The arrival of the world of cryptocurrencies brought with it certain facilities and flexibility to adopt new economic changes, but also contributed a lot to various scams, risks and even cyber attacks.
Thus, a concept that has gained strength lately is the so-called “crypto hacking”: the use of third-party devices (PCs, smartphones, tablets or even servers), without proper consent or knowledge, to mine and extract cryptocurrencies from victims.
In the first quarter of 2022, 78 hacking events were recorded, of which about 1.3 billion dollars were obtained through the blockchain, which represents a 136% increase in crimes compared to the same quarter of 2021. These figures continue to increase and therefore it is important to be aware of the different red flags that can introduce oneself.
“Although the market is currently constantly seeking to promote user security, through methods such as identity verification or QR codes, no one is exempt from suffering this type of hack. Therefore, it is important to be on the lookout for unusual signs that may be present on the computer. Although many companies have disclosed their vulnerability to this type of hack, the expansion of the cryptocurrency market continues. In turn, Brazil ranks first in Latin America with the highest number of cyberattacks, according to a report published by the company specialized in Threat Intelligence, SonicWall. However, in a sector that does not stop, what is sought is to promote in the user the use of computer systems capable of providing great security to data and sensitive information that represent a higher level of importance for the public.”, explains Eduardo Borba, president of Softline Brazil.
The main motivation for crypto-hacking is money and, with it, the power to carry out other types of attacks. These types of cyberattacks intend to go further and further and invade increasingly relevant hardware.
An example of this is an incident where criminals hacked the operational technology network of the control system of a European public water companywhich, according to infrastructure security experts, has degraded the operator’s ability to manage the plant, with a significant impact on internal security.
Fortunately, the company realized when it installed intrusion detection products on the company network, particularly on its internal network, which would not normally be exposed to the Internet.
The process of this type of attack is the same as for malware, they can enter the device through an email, a link, etc. Such an attack on a system can be difficult to detect. Also, discovering the source of CPU usage can be complex. Processes can be hidden or masked as legitimate using system proper names to prevent users from interrupting them.
In an ever-changing threat landscape, staying safe from the latest dangers like hacking is a full-time job. For this reason, having the necessary means to detect and clean any type of intrusion and protect all the highly valuable resources present on the computer is of vital importance.
Disclaimer: The information and/or opinions expressed in this article do not necessarily represent the views or editorial line of Cointelegraph. The information set forth herein should not be taken as financial advice or investment recommendation. All investment and commercial movement involve risks and it is the responsibility of each person to do their due research before making an investment decision.
It may interest you:
Investments in crypto assets are not regulated. They may not be suitable for retail investors and the full amount invested may be lost. The services or products offered are not aimed at or accessible to investors in Spain.