Introduction: When sorting out the security incidents that have occurred in the past two months, the author can't help but think of the early days of the Internet, which also went through a stage of frequent security incidents. Even now, security incidents in the Internet industry have not been completely eliminated. In fact, any new thing will have security risks. After 18 years of madness, blockchain has slowly returned to rationality, and various landing application products are slowly coming out. For emerging industries, experiencing security incidents is essential. Therefore, Cheetah Blockchain Security will continue to review security incidents every month. While doing so, we will also experience growth together with everyone and the entire blockchain industry. January 16, 2019 — ETH Constantinople upgrade postponedBackground According to the plan, the Ethereum community was scheduled to conduct the Constantinople fork at block height 7,080,000, which was approximately January 16, 2019 in China. However, on the eve of the upgrade (January 15), ChainSecurity released potential issues related to the Constantinople upgrade. Out of caution, the Ethereum Foundation decided to postpone the fork. Vulnerability type: Reentrancy vulnerability Incident Process and Safety Analysis
Security Leopard's opinion There is always a certain distance between reality and rationality. A few simple lines of code have slowed down the pace of Ethereum's upgrade. What difficulties will it encounter before fully switching to POS? When will excellent technologies such as sharding and lightning network be available? Before becoming the "world computer", Ethereum still has a long way to go. January 6, 2019 — ETC was 51% attackedBackground As a hard fork product of The Dao incident, it is the second largest forked chain in the world by market value. After the fork, ETC has been using the POW algorithm, but the computing power of the entire network has been at a relatively low level, which led to the ETC main network suffering a 51% double-spending attack on January 6. Loss: Approximately $1.1 million Attack type: 51% attack (double spend) Incident Process and Safety Analysis
Security Leopard's opinion Essentially, there is no way to monitor a 51% attack in advance. To completely prevent a 51% attack, we can only find ways to increase the computing power of the entire network, or simply modify the consensus algorithm. From the perspective of a security company, we can comprehensively judge the possibility of a public chain being 51% at a certain point in time by calculating the cost of purchasing computing power and the tokens that may be obtained from the attack, and then referring to the current coin price. Although it is impossible to completely prevent a 51% attack, once a 51% attack occurs, we can increase the number of confirmed blocks for each transaction and suspend the deposit and withdrawal of this currency to minimize the loss. February 2019 — EOS DAPPs were attacked in large numbersBackground In January 2019, a series of guessing games on the EOS public chain were attacked by a new type of transaction blocking attack. The affected applications include popular DAPPs such as EOS.Win, FarmEOS, Shadow Dice, LuckBet, GameBet, EOSDice, and STACK DICE. Scale of loss: About 20 cases, $5 million Vulnerability type: blocking attack, etc. Incident Process and Safety Analysis
Security Leopard's opinion EOS vulnerabilities frequently occur, many of which are caused by the lack of rigor of developers. According to the author's understanding, many DApps have only 1-2 programmers behind them, and even complete testers do not exist. In this case, the possibility of vulnerabilities is very high, and it is more likely to be attacked. There are not many developers on EOS at present, and even fewer mature developers. However, for a public chain like EOS, this is a stage that must be experienced. Compared with last year, the number of Dapps and users on EOS has increased dramatically. Coupled with the efforts of security companies, the future prospects are still very bright. January 14, 2019 — Cryptopia exchange hackedBackground Cryptopia is a small exchange located in New Zealand, known as C-net in the circle. Its average daily trading volume is about 3 million US dollars, and more than 500 currencies are traded. Loss: About $16 million Vulnerability type: Private key leakage Incident Process and Safety Analysis
Security Leopard's opinion It can be seen that the confusion and casualness of C.com in managing private keys led to the tragedy. This incident once again reminds exchanges and users to be respectful of private key management. Ensuring 100% safe protection of private keys is the most basic rule in the blockchain world. In addition, as we all know, C.com is well-known in the industry for its many currencies. One of the reasons is that listing altcoins on C.com is very simple and crude, and only requires two steps: paying money (BTC) and voting. This has led to low trading volumes for most currencies on C.com, making it a paradise for arbitrageurs. The author believes that this model of listing currencies is very bad, and hereby recommends that exchanges of all sizes must have a process for security audits of projects before listing currencies. This is the most basic and responsible embodiment of user responsibility. Other security incidents of the exchange:
January 2019 – Ryuk ransomware is rampantBackground U.S. cybersecurity firms tracked the notorious ransomware virus, called Ryuk, which spread across the internet by locking up computer files, demanding bitcoins from victims and creating incentives for participants to spread the virus. <Example of Ryuk ransomware> Loss: Approximately $3.7 million Vulnerability type: Ransomware Incident Process and Safety Analysis
Summarize At present, the number of security incidents in the industry has remained high. There are many reasons for this, such as the lack of unified technical standards and specifications in the blockchain industry, and each company has its own infrastructure; developers and users do not have enough security awareness, and both corporate teams and development teams need to strengthen training in this area; finally, there are too few security organizations and professional security talents in the industry. Faced with endless hacker attacks, more security talents are urgently needed. In fact, based on the technical characteristics of blockchain, any developer needs to have a strong sense of security. Starting from the first code, they must be aware of the basic security issues that may be encountered, so that the project can reduce the cost of cognition. |
<<: After “mistakenly receiving” 2,100 Ethereums, will Spark Mining Pool refund or split the funds?
1. Career fortune In physiognomy, if a man has up...
According to reliable sources, mining machine man...
An investigator with India’s Narcotics Control Bu...
On June 6, Salvadoran President Nayib Bukele anno...
Women with small and inverted ears are suitable f...
Jan Bellens, EY Global Banking and Capital Market...
The face of enjoying happiness in old age The par...
Pan-African insurance company Old Mutual has deci...
The facial features of a beautiful but unlucky wo...
A face with dimples on the auricle is a very luck...
From a woman's face, you can tell whether she...
Just as singer Jay Chou sang, "Looking forwa...
Breaking up is something that everyone should hav...
In mole physiognomy, moles in different parts of ...
According to Mr. Whale's Twitter, British ban...