Latest three Most Frequent Methods Hacking Bitcoin (BTC) and Crypto Platforms.

in #btc4 years ago

If the blockchain allows for the disintermediation of transactions, why do we need crypto-exchanges? I was asked this glue: I think it is better to review the definition of the terms "without intermediaries" and perhaps to evolve the model of crypto-exchanges. They are no more reliable than a bank - what? It's true! So think twice before you give the key to your wallets.

Hack  btc methods.PNG

Vulnerable exchanges: is that news?
The Black Hat Security conference brings together professionals working in the field of computer security.
This year, researchers revealed that exchanges are vulnerable to hackers, despite the level of security available to protect their users' funds.

The cryptographer and co-founder of the Taurus Group, Jean-Philippe Aumasson, and the co-founder of ZenGo, Omer Shlomovits, classify these attacks into three categories. According to them, these attacks relate specifically to exchanges where there is a system for distributing keys between several parties.

Exchange piracy: a 3-part
The first type of attack involves hackers using an insider, a person who works within the exchange, to exploit an existing vulnerability in an open-source library.

The two men revealed that they had encountered this problem on a known exchange but did not disclose the name of the latter.

The exchange would have corrected the vulnerability but since this bug concerns an open-source library, it is possible that other exchanges still use it without knowing the risk.

The second type of attack involves exploiting a flaw in the key refresh process: hackers can compromise the validation process, which then allows them to extract users' private keys.

The last possible type of attack can occur when trusted parts generate portions of the key that will then be tested publicly.

The two researchers reported that Binance, for example, did not audit these random numbers in March 2020. However, the exchange has taken the necessary steps to resolve this bug.

An armored platform, flawless: HACKERS OUT! It's possible? Should we just say that hacks are part of the game? Good security practices are changing, but hacking strategies are evolving even faster. The bad guys are smarter: it can cause a hives attack in some people but for now, it's the sad reality.