Learn about the 3 Different Blockchain Hacks
Transparency, decentralization, and immutability are the salient features of blockchain that makes the technology popular among industries such as legal and healthcare.
FREMONT, CA: Blockchain technology is considered as an impenetrable information repository that can’t be leaked, modified, or destroyed. However, the numerous cases involving blockchain hacks have posed a question over such claims.
Primarily blockchain is considered a technology that will reform several sectors. Transparency, decentralization, and immutability are the salient features of blockchain that makes the technology popular among industries such as legal and healthcare. However, the primary purpose of blockchain has been to secure critical information and assets, whether it’s Electronic Health Record (HER) or crypto-tokens. But the numerous cases of attacks have led to the conclusion that while blockchain may be immune to traditional attacks, it has its own set of vulnerabilities. Here are some insights into blockchain-specific security concerns:
The concept of Blockchain thrived on its ability to protect assets and transactions through a decentralized distribution of data and control. As all transactions are replicated across a large number of nodes, modifying or destroying the information will not affect the integrity of the blockchain. Moreover, all data over the blockchain is secured through cryptographic hashing, which ensures that only those with the authorized access keys can access any piece of information on the blockchain.
Check out: Top Blockchain Companies
Despite such a robust security framework, the blockchain is vulnerable. These unique sets of vulnerabilities have been exploited such that the blockchain hacks in the last year have amounted to $1 billion. The most common types of blockchain hacks are as follows:
Blockchain allows a large number of nodes and users to verify transactions. In case of a Sybil attack, various nodes on a blockchain network are controlled by a single entity posing as multiple users. Thus it can sway a majority of the network power, thereby controlling the network decisions.
Denial of Service (DDOS) Attack
In case of a DDoS attack, an attacker floods the targeted machine or resource with a large volume of illegitimate service requests. The overloaded server or node gets too engaged to process service requests from legitimate users. A blockchain DDoS attack operates similarly.
51 Percent AttackA 51 percent attack implies a single entity is authorized to alter blockchain transaction as it has gained control of the majority of the nodes. Such attacks usually experienced on smaller bitcoin network where it’s relatively easy to amass the majority of processing power.
By Tom Farrah, CIO & SVP, Dr Pepper Snapple Group
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Phil Jordan, CIO, Telefonica
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Dennis Hodges, CIO, Inteva Products
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sven Gerjets, SVP-IT, DIRECTV
By Marie Blake, EVP & CCO, BankUnited
By Lowell Gilvin, Chief Process Officer, Jabil
By Walter Carvalho, VP & Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Marc Jones, Distinguished Engineer, IBM Cloud Infrastructure