{"id":15914,"date":"2019-07-25T14:30:05","date_gmt":"2019-07-25T22:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/07\/25\/news-9659\/"},"modified":"2019-07-25T14:30:05","modified_gmt":"2019-07-25T22:30:05","slug":"news-9659","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/25\/news-9659\/","title":{"rendered":"Researchers to launch intentionally \u2018vulnerable\u2019 blockchain at Black Hat"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/02\/blockchain_crypotocurrency_bitcoin-by-akinbostanci-getty-100787953-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucas Mearian| Date: Thu, 25 Jul 2019 14:06:00 -0700<\/strong><\/p>\n<p>Hoping to raise awareness about blockchain vulnerabilities, cybersecurity firm \u00a0Kudelski Security next week plans to launch the industry\u2019s first &#8220;purposefully vulnerable&#8221; blockchain \u2013 and will demo it at next month&#8217;s <a href=\"https:\/\/www.blackhat.com\/us-19\/\" rel=\"noopener nofollow\" target=\"_blank\">Black Hat<\/a>\u00a0conference.<\/p>\n<p>Kudelski Security\u2019s <a href=\"https:\/\/resources.kudelskisecurity.com\/fumblechain\" rel=\"nofollow noopener\" target=\"_blank\">FumbleChain project<\/a> is aimed at highlighting vulnerabilities in blockchain ecosystems, according to Nathan Hamiel, head of cybersecurity research at Kudelski.<\/p>\n<p>The flawed blockchain ledger is written in Python 3.0, making it easy for anyone to read and modify its source code, and it&#8217;s modular \u2013 allowing users to hack and add new challenges to promote continuous learning.<\/p>\n<p>The Kudelski blockchain will be available as both a code download on GitHub and as <a href=\"https:\/\/demo.fumblechain.io\/\" rel=\"nofollow noopener\" target=\"_blank\">a demo on the company&#8217;s website<\/a>, allowing testers to play with its features and learn how it works without having to download code.<\/p>\n<p>\u201cFor the most part, blockchains aren\u2019t inherently secure,\u201d Hamiel said. \u201cThere\u2019s an entire ecosystem around blockchain, just like there is around traditional applications. Quite often you\u2019ll have vulnerabilities that crop up in places that are rather unexpected. What we wanted to do was create this pre-made blockchain, create this educational framework around it so you can learn more about it and more about blockchain security.\u201d<\/p>\n<p>The concept is similar to other open-source projects, such as creating web applications so developers can test their skills attacking them to expose vulnerabilities.<\/p>\n<p>As a write-once, append-many technology, blockchain itself is highly secure, but <a href=\"https:\/\/www.computerworld.com\/article\/3236480\/top-8-problems-with-blockchain.html?nsdr=true\">experts point out<\/a> the distributed ledger technology does not live in a vacuum. In order to be of use, applications such as cryptocurrencies are embedded into the blockchain \u2013 making it vulnerable to certain attack vectors.<\/p>\n<p>At its most basic, the technology is a <a href=\"https:\/\/www.computerworld.com\/article\/3191077\/what-is-blockchain-the-complete-guide.html\">peer-to-peer-based distributed ledger<\/a>, or database, organized by a set of protocols combined with a blockchain; in essence, it&#8217;s \u00a0a series of encrypted sets of data that record immutable changes over time. While that may be relatively straightforward, how the technology is implemented can lead to a variety of permutations.<\/p>\n<p>&#8220;Like most things, the devil is in the details,&#8221; said Jack Gold, principal research analyst at J. Gold Associates. &#8220;Blockchain is a specification more than a technology, and a relatively loose spec at that. &#8230;There are various ways to implement it&#8230;, so if you implement in a insecure fashion, it can be broken.&#8221;<\/p>\n<p>James Wester, research director for IDC Worldwide Blockchain Strategies, said he\u2019s often tasked with defining blockchain along with a &#8220;basket of technologies&#8221; that fall under the general heading of &#8220;blockchain,&#8221; including\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3319744\/blockchain-2019-how-crypto-will-convert-cash-property-into-digital-assets.html\">tokenized assets<\/a>, cryptocurrencies,\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3389678\/whats-a-crypto-wallet-and-does-it-manage-digital-currency.html\">crypto wallets<\/a>, smart contracts, and\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3244128\/how-blockchain-makes-self-sovereign-identities-possible.html\">self-sovereign identity<\/a>; all of the latter group are applications or architectures that can run on top of a blockchain network, but are not a native part of the technology.<\/p>\n<p>\u201cIt&#8217;s possible to have relatively smart discussions about the technology without actually knowing some of those differences, so many semi-informed people don&#8217;t even bother to learn the terms and technology,\u201d Wester said.<\/p>\n<p>Both public and private blockchains \u2013 ones that require pre-approval to join \u2013 are natively secure because they&#8217;re immutable (i.e., each record or block is unchangeable and tied to all others), and adding new blocks requires a consensus among users. (How large that consensus must be depends on the blockchain in use; for some, it&#8217;s 50%, for others, it&#8217;s more.)<\/p>\n<p>The immutability and consensus requirements of blockchains make them natively more secure than most other networking technologies. But, depending on the architecture and who&#8217;s running the nodes and where, blockchains are vulnerable to attack, as has been seen time and time again.<\/p>\n<p>While blockchain provides security for the integrity of the data recorded on it, the blockchain alone, without additional technologies or systems, cannot protect against unauthorized access such as a data breach, according to the report from Federal Reserve Bank of Minneapolis.<\/p>\n<p>For example, a recent &#8220;51% attack&#8221; on the\u00a0<a href=\"https:\/\/bitcoinist.com\/ethereum-classic-51-percent-attack\/\" rel=\"nofollow noopener\" target=\"_blank\">Ethereum Classic token exchange<\/a>\u00a0showed why even blockchain is not impermeable to gaming. A 51% attack refers to a bad actor who gains control of the majority of CPUs in a cryptocurrency mining pool. Such attacks are generally limited to smaller blockchains with fewer nodes, because they&#8217;re more susceptible to a single person seizing control based on a Proof of Work (PoW) consensus mechanism.<\/p>\n<p>Cryptocurrency wallets, which store private keys enabling access to bitcoin and other digital currencies, have also been <a href=\"https:\/\/www.ccn.com\/yet-another-crypto-wallet-hack-causes-users-lose-400000\/\" rel=\"nofollow noopener\" target=\"_blank\">vulnerable to attacks<\/a>.<\/p>\n<p>&#8220;If you\u2019re a company looking to use blockchain \u2013 and not just for crypto currency \u2013 \u00a0the amount of time and effort you put into securing the various components of the ledger and process are key,&#8221; Gold said.<\/p>\n<p>Data transparency, or the ability for all parties on a blockchain to view transactions, is part of its appeal because bad actors can quickly be identified if they attempt to add unverified data. That transparency, however, can also be a threat. For example, in a settlement or clearing system for financial institutions where confidentiality may be a key component of security, system data transparency is a security risk, the Federal Reserve report noted.<\/p>\n<p>Blockchain, Hamiel said, is a technology steeped in hype that often leads to contradictory claims: advocates praise it and claim it will change the world while \u00a0\u201chaters\u201d \u2013 no matter what problem blockchain does actually solve \u2013 refuse to ever adopt it.<\/p>\n<p>\u201cThe truth is somewhere in the middle,\u201d Hamiel said. \u201cThere are certainly problems blockchain solves, and I think it\u2019s an interesting area that people have a lot of questions about. People are curious about the technology, but they don\u2019t have a way to easily gain access to information about it without spending a lot of time to learn about it. I\u2019m hoping this solves that.\u201d<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3411841\/researchers-to-launch-intentionally-vulnerable-blockchain-at-black-hat.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/02\/blockchain_crypotocurrency_bitcoin-by-akinbostanci-getty-100787953-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucas Mearian| Date: Thu, 25 Jul 2019 14:06:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Hoping to raise awareness about blockchain vulnerabilities, cybersecurity firm \u00a0Kudelski Security next week plans to launch the industry\u2019s first &#8220;purposefully vulnerable&#8221; blockchain \u2013 and will demo it at next month&#8217;s <a href=\"https:\/\/www.blackhat.com\/us-19\/\" rel=\"noopener nofollow\" target=\"_blank\">Black Hat<\/a>\u00a0conference.<\/p>\n<p>Kudelski Security\u2019s <a href=\"https:\/\/resources.kudelskisecurity.com\/fumblechain\" rel=\"nofollow noopener\" target=\"_blank\">FumbleChain project<\/a> is aimed at highlighting vulnerabilities in blockchain ecosystems, according to Nathan Hamiel, head of cybersecurity research at Kudelski.<\/p>\n<aside class=\"fakesidebar\">\n<aside class=\"fakesidebar\"><strong>[ Read the <a href=\"https:\/\/www.computerworld.com\/article\/3406434\/download-beginners-guide-to-blockchain.html\">Download: Beginner&#8217;s guide to blockchain<\/a> special report ]<\/strong><\/aside>\n<\/aside>\n<p>The flawed blockchain ledger is written in Python 3.0, making it easy for anyone to read and modify its source code, and it&#8217;s modular \u2013 allowing users to hack and add new challenges to promote continuous learning.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3411841\/researchers-to-launch-intentionally-vulnerable-blockchain-at-black-hat.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11526,11070,714],"class_list":["post-15914","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-blockchain","tag-emerging-technology","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15914"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15914\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15914"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}