Once Hailed as Unhackable, Blockchains are now Getting Hacked #Talpiot #bitcoin #technology

in #bitcoin5 years ago

bitcoinethereumhacked.png

More and more security holes are appearing in cryptocurrency and smart contract platforms, and some are fundamental to the way they were built.


February 19, 2019

by Mike Orcutt

Early last month, the security team at Coinbase noticed something strange going on in Ethereum Classic, one of the cryptocurrencies people can buy and sell using Coinbase’s popular exchange platform. Its blockchain, the history of all its transactions, was under attack.

An attacker had somehow gained control of more than half of the network’s computing power and was using it to rewrite the transaction history. That made it possible to spend the same cryptocurrency more than once—known as “double spends.” The attacker was spotted pulling this off to the tune of $1.1 million. Coinbase claims that no currency was actually stolen from any of its accounts. But a second popular exchange, Gate.io, has admitted it wasn’t so lucky, losing around $200,000 to the attacker (who, strangely, returned half of it days later).

Just a year ago, this nightmare scenario was mostly theoretical. But the so-called 51% attack against Ethereum Classic was just the latest in a series of recent attacks on blockchains that have heightened the stakes for the nascent industry.

In total, hackers have stolen nearly $2 billion worth of cryptocurrency since the beginning of 2017, mostly from exchanges, and that’s just what has been revealed publicly. These are not just opportunistic lone attackers, either. Sophisticated cybercrime organizations are now doing it too: analytics firm Chainalysis recently said that just two groups, both of which are apparently still active, may have stolen a combined $1 billion from exchanges.

We shouldn’t be surprised. Blockchains are particularly attractive to thieves because fraudulent transactions can’t be reversed as they often can be in the traditional financial system. Besides that, we’ve long known that just as blockchains have unique security features, they have unique vulnerabilities. Marketing slogans and headlines that called the technology “unhackable” were dead wrong.

That’s been understood, at least in theory, since Bitcoin emerged a decade ago. But in the past year, amidst a Cambrian explosion of new cryptocurrency projects, we’ve started to see what this means in practice—and what these inherent weaknesses could mean for the future of blockchains and digital assets.

How do you hack a blockchain?

Before we go any further, let’s get a few terms straight.

A blockchain is a cryptographic database maintained by a network of computers, each of which stores a copy of the most up-to-date version. A blockchain protocol is a set of rules that dictate how the computers in the network, called nodes, should verify new transactions and add them to the database. The protocol employs cryptography, game theory, and economics to create incentives for the nodes to work toward securing the network instead of attacking it for personal gain. If set up correctly, this system can make it extremely difficult and expensive to add false transactions but relatively easy to verify valid ones.

That’s what’s made the technology so appealing to many industries, beginning with finance. Soon-to-launch services from big-name institutions like Fidelity Investments and Intercontinental Exchange, the owner of the New York Stock Exchange, will start to enmesh blockchains in the existing financial system. Even central banks are now looking into using them for new digital forms of national currency.

But the more complex a blockchain system is, the more ways there are to make mistakes while setting it up. Earlier this month, the company in charge of Zcash—a cryptocurrency that uses extremely complicated math to let users transact in private—revealed that it had secretly fixed a “subtle cryptographic flaw” accidentally baked into the protocol. An attacker could have exploited it to make unlimited counterfeit Zcash. Fortunately, no one seems to have actually done that.

The protocol isn’t the only thing that has to be secure. To trade cryptocurrency on your own, or run a node, you have to run a software client, which can also contain vulnerabilities. In September, developers of Bitcoin’s main client, called Bitcoin Core, had to scramble to fix a bug (also in secret) that could have let attackers mint more bitcoins than the system is supposed to allow.

Still, most of the recent headline-grabbing hacks weren’t attacks on the blockchains themselves, but on exchanges, the websites where people can buy, trade, and hold cryptocurrencies. And many of those heists could be blamed on poor basic security practices. That changed in January with the 51% attack against Ethereum Classic.

The 51% rule

Susceptibility to 51% attacks is inherent to most cryptocurrencies. That’s because most are based on blockchains that use proof of work as their protocol for verifying transactions. In this process, also known as mining, nodes spend vast amounts of computing power to prove themselves trustworthy enough to add information about new transactions to the database. A miner who somehow gains control of a majority of the network's mining power can defraud other users by sending them payments and then creating an alternative version of the blockchain in which the payments never happened. This new version is called a fork. The attacker, who controls most of the mining power, can make the fork the authoritative version of the chain and proceed to spend the same cryptocurrency again.

For popular blockchains, attempting this sort of heist is likely to be extremely expensive. According to the website Crypto51, renting enough mining power to attack Bitcoin would currently cost more than $260,000 per hour. But it gets much cheaper quickly as you move down the list of the more than 1,500 cryptocurrencies out there. Slumping coin prices make it even less expensive, since they cause miners to turn off their machines, leaving networks with less protection.

Toward the middle of 2018, attackers began springing 51% attacks on a series of relatively small, lightly traded coins including Verge, Monacoin, and Bitcoin Gold, stealing an estimated $20 million in total. In the fall, hackers stole around $100,000 using a series of attacks on a currency called Vertcoin. The hit against Ethereum Classic, which netted more than $1 million, was the first against a top-20 currency.

David Vorick, cofounder of the blockchain-based file storage platform Sia, predicts that 51% attacks will continue to grow in frequency and severity, and that exchanges will take the brunt of the damage caused by double-spends. One thing driving this trend, he says, has been the rise of so-called hashrate marketplaces, which attackers can use to rent computing power for attacks. “Exchanges will ultimately need to be much more restrictive when selecting which cryptocurrencies to support,” Vorick wrote after the Ethereum Classic hack.

A whole new can of worms bugs

Aside from 51% attacks, there is whole new level of blockchain security weaknesses whose implications researchers are just beginning to explore: smart-contract bugs. Coincidentally, Ethereum Classic—specifically, the story behind its origin—is a good starting point for understanding them, too.

A smart contract is a computer program that runs on a blockchain network. It can be used to automate the movement of cryptocurrency according to prescribed rules and conditions. This has many potential uses, such as facilitating real legal contracts or complicated financial transactions. Another use—the case of interest here—is to create a voting mechanism by which all the investors in a venture capital fund can collectively decide how to allocate the money.

Just such a fund, called the Decentralized Autonomous Organization (DAO), was set up in 2016 using the blockchain system called Ethereum. Shortly thereafter, an attacker stole more than $60 million worth of cryptocurrency by exploiting an unforeseen flaw in a smart contract that governed the DAO. In essence, the flaw allowed the hacker to keep requesting money from accounts without the system registering that the money had already been withdrawn.

As the hack illustrated, a bug in a live smart contract can create a unique sort of emergency. In traditional software, a bug can be fixed with a patch. In the blockchain world, it’s not so simple. Because transactions on a blockchain cannot be undone, deploying a smart contract is a bit like launching a rocket, says Petar Tsankov, a research scientist at ETH Zurich and cofounder of a smart-contract security startup called ChainSecurity. “The software cannot make a mistake.”

There are fixes, of a sort. Though they can’t be patched, some contracts can be “upgraded” by deploying additional smart contracts to interact with them. Developers can also build centralized kill switches into a network to stop all activity once a hack is detected. But for users whose money has already been stolen, it will be too late.

The only way to retrieve the money is, effectively, to rewrite history—to go back to the point on the blockchain before the attack happened, create a fork to a new blockchain, and have everyone on the network agree to use that one instead. That’s what Ethereum’s developers chose to do. Most, but not all, of the community switched to the new chain, which we now know as Ethereum. A smaller group of holdouts stuck with the original chain, which became Ethereum Classic.

Last month, Tsankov’s team at ChainSecurity saved Ethereum from a possible repeat of the DAO catastrophe. Just a day before a major planned software upgrade, the company told Ethereum’s lead developers that it would have the unintended consequence of leaving some contracts on the blockchain newly vulnerable to the same kind of bug that led to the DAO hack. The developers promptly postponed the upgrade and will give it another go later this month.

Nevertheless, hundreds of valuable Ethereum smart contracts were already vulnerable to this so-called reentrancy bug, according to Victor Fang, cofounder and CEO of blockchain security firm AnChain.ai. Tens of thousands of contracts may contain some other kind of vulnerability, according to research conducted last year. And the very nature of public blockchains means that if a smart-contract bug exists, hackers will find it, since the source code is often visible on the blockchain. “This is very different than traditional cybersecurity,” says Fang, who previously worked for the cybersecurity firm FireEye.

Buggy contracts, especially those holding thousands or millions of dollars, have attracted hackers just as advanced as the kind who attack banks or governments. In August, AnChain identified five Ethereum addresses behind an extremely sophisticated attack that exploited a contract flaw in a popular gambling game to steal $4 million.

Can the hackers be defeated?

AnChain.ai is one of several recent startups created to address the blockchain hacking threat. It uses artificial intelligence to monitor transactions and detect suspicious activity, and it can scan smart-contract code for known vulnerabilities.

Other companies, including Tsankov’s ChainSecurity, are developing auditing services based on an established computer science technique called formal verification. The goal is to prove mathematically that a contract’s code will actually do what its creators intended. These auditing tools, which have begun to emerge in the past year or so, have allowed smart-contract creators to eliminate many of the bugs that had been “low-hanging fruit,” says Tsankov. But the process can be expensive and time consuming.

It may also be possible to use additional smart contracts to set up blockchain-based “bug bounties.” These would encourage people to report flaws in return for a cryptocurrency reward, says Philip Daian, a researcher at Cornell University’s Initiative for Cryptocurrencies and Contracts.

But making sure code is clean will only go so far. A blockchain, after all, is a complex economic system that depends on the unpredictable behavior of humans, and people will always be angling for new ways to game it. Daian and his colleagues have shown how attackers have already figured out how to profit by gaming popular Ethereum smart contracts, for instance.

In short, while blockchain technology has been long touted for its security, under certain conditions it can be quite vulnerable. Sometimes shoddy execution can be blamed, or unintentional software bugs. Other times it’s more of a gray area—the complicated result of interactions between the code, the economics of the blockchain, and human greed. That’s been known in theory since the technology’s beginning. Now that so many blockchains are out in the world, we are learning what it actually means—often the hard way.

Source: https://www.technologyreview.com/s/612974/once-hailed-as-unhackable-blockchains-are-now-getting-hacked/

What is not mentioned in the above article, is Israel's Talpiot program and Unit 8200. Israel and its high technology firms have been designing and developing hardware and software with back doors.


For more information on Israel's Talpiot spying and information/technology theft program please visit: ISRAEL – THE GREATEST SPY MACHINE OF ALL TIME #OperationTalpiot #TalpiotFlyer

Prime Minister Benjamin Netanyahu site next to Bill Gates at the World Economic Forum in Davos, Switzerland, January 23, 2014. (Kobi Gideon/GPO/Flash 90)

Bill Gates: Israeli tech ‘changing the world’


In video call to Microsoft Israel’s annual big bash, co-founder says he’s ‘very impressed’ with Israel’s R&D


February 25, 2016

by David Shamah

A special guest virtually joined over 2,000 people at the Microsoft Israel R&D Center’s annual Think Next event in Tel Aviv Thursday – the man who started it all, Bill Gates.

In a rare public comment on the value of MS Israel’s work in helping make the company what it is, Gates said that Israeli developments tech areas like analytics and security were “improving the world.”

This year marked the eighth Think Next event, where MS shows off its best and brightest new technologies, many developed in Israel. Gates doesn’t call in every year, but with this year being the 25th anniversary of the Microsoft Israel research and development center, he told the Tel Aviv audience in a video call from the US that he was “very happy to wish the R&D center a happy birthday.”

The center, he said, “started in 1991, when some of the Israeli engineers at Microsoft wanted to return home but continue working at Microsoft. We decided to open the center – it was our first one outside the US – and I think the technology they have produced over the years more than justifies our decision.”

Speaking live at the event was current Microsoft CEO Satya Nadella. Nadella met Prime Minister Benjamin Netanyahu earlier Thursday to discuss cyber-security and other matters. In their meeting, Nadella noted Microsoft’s commitment to Israel, “its investments in the local market and its commitment to the continued growth of the high-tech and innovation industry in Israel which finds expression in assistance programs for start-ups, introducing advanced technologies to all sectors of the economy, promoting science and technology, and education in computers and mathematics,” the Prime Minister’s Office said.

According to Yoram Yaacovi, general manager of Microsoft Israel’s R&D Center, “the Think Next Conference reflects the ability of creative technologies to reinvent entire industries, including: health, agriculture, communications and transportation. The new experiences offered to users are a tremendous springboard for businesses and is changing the economy and the lives of millions. We are proud to provide a stage for startups that show exceptional creativity in these and other fields. Since the R&D center was established 25 years ago we have managed to generate unique creative value for the company – as shown by innovative projects that will be presented today at the event.”

Think Next itself was one of those projects exported by Microsoft Israel. First organized in Israel, the tech showcase is now duplicated by the company in India, China and the US. This event is held in the framework of Microsoft’s efforts to promote high-tech in Israel, and especially in the start-up sector, where Microsoft holds various promotion and cooperation activities with some 1,000 startups.

One thing that Microsoft is very proud of, said Zack Weisfeld, who heads Microsoft Ventures, the company’s start-up accelerator, is “that in four years we have built Ventures into the world’s biggest and most successful corporate accelerator. Since we started the program in Israel in 2012, Microsoft has opened six additional Ventures Accelerators around the world.”

Prime Minister Benjamin Netanyahu (L) meets with Microsoft CEO Satya Nadella, February 25, 2016. (Amos Ben Gershom/GPO)

“Worldwide we have had 454 graduates, who have raised $1.78 billion,” he said at a gala event Thursday in Tel Aviv, celebrating the seventh graduating class of the local Ventures Accelerator program. “We’ve had 29 exits and 3 IPOs, and on average companies that graduated from the program received $4.9 million in funding in the first year after they graduate from the accelerator. That’s enough to make us the number one corporate accelerator in the world.”

While Microsoft is known for many things, it is best known for Windows – and for years, rumors have swirled for years that major parts of the operating system were developed in Israel, something the company has confirmed although it has never specified just which components of Windows are “Israeli.” Gates, who does know, wasn’t telling either, but he was “very happy” to wish the Microsoft Israel R&D center a happy 25th anniversary.

“I have been very impressed with what they have done in the past 25 years, and I can’t wait to see what they come up with in the next 25,” he added.

Source: https://www.timesofisrael.com/bill-gates-israeli-tech-changing-the-world/

How Israel Hardware Back Doored Everything – Arc Processors


Everyone in the tech sector needs to watch this short 2 minute video:

https://www.opdeepstate.com/wp-content/uploads/2019/01/HOW-ISRAEL-HARDWARE-BACKDOORED-EVERYTHING1.mp4

For more information: https://www.opdeepstate.com/2017/04/11/israel-the-greatest-spy-machine-of-all-time/

Sort:  

Do you mind if I ask a question?

Why did you burn 9 SBD to promote this post? I appreciate any answer you can give me, I am genuinely interested in hearing back from you.

Dear blondenfun1:

We are SteemBet, the next generation STEEM based gaming platform. We are honored to invite you to join our first fantastic dice game, which is just the beginning of SteemBet game series. Our dividend system has now launched. The prize pool has already accumulated 2,000 STEEM and more than 60 players have participated in staking mining token SBT. A huge reward of 40,000 STEEM is awaiting! Join us NOW with other 500 STEEM users to loot HUGE dividend reward!!

SteemBet Team

Official Website
https://steem-bet.com

Discord Server
https://discord.gg/95cBN3W

Telegram Group
https://t.me/steembet

Congratulations @blondenfun1! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 2 years!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Do not miss the last post from @steemitboard:

New japanese speaking community Steem Meetup badge
Vote for @Steemitboard as a witness to get one more award and increased upvotes!

Coin Marketplace

STEEM 0.26
TRX 0.11
JST 0.033
BTC 64678.67
ETH 3086.68
USDT 1.00
SBD 3.87