How to Hack a Cryptocurrency

Slides:



Advertisements
Similar presentations
Bitcoin: A New Internet Currency Stephen Clayton Senior Economic Education Specialist Federal Reserve Bank of Dallas The opinions expressed are solely.
Advertisements

Bitcoin: Free Money Roger Ver Blockchain. Bitcoin: Free Money “For the first time in the history of the world, anyone can now send or receive any amount.
BITCOIN Exponential Growth. Good Money “For the first time in the history of the world, anyone can now send or receive any amount of money with anyone.
Digital Currency Kody Myers. Definition Currency that does not exist in any physical form, but can be used similarly to physical currency while retaining.
BITCOIN Exponential Growth. Good Money “For the first time in the history of the world, anyone can now send or receive any amount of money with anyone.
BITCOIN What is bitcoin? Put simply, bitcoin is a digital currency. It can be used to make electronic payments face to face or over the internet just like.
Innovation to Secure Your Financial Transactions….!!!
金融科技與區塊鏈的一些迷思 陳明義 (資策會).
Introduction and Overview of Bitcoin
“Connecting bitcoiners worldwide”
Crypto Mining Presented by: 803Mine.com & TheCryptoMiners.com.
DACs, DAOs, AND DCOs Building on cryptographic technologies, a new generation of radically distributed organizations will take three distinctive forms:
STABILIZING DIGITAL TOKENS’ UNIVERSE
Cryptocurrencies by.
Newer Technologies Fraud
Blockchain Introduction
Bitcoin - a distributed virtual currency system
Where Money and Technology Meet
Cryptocurrencies By Rui Sakurai and Shane Spears
Introduction to Blockchain & Ethereum
Initial Coin Offerings (ICO) Big risks with huge returns
The ICO Challenge IAB Athens – 14/12/17.
Blockchains and Cryptocurrencies: What Financial Planners Need to Know
Market Update September 14, 2017 Travis Liu, Jisoo Kim
A private and secure cryptocurrency for mobile devices
Creating Crypto Community……!
Decentralized financial ecosystem based on Bitshares 2.0
A REVOLUTIONARY BLOCKCHAIN FOR APPS, DAPPS & SMART CONTRACTS
Blockchain Adrian Zaragoza.
Initial Coin Offering By Prof. Jim Liew Founder of SoKat.co
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Trezor Support Phone Number For You!! Round The Clock
Decoding Blockchain and Cryptocurrency
Cost To Develop Blockchain Wallet App?. It is difficult to define the exact price of the Bitcoin wallet application development, however, Here is a cost.
ICO Development Services Company India - Hire Cryptocoin Developers Chennai - Private Blockchain Service Provider India Developer Cryptocurrency.
Crypto currency Wallet Development Company | Hire Crypto coin Developer | Hire Crypto currency Ethereum Token Developer | ICO Smart Contract Development.
Protect crypto exchange website from hackers
Overview ➔ Cryptocurrency Wallet App - One of the most popular Crypto wallet apps in Europe. Cryptocurrency Wallet App ➔ This Wallet app design and developed.
Bugs in the Blockchain and “Contractual” Vulnerability
Rechtsanwältin – Germany Attorney at Law – New York
Data Structures and Analysis (COMP 410)
Blockchain and Cryptocurrencies
Ryan Bitcoin 101 Ryan
BLOCKCHAIN BASICS & LEGAL ISSUES
Blockchain, Cryptocurrencies & ICO’s
Duke University and NBER
Ecological Community in the Green Planet
Campbell R. Harvey Duke University and NBER
Bitcoin: A New Internet Currency
Blockchain Alexander Prenta 9/27/2018.
Campbell R. Harvey Duke University and NBER
Cryptocurrency: Should we invest or not?
Blockchain help. Why Blockchain help? Blockchain help, since its inception, has been providing cutting-edge technology solutions and in-depth domain expertise.
Modernization of. Currency. Evolution Of Currency: Bartering System: Grains and cattle are popular in Barters. Firstly recorded in Egypt. Coinage: Metals.
Money Wealth Income. Fintech Chapter 3: MONEY: A MEDIUM OF EXCHANGE, UNIT OF ACCOUNT AND STORE OF WEALTH.
Introduction to Blockchain
Global Crypto News - Latest Bitcoin & Blockchain News l.
Data Structures and Analysis (COMP 410)
GRIF DEX is an international decentralized exchange, a trading platform where you can buy and sell coins, tokens and fiat currency. An exchange will conform.
Cluster structure of the cryptocurrency market and market risk diversification opportunities of investment portfolio cryptoactives Alexander Maslennikov.
How to describe it to your grandmother!
A PROJECT BY MANDAR PARNERKAR AND VINAYAK MANE
Cryptocurrency Technical Coverage
Accelerating Technology for the Securities Token Revolution
Dr Yannis Pierrakis Small Business Research Centre,
What is a ‘Cryptocurrency’?
Create Crypto Coin. INTRODUCTION The field of cryptocurrencies is ever expanding. Being considered as the contrast of fiat money, cryptocurrency now finds.
Campbell R. Harvey Duke University and NBER
Blockchain Tech Big Picture
Cryptocurrency Zili Zhou.
Presentation transcript:

How to Hack a Cryptocurrency Slide Heading How to Hack a Cryptocurrency Varun Ebenezer, CISA, CBP VP & Senior IT Audit Manager BMO Financial Group

Agenda Slide Heading Why Hack a Cryptocurrency? Cryptocurrency Thefts Hacks of Cryptocurrencies Questions?

Why Hack a Cryptocurrency? Cryptocurrencies are becoming highly lucrative. Total Market Capitalization of all Cryptocurrencies reached $820 billion in January 2018. Nearly 20 unique cryptocurrencies are currently valued at or above $1 billion. Cryptocurrencies are becoming increasingly legitimate. ICOs have raised over $4.5 billion for crypto/blockchain startup funding for period of 2012 through 2018. Financial firms are creating crypto-trading desks, crypto-based products for consumers, and implementing custody solutions to store cryptocurrencies.

As of 8/10/2018 from https://cryptolization.com/

Cryptocurrency Thefts Theft of a cryptocurrency often involves attacking the medium of storage. Similar to robbing a bank, or breaking into a personal safe. The actual cryptocurrencies being stolen are not typically compromised. Online exchanges, online wallets, and desktop wallets are all vulnerable. Safest approach is keeping your private keys offline. Paper wallets are a cost-effective solution. Hardware wallets such as Nano Ledger or Trezor are generally safe. Never use an online exchange for long-term storage.

Hacks of Cryptocurrencies Hacking of a cryptocurrency involves trying to compromise an associated blockchain network, related coding, or defrauding investors. Cryptocurrencies are by design secure. However, there are both technical and non-technical methods by which cryptocurrencies can be exploited. Up to this point there has not been a substantial vulnerability identified within bitcoin’s source code. All altcoins use a modified version of bitcoin’s source code. Examples of altcoins include: Ethereum, Litecoin, and Monero.

51% Attack Attack in which a group of miners controls more than 50% of a blockchain network’s computing power, or mining hash rate. Would create a condition in which new transactions are not verified. Payments between some or all users would be stopped. Would allow the controlling entity to reverse transactions, and therefore “double-spend” coins. Attack involves substantial amounts of investment in mining hardware and proper economic incentives. Smaller market cap coins are at higher risk. A well-known concern since the early days of bitcoin.

51% Attack Examples of 51% Attacks Bitcoin Gold ~ $18 million stolen Approximate market cap at time of attack $700 million Verge ~ $1.7 million stolen Approximate market cap at time of attack $900 million Zencash ~ $500,000 stolen Approximate market cap at time of attack $120 million 51% Attacks are becoming more popular. Malicious actors can leverage rented mining power. Costs of conducting a 51% can be viewed in real-time. https://www.crypto51.app/

Code Attack The Distributed Autonomous Organization (DAO) incident. Built on top of Ethereum’s blockchain. Largest crowdfunding event in history at the time, raised over $150 million from more than 11,000 users. Hacker exposed flaw in the DAO’s source code and stole funds. The DAO contained 15% of all Ethereum in circulation. Vulnerability identified was not in Ethereum’s source code, but was within DAO’s source code. Similar to the relationship between the iOS platform and iOS apps that are built separately,

Code Attacks The Distributed Autonomous Organization (DAO) incident Built on top of Ethereum’s blockchain Largest crowdfunding event in history at the time, raised over $150 million from more than 11,000 users Hacker exposed flaw in the DAO’s source code and stole funds The DAO contained 15% of all ether in circulation “Too big to fail” decision for Ethereum community Vulnerability identified was not in Ethereum’s source code, but was within DAO’s Similar to the relationship between the iOS platform and iOS apps that are built seperately

Defrauding Investors Use of legacy financial schemes that utilize modern technological means. Ponzi schemes, pump and dump operations, vaporware. Leverage mediums that are credible in the cryptocurrency community: Twitter, Reddit, Bitcointalk.org, and Telegram. Exploitation of human nature and behavior. Regulatory scrutiny from the SEC regarding ICO tokens being classified as securities. High-Profile Frauds OneCoin crypto-fund Ponzi scheme moved $350 million. Bitconnect Coin for crypto-backed loans had a market cap of $2.6 billion.

Defrauding Investors Key characteristics of a fraudulent cryptocurrency Whitepaper that is confusing or does not articulate an actual problem that needs solving. Unrealistic or missing milestone roadmap. Nearly instant large social media following (e.g. Twitter). Excessive amounts of positive posts on forum sites (e.g. Reddit, Bitcointalk). Advisors page that contain individuals whose roles are vague or unclear. Guarantees of high return to investors. Empty GitHub repositories.

Defrauding Investors Centra Tech Provided investors the image that they created a cutting- edge cryptocurrency debit card. Raised $32 million during their ICO through thousands of investors. Marketed false claims of partnerships with major credit card companies, such as Visa. Created fake founder biographies. Manipulated the price of the Centra Tech token (CTR). Secured celebrity endorsements from DJ Khaled and Floyd Mayweather, which helped to exponentially raise visibility.

Slide Heading Questions?