Weaknesses of the blockchain against hacker attacks

The blockchain is inalterable and hacking it is, in general, less feasible and profitable than even try your luck with the SWIFT system, allowing millionaire robberies . A platform that can surpass in security to another of similar importance makes us feel confident about the protection of our cryptocurrencies. The truth is that, outside the blockchain, and as in any currency, whether fiat or not, the chances of theft are unfortunately numerous.

This is perhaps the most popular because it is so easy and profitable. Once the victim is affected, this virus encrypts all the files on the computer and, to return them, requests a rescue in Bitcoin, Litecoin or Monero, which varies according to the hacker’s wishes.

Many typical ransomwares, including, are for sale on the Deep Web, so in reality anyone can buy their own platform to spread it. They have come to request up to 500 thousand dollars in cryptocurrencies for ransom, so this virus is not a joke.

It consists of creating web pages and emails with format, which in many cases also involves stealing their funds. A good example of this occurred at the beginning of this year, when it was circulating – not for the first time – a fake email that allegedly came from the Coinbase exchange house.

Fortunately, to avoid it, just pay attention: the imitations are never quite accurate, there is always something out of place, especially as far as the URL is concerned. When it comes to granting sensitive data, you have to make sure that it is the official URL, with no more or fewer characters.

These are programs that, once installed on the computer, detect the keystrokes and the mouse at the right moment to find out the passwords, although sometimes they are also able to search the information stored on the disk and the browser -as the cache and the portfolios- to achieve it. They are usually acquired through phishing, as we could see in February of this year, when a spam mail began to circulate where a false bank notification is made to the victim with the intention that, by clicking on the link, the keylogger will be downloaded to your computer and find out your credentials.

To combat them, you also have to pay close attention to emails, where they usually arrive. In addition, it is worth changing passwords and credentials with some frequency, even if the change is only one character.
Rats (Remote Acess Trojans)

The remote access Trojans, better known as “rats” for their acronym in English, can be a real nightmare for the victim and a masterpiece for the hacker. If they get installed on a computer, it will literally be as if it had been stolen, since (depending on the type of “rat”) the hacker will be able to control any function remotely, just as if he had the PC in his hands. In this way, you can make a simple joke such as opening and closing the CD port, activate sounds and change screen backgrounds, delete files, send messages, use private accounts, install applications and, of course, steal passwords and use cold wallets without protection. Creepy, is not it?

Again, the most popular distribution method is junk e-mail, so attachments or links that come from unknown e-mails should never be opened. But also the rats also hide in shared files through P2P programs and downloads of non-certified programs. So, for example, in 2013 was running a Windows application called Bitcoin Alarm, which allegedly warned about the changes in the price of cryptocurrencies, but was actually intended to steal the BTCs from the unfortunate people who installed it, as it was a RAT.


Comments are closed.