SlideShare a Scribd company logo
1 of 37
Blockchain &
Cyber Security
Algeria 28 Mar 2018
Jorge Sebastiao, CISSP
CTO Eco-system
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge
Disclaimer & Copyright
• Please note that this presentation is for informational, knowledge sharing and educational purposes only. Any
comments or statements made herein do not necessarily reflect the views of Huawei. The information is intended
for the recipient's use only and should not be cited, reproduced or distributed to any third party without the prior
consent of the authors. Although great care is taken to ensure accuracy of information neither the author, nor
Huawei can be held responsible for any decision made on the basis of the information cited.
• The content of this presentation is based on information gathered in good faith from both primary and
secondary sources and is believed to be correct at the time of publication. The author can however provide no
guarantee regarding the accuracy of this content and therefore accepts no liability whatsoever for any actions
taken that subsequently prove incorrect.
• The practices listed in the document are provided as is and as guidance and the author and Huawei do not claim
that these comprise the only practices to be followed. The readers are urged to make informed decisions in their
usage.
• The information presented in this presentation is not intended to be, and should not be construed as, an offer to
sell any products or services or a solicitation of an offer to buy any products or services . Any such offer or sale will
be made pursuant to, and the information presented at this meeting is qualified in its entirety by, authorized
offering documents and related disclosure schedules or similar disclosure documentation.
• All logos and brand names belong to their respective owners and we do not claim any relationship or association,
implied or otherwise, with them.
• Use of any materials by virtue of relationships and associations, if any, are mentioned explicitly.
• Author has taken care to attribute all sources for external materials used in this presentation, and any oversight is
regretted. If you, as owner, or as viewer, find any reason to dispute the use of these materials kindly communicate
the same to author.
• Any omissions, in terms of attribution, may be due to an error of author and not intentional.
Are you ready Crypto
Cyber Security Challenges?
1. Complex Attacks
2. Maturity Technology
3. Wallet & Exchanges
4. Malware
5. Vulnerabilities
6. Social Engineering
7. Best practices
Hackers Focus where the money is
MtGox- Fake Bitcoins attack
2011
•Hacker created fake Bitcoins (BTC)
•Price online from $17.50-$. in 30min
•2 million fake BTC manipulating
trading DB
•Compromised administrator account
•Assigned $1M fake cash to account
•Thief got away 2000 authentic BTC
Tracing Bitcoin – Bigdata
Everything is connected…
3000 Bitcoin Miners Exposed
1. SSH
2. Telenet
3. Default Passwords
CodeFork Malware Miner
1. Filess Malware
2. Monero Miner
3. APT
Hidden Miners
PirateBay & CBS's Showtime
caught mining crypto-coins
in viewers' web browser
CryptoJacking everywhere
•Browser
• Plants
• Super Computers
• Cars
• Mobiles
FCC Threats Miners emissions
•LTE
•S4
•T-Mobile
•Interference
North Korea War Chest
1. Bitcoin
2. War Chest
3. South Korea Exchange Attacks
$150M Raised DAO Attack $60M
Hackers are looking for your
Coins
Intense Scan for
• Coins
• Wallets
• Miners
Bug in Pariti Multi-Sig Wallet
Frozen
$400M
Ethereum
Bitcoins Lost Forever
Crypto Exchanges Hacked
1. Aug 2016 – Bitfinex - $61.8M
2. Jul 2016 – Kraken - $???
3. Jul 2016 – itBit – Attempt
4. May 2016: Gatecoin - $2M
5. May 2016: SimpleFX – Email
6. Apr 2016: Shapeshift - $230K
7. Apr 2016: Yaykuy- Hacked Offline
8. Mar 2016: BitQuick – Customer Data
9. Mar 2016: Cointrader- All Data
10. Jan 2016: Cryptsy-13K-BTC Offline
11. Dec 2017 NiceHash $64M Social Engineering
12. Jan 2018: Black Wallet $400K
13. Feb 2018: Bitgrail $217M
Zaif Japan Bitcoin at $0USD
Mobile as your Identity
1. SS7 Vunerabilities
2. Intercept / Impersonate Calls
3. Intercept / Impersonate SMS
4. Reset Accounts Gmail…
5. Erase Cloud Storage
6. Erase Devices
Hacking Wallet Video
Smart Contracts Vulnerable
34,000 Smart Contracts Vulnerable
Cold Storage Wallets Vulnerability
Cold Wallet MitM Attack
St-Petersburg Blogger Robbed $425K
0 Day Exploits - Guaranteed
Hiding Bitcoin Transactions
NSA is tracking Bitcoin
Social Engineering Attacks
Exchanges Phishing
Social engineering
UK dealer charged in US over
multimillion-dollar fake Bitcoin
site scam
Fake trading platform for the
cryptocurrency Bitcoin
$5M in Mauritius, Morocco
SCAM Influencers
Fixing Blockchain Smart Contracts
Best Practices
Audits
Governance
Legislation
Crypto Countermeasures
1. Securing your email account
2. Securing your social media
3. Enabling 2-factor authentication,
biometrics
4. Vulnerability Management
5. Threat Management
6. Security Awareness Training
7. Incident Response Drills
Apply - A6 - Process
Business
Risk
Maturity
Proper Security Metrics &
Countermeasures
Questions
Jorge Sebastiao, CISSP
CTO Eco-system
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge

More Related Content

What's hot

Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSara-Jayne Terp
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsCase IQ
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentationJesse Ratcliffe, OSCP
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 

What's hot (9)

Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_belief
 
Osint
OsintOsint
Osint
 
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in InvestigationsHow to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Policy Briefing Presentation
Policy Briefing PresentationPolicy Briefing Presentation
Policy Briefing Presentation
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 

Similar to Blockchain & cyber security Algeria Version 1.1

13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith YeungEdith Yeung
 
10 Things to Look for in a Token Project - June 2018 @ Money Conference
10 Things to Look for in a Token Project - June 2018 @ Money Conference10 Things to Look for in a Token Project - June 2018 @ Money Conference
10 Things to Look for in a Token Project - June 2018 @ Money ConferenceEdith Yeung
 
Blockchain Solution in China eCommerce
Blockchain Solution in China eCommerceBlockchain Solution in China eCommerce
Blockchain Solution in China eCommerceEdward Tsang
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH editionJorge Sebastiao
 
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO OST | Open Simple Token
 
Simple Token - V7.0 Project Deck for 14 November, 2017 ICO
Simple Token - V7.0 Project Deck for 14 November, 2017 ICOSimple Token - V7.0 Project Deck for 14 November, 2017 ICO
Simple Token - V7.0 Project Deck for 14 November, 2017 ICOOST | Open Simple Token
 
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...Lucky Gods
 
Hacking the blockchain
Hacking the blockchainHacking the blockchain
Hacking the blockchainAbhimanyu Kashyap
 
CryptoCamp Version 1.0 as of Mar. 15, 2019
CryptoCamp Version 1.0 as of Mar. 15, 2019CryptoCamp Version 1.0 as of Mar. 15, 2019
CryptoCamp Version 1.0 as of Mar. 15, 2019Charles Adjovu
 
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICO
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICOSimple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICO
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICOOST | Open Simple Token
 
Cryptopreneur - Business Model
Cryptopreneur - Business ModelCryptopreneur - Business Model
Cryptopreneur - Business ModelShishir Kalra
 
Security is broken V3.0
Security is broken V3.0Security is broken V3.0
Security is broken V3.0Jorge Sebastiao
 
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...Christopher Bishop
 
Cryptocurrency And NSE Stock Market: A Comparative Data Analysis
Cryptocurrency And NSE Stock Market: A Comparative Data AnalysisCryptocurrency And NSE Stock Market: A Comparative Data Analysis
Cryptocurrency And NSE Stock Market: A Comparative Data AnalysisIRJET Journal
 
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...MicheleNati
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018🔗Audrey Chaing
 
Introduction to blockchain_hcmc_20170820
Introduction to blockchain_hcmc_20170820Introduction to blockchain_hcmc_20170820
Introduction to blockchain_hcmc_20170820HATCH! PROGRAM
 
ICO Pitchnight #1 by Catena Capital & Herdius and friends
ICO Pitchnight #1 by Catena Capital & Herdius and friendsICO Pitchnight #1 by Catena Capital & Herdius and friends
ICO Pitchnight #1 by Catena Capital & Herdius and friendsBalazs Deme
 
Using Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain TransparencyUsing Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain TransparencyHorea Porutiu
 
Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Justin Denton
 

Similar to Blockchain & cyber security Algeria Version 1.1 (20)

13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung
 
10 Things to Look for in a Token Project - June 2018 @ Money Conference
10 Things to Look for in a Token Project - June 2018 @ Money Conference10 Things to Look for in a Token Project - June 2018 @ Money Conference
10 Things to Look for in a Token Project - June 2018 @ Money Conference
 
Blockchain Solution in China eCommerce
Blockchain Solution in China eCommerceBlockchain Solution in China eCommerce
Blockchain Solution in China eCommerce
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO
Simple Token 6.0 (OLD version) - for 14 November, 2017 ICO
 
Simple Token - V7.0 Project Deck for 14 November, 2017 ICO
Simple Token - V7.0 Project Deck for 14 November, 2017 ICOSimple Token - V7.0 Project Deck for 14 November, 2017 ICO
Simple Token - V7.0 Project Deck for 14 November, 2017 ICO
 
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
NFT 2023 Investing For Beginners to Advance Non-Fungible Tokens Guide Create,...
 
Hacking the blockchain
Hacking the blockchainHacking the blockchain
Hacking the blockchain
 
CryptoCamp Version 1.0 as of Mar. 15, 2019
CryptoCamp Version 1.0 as of Mar. 15, 2019CryptoCamp Version 1.0 as of Mar. 15, 2019
CryptoCamp Version 1.0 as of Mar. 15, 2019
 
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICO
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICOSimple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICO
Simple Token - V5.7 (Older version) -- Follow link below for Version 7.0 for ICO
 
Cryptopreneur - Business Model
Cryptopreneur - Business ModelCryptopreneur - Business Model
Cryptopreneur - Business Model
 
Security is broken V3.0
Security is broken V3.0Security is broken V3.0
Security is broken V3.0
 
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...
How Will Our Business Adapt to & Use New Financial Technologies (Caltech/Stat...
 
Cryptocurrency And NSE Stock Market: A Comparative Data Analysis
Cryptocurrency And NSE Stock Market: A Comparative Data AnalysisCryptocurrency And NSE Stock Market: A Comparative Data Analysis
Cryptocurrency And NSE Stock Market: A Comparative Data Analysis
 
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 
Introduction to blockchain_hcmc_20170820
Introduction to blockchain_hcmc_20170820Introduction to blockchain_hcmc_20170820
Introduction to blockchain_hcmc_20170820
 
ICO Pitchnight #1 by Catena Capital & Herdius and friends
ICO Pitchnight #1 by Catena Capital & Herdius and friendsICO Pitchnight #1 by Catena Capital & Herdius and friends
ICO Pitchnight #1 by Catena Capital & Herdius and friends
 
Using Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain TransparencyUsing Blockchain to Increase Supply Chain Transparency
Using Blockchain to Increase Supply Chain Transparency
 
Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency Introduction to Bitcoin and Crypto-currency
Introduction to Bitcoin and Crypto-currency
 

More from Jorge Sebastiao

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchainJorge Sebastiao
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3Jorge Sebastiao
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startupsJorge Sebastiao
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3Jorge Sebastiao
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0Jorge Sebastiao
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart CityJorge Sebastiao
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0Jorge Sebastiao
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsJorge Sebastiao
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Jorge Sebastiao
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Jorge Sebastiao
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumJorge Sebastiao
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasJorge Sebastiao
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?Jorge Sebastiao
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Jorge Sebastiao
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityJorge Sebastiao
 
CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2Jorge Sebastiao
 
Togaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction OverviewTogaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction OverviewJorge Sebastiao
 
Protecting cloud computing using big data v11
Protecting cloud computing using big data v11Protecting cloud computing using big data v11
Protecting cloud computing using big data v11Jorge Sebastiao
 
Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"Jorge Sebastiao
 
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Jorge Sebastiao
 

More from Jorge Sebastiao (20)

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchain
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startups
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart City
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threats
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance Forum
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and Gas
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber security
 
CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2CYMASS Security Awareness Version 1.2
CYMASS Security Awareness Version 1.2
 
Togaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction OverviewTogaf Version 9.1 Introduction Overview
Togaf Version 9.1 Introduction Overview
 
Protecting cloud computing using big data v11
Protecting cloud computing using big data v11Protecting cloud computing using big data v11
Protecting cloud computing using big data v11
 
Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"Infosec is Broken “did you bring a knife to a gun fight?"
Infosec is Broken “did you bring a knife to a gun fight?"
 
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30Infowarcon2016 Are you ready Middle East Cyberwar updates v30
Infowarcon2016 Are you ready Middle East Cyberwar updates v30
 

Recently uploaded

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Blockchain & cyber security Algeria Version 1.1

  • 1. Blockchain & Cyber Security Algeria 28 Mar 2018 Jorge Sebastiao, CISSP CTO Eco-system Huawei http://linkedin.com/in/sebastiao/ Twitter: @4jorge
  • 2. Disclaimer & Copyright • Please note that this presentation is for informational, knowledge sharing and educational purposes only. Any comments or statements made herein do not necessarily reflect the views of Huawei. The information is intended for the recipient's use only and should not be cited, reproduced or distributed to any third party without the prior consent of the authors. Although great care is taken to ensure accuracy of information neither the author, nor Huawei can be held responsible for any decision made on the basis of the information cited. • The content of this presentation is based on information gathered in good faith from both primary and secondary sources and is believed to be correct at the time of publication. The author can however provide no guarantee regarding the accuracy of this content and therefore accepts no liability whatsoever for any actions taken that subsequently prove incorrect. • The practices listed in the document are provided as is and as guidance and the author and Huawei do not claim that these comprise the only practices to be followed. The readers are urged to make informed decisions in their usage. • The information presented in this presentation is not intended to be, and should not be construed as, an offer to sell any products or services or a solicitation of an offer to buy any products or services . Any such offer or sale will be made pursuant to, and the information presented at this meeting is qualified in its entirety by, authorized offering documents and related disclosure schedules or similar disclosure documentation. • All logos and brand names belong to their respective owners and we do not claim any relationship or association, implied or otherwise, with them. • Use of any materials by virtue of relationships and associations, if any, are mentioned explicitly. • Author has taken care to attribute all sources for external materials used in this presentation, and any oversight is regretted. If you, as owner, or as viewer, find any reason to dispute the use of these materials kindly communicate the same to author. • Any omissions, in terms of attribution, may be due to an error of author and not intentional.
  • 3. Are you ready Crypto Cyber Security Challenges? 1. Complex Attacks 2. Maturity Technology 3. Wallet & Exchanges 4. Malware 5. Vulnerabilities 6. Social Engineering 7. Best practices
  • 4. Hackers Focus where the money is
  • 5. MtGox- Fake Bitcoins attack 2011 •Hacker created fake Bitcoins (BTC) •Price online from $17.50-$. in 30min •2 million fake BTC manipulating trading DB •Compromised administrator account •Assigned $1M fake cash to account •Thief got away 2000 authentic BTC
  • 8. 3000 Bitcoin Miners Exposed 1. SSH 2. Telenet 3. Default Passwords
  • 9. CodeFork Malware Miner 1. Filess Malware 2. Monero Miner 3. APT
  • 10. Hidden Miners PirateBay & CBS's Showtime caught mining crypto-coins in viewers' web browser
  • 11. CryptoJacking everywhere •Browser • Plants • Super Computers • Cars • Mobiles
  • 12. FCC Threats Miners emissions •LTE •S4 •T-Mobile •Interference
  • 13. North Korea War Chest 1. Bitcoin 2. War Chest 3. South Korea Exchange Attacks
  • 14. $150M Raised DAO Attack $60M
  • 15. Hackers are looking for your Coins Intense Scan for • Coins • Wallets • Miners
  • 16. Bug in Pariti Multi-Sig Wallet Frozen $400M Ethereum
  • 18. Crypto Exchanges Hacked 1. Aug 2016 – Bitfinex - $61.8M 2. Jul 2016 – Kraken - $??? 3. Jul 2016 – itBit – Attempt 4. May 2016: Gatecoin - $2M 5. May 2016: SimpleFX – Email 6. Apr 2016: Shapeshift - $230K 7. Apr 2016: Yaykuy- Hacked Offline 8. Mar 2016: BitQuick – Customer Data 9. Mar 2016: Cointrader- All Data 10. Jan 2016: Cryptsy-13K-BTC Offline 11. Dec 2017 NiceHash $64M Social Engineering 12. Jan 2018: Black Wallet $400K 13. Feb 2018: Bitgrail $217M
  • 19. Zaif Japan Bitcoin at $0USD
  • 20. Mobile as your Identity 1. SS7 Vunerabilities 2. Intercept / Impersonate Calls 3. Intercept / Impersonate SMS 4. Reset Accounts Gmail… 5. Erase Cloud Storage 6. Erase Devices
  • 22. Smart Contracts Vulnerable 34,000 Smart Contracts Vulnerable
  • 23. Cold Storage Wallets Vulnerability
  • 26. 0 Day Exploits - Guaranteed
  • 28. NSA is tracking Bitcoin
  • 31. Social engineering UK dealer charged in US over multimillion-dollar fake Bitcoin site scam Fake trading platform for the cryptocurrency Bitcoin $5M in Mauritius, Morocco
  • 33. Fixing Blockchain Smart Contracts Best Practices Audits Governance Legislation
  • 34. Crypto Countermeasures 1. Securing your email account 2. Securing your social media 3. Enabling 2-factor authentication, biometrics 4. Vulnerability Management 5. Threat Management 6. Security Awareness Training 7. Incident Response Drills
  • 35. Apply - A6 - Process Business Risk Maturity
  • 36. Proper Security Metrics & Countermeasures
  • 37. Questions Jorge Sebastiao, CISSP CTO Eco-system Huawei http://linkedin.com/in/sebastiao/ Twitter: @4jorge