September 28, 2022

Blockchain hacks will proceed so long as cybercriminals hold simply discovering safety vulnerabilities. Here’s what occurs if safety is missing, says Sumit Siddharth, founding father of the SecOps Group.

With the exponential progress of cryptocurrencies, NFTs and different blockchain implementations, there has by no means been a greater time for a cybercriminal to transform a vulnerability into straightforward and large cash.

Blockchain Hacks and Safety Audits

We see two several types of assaults involving crypto currencies. Certainly one of these is centred across the finish consumer (the sufferer). The assault approach depends on social engineering methods reminiscent of convincing a sufferer to ship cryptocurrency to an attacker’s pockets.

The opposite sort of hack we see is a little more sophisticated and requires a deep understanding of blockchain sensible contracts and related elements, reminiscent of side-chain, cross-chain, wallets, understanding of varied protocols, and extra.

The SecOps Group have now launched a blockchain sensible contract safety audit, to assist blockchain builders determine and patch safety points earlier than they get exploited within the wild.

Blockchain Hacks – The place They Begin

Blockchain is a transaction file database that’s distributed, validated and maintained world wide by a community of computer systems. As a substitute of a single central authority reminiscent of a financial institution, a big neighborhood oversees the data in Blockchain. No particular person individual has management over these data. Blockchain relies on decentralized applied sciences. Collectively these applied sciences perform as a Peer-to-Peer (P2P) community.

See also  Price Prediction for Bitcoin (BTC): Technical Analysis For Newbies

Blockchain know-how is being utilized in many alternative industries. The annual blockchain spending by corporations will attain $16B by 2023, based on latest analysis by CBInsights. The speed of adoption of the know-how is rising.

These days, there are numerous blockchain platforms available in the market. Every platform makes use of its personal know-how. For instance, the Ethereum platform makes use of Solidity language. Hyperledger platform makes use of the Go language. EOS platform makes use of Node.js. Multichain platform makes use of C++. Corda platform makes use of Java/Kotlin language, and so on. Probably the most well-known cryptocurrency Bitcoin (BTC) was developed on the Bitcoin platform. The Ether (ETH) cryptocurrency was developed on the Ethereum platform.

When any of the above is compromised, large hacks may end up.  

Blockchain Hacks of Notice

Solana Wallets Assault – $7 Million – August 03, 2022

Solana is a blockchain-based platform. Many Web3 functions are deployed on the Solana blockchain as it’s cost-effective when it comes to deployment. Just lately a wallet-based hack was noticed within the Solana blockchain.

The basis reason for the breach is unclear, but it surely seems to be resulting from a flaw within the pockets software program used, which resulted within the personal key and/or seed phrase compromise. A non-public secret is distinctive and hyperlinks a consumer to their blockchain tackle. A seed phrase is a fingerprint of all of a consumer’s blockchain property that’s used as a backup if a crypto pockets is misplaced. Greater than 7,000 wallets have been drained of greater than $7m price of SOL tokens.

See also  Blockchain Ticketing Could Have Prevented the Champions League Fake Tickets Fiasco

Axie Infinity Ronin Bridge – $625 Million – March 28, 2022

The most important-ever crypto hack measured in fiat {dollars} got here after hackers gained management over a majority of the cryptographic keys securing the play-to-earn sport’s cross-chain bridge. 4 of the 9 keys had been stolen when an Axie developer clicked on a faux job provide PDF.

Wormhole Cross Chain bridge assault – $325 Million – February 2, 2022

Wormhole is a Ethereum- and Solana-combined blockchain-based Web3 bridge. It makes use of an intermediate bridge to switch tokens between two completely different networks. A blockchain bridge is a protocol connecting two economically and technologically separate blockchains to allow interactions between them.

A hacker exploited sensible contracts on the Solana-to-Ethereum bridge to mint and money out wrapped ether with out depositing collateral. This allowed hackers to steal a complete of $320 million combining Ethereum and Solana tokens. Wormhole renamed its bridge portal and presently holds over $480 million, based on crypto knowledge agency DeFi Llama.

Good Contract Audits

A wise contract audit is an in depth methodical examination and evaluation of a sensible contract’s code which is used to work together with a cryptocurrency or blockchain. This course of is performed to find errors, points and safety vulnerabilities within the code, and recommend enhancements and methods to repair them. Usually, sensible contract audits are vital, as a result of a lot of the contracts cope with monetary property and/or invaluable gadgets.

The safety audit of sensible contracts has develop into necessary at the moment. Hundreds of decentralized finance tasks and NFT tasks have been developed in blockchain know-how aka net 3.0, so securing them is equally necessary as constructing them.

See also  SIMBA Chain Launches SIMBA Blocks to Make Building on Blockchain Easier Than Ever

Concerning the Writer:

Sumit Siddharth is the founding father of the SecOps Group. He’s a serial cyber entrepreneur and a widely known safety skilled. He has been a speaker and coach at many worldwide conferences reminiscent of Black Hat, Defcon, HITB, Owasp Appsec and so on. Throughout his days as a pentester he authored a lot of books, articles, exploits and whitepapers on varied subjects associated to software safety. Sid’s first enterprise (NotSoSecure) was acquired in 2018 by the Claranet Group. He now runs a boutique safety consultancy (pentesting) agency referred to as The SecOps Group. He’s additionally an advisor and angel investor in a number of area of interest cyber safety start-ups reminiscent of Pink Hunt Labs (Assault Floor Administration), PureID (Passwordless Authentication), VulnMachines (free pentesting lab platform) and RankedRight (vulnerability triaging platform).

Acquired one thing to say about blockchain hacks or the rest? Write to us or be part of the dialogue in our Telegram channel. You can even catch us on Tik Tok, Fb, or Twitter.


All the data contained on our web site is revealed in good religion and for basic data functions solely. Any motion the reader takes upon the data discovered on our web site is strictly at their very own danger.