{"id":10267,"date":"2017-11-03T07:10:10","date_gmt":"2017-11-03T15:10:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/03\/news-4040\/"},"modified":"2017-11-03T07:10:10","modified_gmt":"2017-11-03T15:10:10","slug":"news-4040","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/03\/news-4040\/","title":{"rendered":"What is cryptocurrency and why do cybercriminals love it?"},"content":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Fri, 03 Nov 2017 14:00:49 +0000<\/strong><\/p>\n<p>Ever pretend you know what your friends are talking about because you want to sound smart and relevant\u2014and then trap yourself in a lie?<\/p>\n<p>\u201cWow, looks like those hackers were mining for cryptocurrency. You know what cryptocurrency is, right?\u201d<\/p>\n<p>\u201cOh yeah, totally. Cryptocurrency. Bad stuff. You know. Currency? In the crypt? Bad.\u201d<\/p>\n<p>\u201cYeah\u2026.\u201d<\/p>\n<p>Okay, so the <em>next<\/em> time someone asks, &#8220;What\u00a0<em>is\u00a0<\/em>cryptocurrency, anyway?&#8221; instead of awkwardly shrugging, be prepared to dazzle them with your insider knowledge.<\/p>\n<h3>What is cryptocurrency, in a nutshell?<\/h3>\n<p>In its simplest form, cryptocurrency is digital money. It\u2019s currency that exists in the network only\u2014it has no physical form. Cryptocurrency is not unlike regular currency in that it\u2019s a commodity that allows you to pay for things online. But the way it was created and managed is revolutionary in the field of money. Unlike dollars or euros, cryptocurrency is not backed by the government or banks. There\u2019s no central authority.<\/p>\n<p>If that both excites and scares you, you\u2019re not alone. But this technology train has left the station. Will it be a wreck? Or will it be the kind of disruptive tech that democratizes the exchange of currency for future generations?<\/p>\n<p>Let\u2019s take a closer look at what cryptocurrency is, how it works, and what are the possible pitfalls.<\/p>\n<h3>What makes cryptocurrency different from regular money?<\/h3>\n<p>If you take away all the techno-babble around cryptocurrency, you can reduce it down to a simple concept. Cryptocurrency is entries in a database that no one can change without fulfilling specific conditions. This may seem obtuse, but it\u2019s actually how you can define all currency. Think of your own bank account and the way transactions are managed\u2014you can only authorize transfers, withdrawals, and deposits under specific conditions. When you do so, the database entries change.<\/p>\n<p>The only major difference, then, between cryptocurrency and \u201cregular\u201d money is how those entries in the database are changed. At a bank, it\u2019s a central figure who does the changing: the bank itself. With cryptocurrency, the entries are managed by a network of computers belonging to no one entity. More on this later.<\/p>\n<p>Outside of centralized vs. decentralized management, the differences between cryptocurrency and regular currency are minor. Unlike the dollar or the yen, cryptocurrency has one global rate\u2014and worth <em>a lot<\/em>. As of November 2017, one Bitcoin is equal to $6,942.77. Its value has increased exponentially this year, exploding from <a href=\"http:\/\/www.businessinsider.com\/bitcoin-price-january-18-2017-2017-1\" target=\"_blank\" rel=\"noopener\">around $800 in January 2017.<\/a><\/p>\n<h3>How does cryptocurrency work?<\/h3>\n<p>Cryptocurrency aims to be <strong>decentralized, secure, <\/strong>and <strong>anonymous. <\/strong>Here\u2019s how its technologies work together to try and make that happen.<\/p>\n<p>Remember how we talked about cryptocurrency as entries in a database? That database is called the blockchain. Essentially, it\u2019s a digital ledger that uses encryption to control the creation of money and verify the transfer of funds. This allows for users to make <strong>secure <\/strong>payments and store money <strong>anonymously<\/strong>, without needing to go through a bank.<\/p>\n<p>Information on the blockchain exists as a shared\u2014and continuously reconciled\u2014database. The blockchain database isn\u2019t stored in a single location, and its records are public and easily verified. <strong>No centralized version<\/strong> of this information exists for a cybercriminal to corrupt. Hosted by millions of computers simultaneously, its data is accessible to anyone on the Internet.<\/p>\n<p>So how, exactly, is cryptocurrency created and maintained on the blockchain? Units are generated through a process called mining, which involves harnessing computer power (CPU) to solve complicated math problems. All cryptocurrencies are maintained by a community of miners who are members of the general public that have set up their machines to participate in validating and processing transactions.<\/p>\n<p>And if you\u2019re wondering why a miner would choose to participate, the answer is simple: Manage the transactions, and earn some digital currency yourself. Those that don\u2019t want to mine can purchase cryptocurrency through a broker and store it in a cryptocurrency wallet.<\/p>\n<h3>When was cryptocurrency developed?<\/h3>\n<p>In the wake of Occupy Wall Street and the economic crash of 2008, Satoshi Nakamoto created <a href=\"https:\/\/bitcoin.org\/en\/\" target=\"_blank\" rel=\"noopener\">Bitcoin<\/a>, a \u201cpeer-to-peer electronic cash system.\u201d Bitcoin was a slap in the face to the \u201ctoo big to fail\u201d banks because it operated outside of a central authority, with no server and no one entity running the show. Bitcoin pioneers had high hopes of eliminating the middle man in order to cancel interest fees, make transactions transparent, and fight corruption.<\/p>\n<p>While Bitcoin was the first and remains the most popular cryptocurrency, others saw its potential and soon jumped on the bandwagon. <a href=\"https:\/\/litecoin.org\/\" target=\"_blank\" rel=\"noopener\">Litecoin<\/a> was developed in 2011, followed by <a href=\"https:\/\/ripple.com\/\" target=\"_blank\" rel=\"noopener\">Ripple<\/a> in 2012. In 2015, <a href=\"https:\/\/ethereum.org\/\" target=\"_blank\" rel=\"noopener\">Ethereum<\/a> joined the fray and has become the second most-popular cryptocurrency. <a href=\"https:\/\/coinmarketcap.com\/all\/views\/all\/\" target=\"_blank\" rel=\"noopener\">According to CoinMarketCap<\/a>, there are now more than 1,000 cryptocurrencies on the Internet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20348\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design.jpg\" alt=\"different cryptocurrencies\" width=\"519\" height=\"519\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design.jpg 1200w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design-150x150.jpg 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design-300x300.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design-600x600.jpg 600w\" sizes=\"auto, (max-width: 519px) 100vw, 519px\" \/><\/p>\n<p>Cryptocurrency\u2019s popularity on the Internet soon bled into other real-world applications. Japan has adopted Bitcoin as an official currency for commerce. Banks in India are using Ripple as an alternative system for transactions. <a href=\"https:\/\/www.reuters.com\/article\/us-jpmorgan-blockchain\/jpmorgan-launches-payments-network-using-blockchain-technology-idUSKBN1CL1P6\" target=\"_blank\" rel=\"noopener\">JP Morgan<\/a> is developing its own blockchain technology in partnership with Quorum, an enterprise version of Ethereum.<\/p>\n<p>However, as with any new and relatively untested technology, the cybercriminals wanted in. And it wasn\u2019t long before Bitcoin and other cryptocurrencies fell victim to their own democratic ideals.<\/p>\n<h3>How has cryptocurrency been abused?<\/h3>\n<p>As secure as a Bitcoin address is, the application of its technology is often fumbled; usually by unpracticed programmers looking to get in on the action and creating faulty code. Fundamentally, the system is superior to centralized database systems, but poor coding practices among its thousands of practitioners have created a multitude of vulnerabilities. Like vultures to carrion, cybercriminals flocked to exploit. According to Hacked, <a href=\"https:\/\/hacked.com\/biggest-bitcoin-hacks-thefts-time\/\" target=\"_blank\" rel=\"noopener\">an estimated 10 to 20 percent<\/a> of all Bitcoin in existence is held by criminals.<\/p>\n<p>While cryptocurrency was initially hailed as the next big thing in money, a savior for folks who just lost everything in steep recession (but watched as the banks that screwed them over walked away unscathed), a hack in 2011 showed how insecure and easily stolen cryptocurrency could be. Soon, the criminal-minded rushed in, looking to take advantage of the cheap, fast, permission-less, and anonymous nature of cryptocurrency exchange. Over the last nine years, millions of Bitcoin, worth billions of dollars, have been stolen\u2014some events so major that they drove <a href=\"http:\/\/nypost.com\/2014\/03\/06\/friends-mourn-loss-of-bitcoin-ceo-found-dead\/\" target=\"_blank\" rel=\"noopener\">people to suicide<\/a>.<\/p>\n<p>On a smaller but much more frequent scale, <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2012\/08\/passing-the-bitcoin\/\" target=\"_blank\" rel=\"noopener\">cryptocurrency is used on the black market<\/a> to buy and sell credit card numbers and bot installs, fund hacktivism or other \u201cextra-legal\u201d activity, and launder money. It\u2019s also the payment method of choice for ransomware authors, whose profits are made possible by collecting money that can\u2019t be traced. Certainly makes getting caught that much more difficult.<\/p>\n<div id=\"attachment_20347\" style=\"width: 782px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-20347 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/ransom-note.jpg\" alt=\"ransom note asking for bitcoin\" width=\"772\" height=\"329\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/ransom-note.jpg 772w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/ransom-note-300x128.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/ransom-note-600x256.jpg 600w\" sizes=\"auto, (max-width: 772px) 100vw, 772px\" \/><\/p>\n<p class=\"wp-caption-text\">Ransom note asking for Bitcoin<\/p>\n<\/div>\n<p>And if that weren\u2019t enough to call cryptocurrency unstable, the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2013\/11\/bitcoins-pools-and-thieves\/\" target=\"_blank\" rel=\"noopener\">process of mining itself is vulnerable<\/a> and has already attracted some high-profile hacks. <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/why-is-malwarebytes-blocking-coinhive\/\" target=\"_blank\" rel=\"noopener\">Services such as CoinHive<\/a> allow those that deploy it to mine the CPU of their site visitors\u2014without the visitors\u2019 knowledge or permission. This process, known as <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-cryptocurrency-mining-browser\/\" target=\"_blank\" rel=\"noopener\">cryptojacking<\/a>, is robbery-lite: Users may see an impact to their computer\u2019s performance or a slight increase in their electric bill, but are otherwise unaffected. Or that is, they were, until cybercriminals figured out how to <a href=\"https:\/\/thehackernews.com\/2017\/10\/coinhive-cryptocurrency-miner.html\" target=\"_blank\" rel=\"noopener\">hack CoinHive<\/a>.<\/p>\n<h3>Future applications<\/h3>\n<p>So where does that leave us with cryptocurrency? Surely its popularity is skyrocketing and its value is spiking so hard it could win a gold medal for beach volleyball at the Olympics. But is it a viable, safe alternative to our current currencies? Cryptocurrency could democratize the future of money\u2014or it could end up in technology hell with AskJeeves and portable CD players.<\/p>\n<p>We can see the technological applications for the future that demonstrate the clear advantages of cryptocurrency over our current system. But right now, cryptocurrency is good in theory, bad in practice. Volatile and highly hackable, we\u2019ll have to move to create security measures that can keep up with the development of the tech, otherwise cybercriminals will flood the market so heavily that it never moves beyond the dark web.<\/p>\n<p>If you want to learn even more about cryptocurrency, stay tuned for a deeper dive on blockchain technology and a full report on cryptojacking.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/cryptocurrency-works-cybercriminals-love\/\">What is cryptocurrency and why do cybercriminals love it?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/cryptocurrency-works-cybercriminals-love\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Fri, 03 Nov 2017 14:00:49 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2017\/11\/cryptocurrency-works-cybercriminals-love\/' title='What is cryptocurrency and why do cybercriminals love it?'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/shutterstock_687394909.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Ever stumble into a conversation about Bitcoin and wonder, &#8220;What is cryptocurrency, anyway?&#8221; Read on to learn how it works and why cybercriminals love it.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin\/\" rel=\"tag\">bitcoin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/blockchain\/\" rel=\"tag\">blockchain<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/coinhive\/\" rel=\"tag\">coinhive<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/crypto-miners\/\" rel=\"tag\">crypto miners<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptocurrency\/\" rel=\"tag\">cryptocurrency<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2017\/11\/cryptocurrency-works-cybercriminals-love\/' title='What is cryptocurrency and why do cybercriminals love it?'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/cryptocurrency-works-cybercriminals-love\/\">What is cryptocurrency and why do cybercriminals love it?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,10490,11526,15078,15899,11052,10520],"class_list":["post-10267","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-bitcoin","tag-blockchain","tag-coinhive","tag-crypto-miners","tag-cryptocurrency","tag-fyi"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10267"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10267\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10267"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}