Monday, September 3, 2018

Which steps can Internet browser vendors take to reduce cyber crypto mining attacks?

Colleagues, crypto jacking has become a monumental cyber challenge for cryptocurrency mass adoption. Most crypto jacking attacks target Chrome, Firefox, IE and Safari browsers by adding nefarious scripts, which perform illicit mining unbeknownst to end-users. The Google Play Store and Apple App Store have implemented policies to remove suspicious apps from their online stores. However, this is just one small step. Google, Apple, Microsoft and the Mozilla Foundation all need to proactively integrate tools, which will prevent scripts and related adware. Moreover, a more user-friendly method for automatically pushing security patches to mobile devices and laptop-desktop computers alike. Bottom line: The security and browser software firms have some of the best minds on the planet within the ranks of their employer. We need something comparable to a moonshot commitment to innovate security protection rather than constantly play catch-up to cyber criminals if the cryptocurrency ecosystem is to achieve the credibility needed by investors small and large. Send us your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)  

Saturday, September 1, 2018

Can Japan’s National Police Agencies’ New Software Security Tool Reduce Crypto Money Laundering?

Colleagues, it is common knowledge that money laundering is bonanza for crypto cyber criminals. The Japanese NPA has decided to fund the development of AML software by a private sector security firm. Japan is home to some of some prominent crypto exchanges including Coincheck, BitOcean, Bitarg, Zaif and GMO Coin. With cyber-attacks on both crypto exchanges and users, running rampant Japan is on the bleeding edge of cyber enforcement … not by choice, rather by necessity.  The NPA reported some 170 cases of suspected crypto crime during a mere six-month period in 2017 alone.  Does this strategy represent a silver bullet for resolving the crypto AML dilemma? Not at all. It is, however, one more important counter-measure to protect the global crypto ecosystem. We expect other nation’s securities and law enforcement agencies to fund similar tools in an effort to gain an upper hand against the crypto cybercrime contagion. Send us your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/

Friday, August 31, 2018

Crypto-Mining Cyber Attacks Continue to Be the Weakest Link in the Cryptocurrency Ecosystem

Colleagues, following high profile cyber security breaches against CoinSecure and CoinCheck earlier this year, crypto-mining attacks have skyrocketed in 2018 representing a plague on the global crypto ecosystem. In its Mid-Year 2018 Security Report TrendMicro states We also detected a significant number of new cryptocurrency miner malware families, showing that cybercriminals remained keenly interested in profiting from digital currencies.” The Necurs exploit kit, CVE-2017-10271 via port 7001/TCP and Web miner script in AOL ad platform are some of the more notable cyber security used by crypto-miner attackers. Moreover, while cyber-attacks related to crypto mining far outpace other types of attacks, direct attacks against crypto exchanges are on the rise. Where does this leave the integrity of the global cryptosphere? Bottom line: The nature and rise in these attacks will continue to hinder the mass adoption of cryptocurrencies around the world. While far easier said than done, cryptosphere security needs to take a quantum step forward to gain and maintain a proactive advantage over the crypto threat juggernaut. Share your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/

Wednesday, August 29, 2018

NASAA Regulators Zero In on Securities Fraud – What is the Impact of Operation Cryptosweep?

Colleagues, Operation Cryptosweep (aka “OC”) is a joint effort of regulators from the US, Mexico, Puerto Rico, Canada and the US Virgin Islands targeting unregistered ICOs and related securities fraud. Overseeing OC is The North American Securities Administrators Association (NASAA). At is core is the US SEC’s Cyber Taskforce which was launched in September 2017. To date OC has led to some 200 crypto-related investigations. Bottom line: While we support the appropriate regulation of the cryptosphere the question of OC’s effectiveness is more than valid. Noteworthy exceptions to the list of member states are Caribbean nations known for money laundering and non-transparent offshore bank accounts. Antigua and the Cayman Islands are top of mind. Bottom line: The OC will have a positive effect on reducing crypto-related securities and ICO fraud, however, further attention needs to be given to other countries known for their nefarious roles in the broader crypto economy. Share your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/


Monday, August 27, 2018

Will Iran’s State-Backed Cryptocurrency Enable the Country to Evade US Economic Sanctions?

Colleagues, Iran has taken a major step toward the creation of a state-backed cryptocurrency. The primary goal of this effort is assumed to be the country’s circumvention of new US economic sanctions in the wake of US President Trump revoking support of the Iran nuclear arms accord in May 2018. Work on a national cryptocurrency dates back to late 2017 when the US President re-affirmed his campaign promise to revoke the accord and re-impose stiff trade sanctions. This initiative has the backing of Iranian President Hassan Rouhani and is led by their National Cyberspace Center. Back in January 2018 the US Treasury issued a severe warning against Iran’s use of cyber warfare and development of a cryptocurrency for this very reason. Bottom line: Iran, Russia and Venezuela has announced plans to develop digital currencies for the purpose of evading Western (aka US) trade sanctions. Transaction “transparency” is a vital factors in whether their efforts will be successful at essential protecting nefarious money laundering activities. We assume the currencies which be intentionally designed to avoid detection by the US and its allies. Details to follow in the coming months.
Share your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)  

Saturday, August 25, 2018

Will social media-based payment tools allow for “secure” cryptocurrency transactions and fundraising?

Colleagues, Google Pay, Alipay, WeChat Pay and Facebook Payments are among the most popular tools for online payments, money transfers and fundraising. Each tool is confronted with the dilemma of whether to accept cryptocurrency transactions. The Chinese Banking Regulatory Commission and the People’s Bank of China have release strong warnings against the so-called “crypto payments model”. In the US Google Pay and Facebook Payments are faced with similar challenges. They are global platforms and what is acceptable in one country or region may be prohibited elsewhere. The potential security risks are numerous – exchange fraud, money laundering, lack of transaction transparency along with the fundamental integrity of many second and third tier cryptocurrencies are bona fide concerns among government regulators, platform vendors and users alike. There is no “one size fits all” solution. Bottom line: We see marriage of online payment tools and cryptocurrencies as yet another ‘test’ as cryptos seek mass market adoption. Like other crypto related challenges we do believe that in time such issues will be resolved … although for now no one knows the precise solution. Share your thoughts today! Lawrence – Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com/


Friday, August 24, 2018

How can Blockchain be used to secure digital documents and transactions in the public sector?

Colleagues, with good intensions the Japanese, Chinese, American and British governments are exploring the use of Blockchain to securely maintain and transmit documents containing sensitive information about their citizens. The latest example of the UK’ Ministry of Justice assessment of Blockchain for protecting its repository of digital forms of evidence. In the US Blockchain represents a means of securely processing records for Social Security, Medicare and other entitlement programs. Noble endeavors indeed. Nevertheless, the obvious dilemma is that such data and documents needed for smooth government processes will only be as secure as the Blockchains used to manage them. Protecting cryptographic keys remains a top concern. Using hardware security modules (HSMs) and trusted computers in place of digital wallets and as Blockchain nodes will give security-conscious users and organizations greater confidence. As reported by McKinsey and Company recent breaches of crypto exchanges clearly indicate that Blockchain participants and their access to the Blockchain represent a security weakness that must be addressed before the technology. Bottom line: As we have previously reported Blockchain adoption will be directly correlated to the level of both perceived and actual security. Such security is likely to increase as the technology matures. Share your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)  

Wednesday, August 22, 2018

What would be the impact of securing the Siacoin Distributed Storage Protocol have on Crypto Mining?

Colleagues, the global cryptosphere is rigorously debating the security of the Siacoin Distributed Storage Protocol (aka the Siacoin Blockchain). More security translates into higher trust and integrity of the platform … right? The answer depends on which segment of the crypto ecosystem you ask. The new security code would fork Siacoin and in turn disabling mining products offered by Bitmain and Innosilicon. At press time we are waiting for Nvidia and AMD to weigh-in on this matter. Both companies have seen demand for their mining ASICs slow during H1 2018. So what is the end goal? Some would say driving increased capacity around the world to create a data storage marketplace that is more reliable and lower cost than traditional cloud storage providers. Our view is that this inevitable debate represents just one more growing pain as cryptocurrencies and their underlying Blockchains mature. The issue will get resolved and yes there will be winners and losers. More to come. Share your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)  

Monday, August 20, 2018

Mining Malware at Fault a Cryptocurrency Theft of Some $87B in China

Colleagues, as we have previously reported mining malware has far outpaced the growth of ransomware over the past year when it comes to cryptocurrency theft. The most recent example is the theft in China valued at $87B of cryptocurrency by mining malware at the hands of three cyber criminals. Although details are limited, we understand this malware crime to be launched by Chinese nationals against Chinese cryptocurrency investors. To date we have seen many mining malware crimes initiated from within China targeting cryptocurrency investors located abroad.  McAfee Labs’ Threats Report for June 2018 identified more than 2.9 million samples of crypto-mining malware in Q1 2018 alone versus 400k attacks in Q4 2017 Q4 with JavaScript being the tool of choice when targeting web browsers. Bottom line: Both individual as well as corporate crypto investors need to be proactive in preventing crypto theft. Individuals needs to ensure the security on their computers and smartphones is as robust and up-to-date as possible, while institutions (corporations and telecom carriers) need to focus on router security. Share your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/) 

Thursday, August 16, 2018

How critical in SIM Swap Fraud theft to cryptocurrency investors?

Colleagues, when members of the cryptocurrency ecosystem assess security threats SIM Swap Fraud likely ranks quite low on the priority list. Nevertheless, for cryptocurrency investors who use software-based crypto wallets the impact of SIM Swap Fraud can be significant. Case I point is the $224m law suit filed against AT&T by crypto investor Michael Terpin. Such fraud is a form of identity theft in which thieves convince untrained or unsuspecting telecom carrier and smartphone vendor support staff of the need to upgrade a SIM card. In turn the thieves gain access to most all of the phones apps and security information. The US Federal Trade Commission has been aware of this scheme for at least two years, however, there is little evidence that phone manufacturers and carriers have implemented protocols (e.g. human factors prevention methods) to reduce such crime. SIM Swap Fraud takes advantage of the rise of cryptocurrency software wallets and identify theft schemes. Cryptocurrency investors need to assess the risk-reward level of software vs. hardware vs. paper wallets along with their vulnerability to ID theft. Bottom line: SIM Swap Fraud is one more weakness is the broader crypto ecosystem which traders and investors need to mitigate. Share your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)