • maart 2022
  • februari 2022
  • januari 2022
  • december 2021
  • november 2021
  • oktober 2021
  • september 2021
  • augustus 2021
  • juli 2021
  • juni 2021
  • mei 2021
  • april 2021
  • maart 2021
  • februari 2021
  • januari 2021
  • december 2020
  • november 2020
  • oktober 2020
  • september 2020
  • augustus 2020
  • juli 2020
  • juni 2020
  • mei 2020
  • april 2020
  • maart 2020
  • februari 2020
  • januari 2020
  • december 2019
  • november 2019
  • oktober 2019
  • september 2019
  • augustus 2019
  • juli 2019
  • juni 2019
  • mei 2019
  • april 2019
  • maart 2019
  • februari 2019
  • januari 2019
  • december 2018
  • november 2018
  • oktober 2018
  • september 2018
  • augustus 2018
  • juli 2018
  • juni 2018
  • mei 2018
  • april 2018
  • maart 2018
  • februari 2018
  • januari 2018
  • december 2017
  • november 2017
  • oktober 2017
  • september 2017
  • maart 2017
  • juni 2016
  • juli 2014
  • september 2013
  • augustus 2013
©J Blockchain News Feed | Ontwerp: Krant WordPress thema