The characteristics that make blockchain secure are precisely those that can attract cybercriminals.

  • Decentralisation: Makes transactions difficult to track
    Security: Data is immutable and resistant to alteration. This means that once malicious data has been introduced, it is difficult to delete or modify.
  • Automation: many actions can be programmed, which implies a certain vulnerability to bots programmed by cybercriminals.
  • Anonymity: encourages some users to carry out illegal activities, such as money laundering, ransomware and selling stolen data.

 

Some very specific cyber attacks are also linked to the use of blockchain. Below are a few examples:

51% Attacks

A 51% attack occurs when a group controls more than half the computing power of the blockchain network. This allows them to modify transactions by altering the integrity of the distributed ledger. Although this attack is difficult to carry out for large-scale blockchains such as Bitcoin, it is still possible for smaller, less secure blockchains.

Smart contract scams

Smart contracts, which automate transactions on the blockchain, are vulnerable to coding errors, allowing cybercriminals to exploit loopholes, to siphon funds or change the terms of the contract. A famous example is the hacking of the DAO (Decentralized Autonomous Organization) in 2016, which led to the loss of 3.6 million ethers due to a flaw in the code.

Phishing and the theft of private keysPhishing and the theft of private keys

Blockchain users are often the target of phishing attacks, where hackers are trying to obtain their private keys. Unlike traditional banks, blockchain transactions are irreversible, meaning that stolen funds cannot be recovered. This highlights a fundamental weakness of blockchain: responsibility lies entirely with the users.

Criminal activities facilitated by blockchain

The development of blockchain has indirectly contributed to the emergence of new hacking methods, improving criminal techniques for specific economic offences.

  • Money laundering

Cryptocurrencies make it easier for criminals to launder money by transferring funds anonymously and evading traditional financial regulation. Decentralised platforms, or exchanges, allow hackers to convert their illicit gains into legitimate currencies, making it difficult for the authorities to track transactions.

  • Ransomware and cryptocurrency ransom demands

Ransomware is malicious software that encrypts the victim’s data, requiring payment in cryptocurrency to unlock it. Blockchain offers a level of anonymity that facilitates this type of attack. Notable attacks such as  attacks targeting critical infrastructure in the US in 2021 show the scale of this threat.

  • Black markets on the dark web

Illicit marketplaces on the dark web often use blockchain to conduct cryptocurrency transactions, providing a secure environment for sellers and buyers of illegal items, such as drugs, weapons and hacking software.

Attacks involving blockchain

Mt. Gox was one of the first high-profile cases of an attack involving blockchain. In 2014, this Bitcoin trading platform lost 850,000 bitcoins following a hack, which remains one of the largest in history. The lack of regulation and the vulnerability of the infrastructure allowed hackers to divert funds over a long period of time without being detected.

Poly Network, in August 2021, was the victim of a $600 million hack due to a flaw in its smart contracts. Poly network is a protocol for exchanging one cryptocurrency for another. Just before the attack, Poly Network had transferred around 1 billion in value. The hackers, having detected a weakness in the way the platform managed its cross-chain transactions, were able to transfer funds to addresses controlled by themselves. The pirate returned the funds, the aim of this attack being precisely to demonstrate the vulnerabilities of the system and to warn of the need to improve it.

The authorities‘ and regulators’ responses

Although blockchain is very poorly regulated, a few initiatives are beginning to appear. However, as blockchain is a global technology, regulations need to be standardised and harmonized if they are to be effective. However, there are disparities between countries, particularly in terms of user protection and transaction transparency.

KYC and AML

Exchange platforms are now subject to Know Your Customer (KYC) and Anti-Money Laundering (AML) obligations, to prevent criminals from using blockchain as a tool to hide their funds.

Address blocking

Regulatory authorities are beginning to monitor and block certain addresses associated with criminal activities. In 2020, the United States seized more than $1 billion worth of Bitcoin associated with the Silk Road black market.

Blockchain and antipiracy

In 2021 Microsoft published a research paper in which they wrote that they wanted to use the Ethereum blockchain to create a system to combat the sharing of illegal content on the internet; however, nothing seems to have been put in place yet and the paper describing the process is no longer available.

 

Other initiatives exist in two areas: content monitoring, and the hunt for cybercriminals.

In theory, if the internet were built on blockchain technology, it could become impossible or, at the very least, extremely difficult for pirates to illegally share media content and benefit from it. It would make it possible to store a large amount of information and, in particular, to trace the theoretical use of illegal content, as well as the device on which this content was used.

A South African company, CusosTech, has included a watermark that rewards with cryptocurrency any user who spots an illegal use of content protected by this watermark.

But such initiative remain marginal and are rather unreliable for the moment.

Come back to read us  in December; we will study  a little-known phenomenon: piracy vulnerabilities in electric vehicles. In the meantime, if you have a film, series, software or e-book to protect, don’t hesitate to call on our services by contacting one of our account managers: PDN has been a pioneer in cybersecurity and anti-piracy for over ten years, and we’re bound to have a solution to help you. Happy reading and see you soon!

Share this article