Monday, August 20, 2018

Mining Malware at Fault a Cryptocurrency Theft of Some $87B in China

Colleagues, as we have previously reported mining malware has far outpaced the growth of ransomware over the past year when it comes to cryptocurrency theft. The most recent example is the theft in China valued at $87B of cryptocurrency by mining malware at the hands of three cyber criminals. Although details are limited, we understand this malware crime to be launched by Chinese nationals against Chinese cryptocurrency investors. To date we have seen many mining malware crimes initiated from within China targeting cryptocurrency investors located abroad.  McAfee Labs’ Threats Report for June 2018 identified more than 2.9 million samples of crypto-mining malware in Q1 2018 alone versus 400k attacks in Q4 2017 Q4 with JavaScript being the tool of choice when targeting web browsers. Bottom line: Both individual as well as corporate crypto investors need to be proactive in preventing crypto theft. Individuals needs to ensure the security on their computers and smartphones is as robust and up-to-date as possible, while institutions (corporations and telecom carriers) need to focus on router security. Share your comments today! Lawrence – Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com/

Thursday, August 16, 2018

How critical in SIM Swap Fraud theft to cryptocurrency investors?

Colleagues, when members of the cryptocurrency ecosystem assess security threats SIM Swap Fraud likely ranks quite low on the priority list. Nevertheless, for cryptocurrency investors who use software-based crypto wallets the impact of SIM Swap Fraud can be significant. Case I point is the $224m law suit filed against AT&T by crypto investor Michael Terpin. Such fraud is a form of identity theft in which thieves convince untrained or unsuspecting telecom carrier and smartphone vendor support staff of the need to upgrade a SIM card. In turn the thieves gain access to most all of the phones apps and security information. The US Federal Trade Commission has been aware of this scheme for at least two years, however, there is little evidence that phone manufacturers and carriers have implemented protocols (e.g. human factors prevention methods) to reduce such crime. SIM Swap Fraud takes advantage of the rise of cryptocurrency software wallets and identify theft schemes. Cryptocurrency investors need to assess the risk-reward level of software vs. hardware vs. paper wallets along with their vulnerability to ID theft. Bottom line: SIM Swap Fraud is one more weakness is the broader crypto ecosystem which traders and investors need to mitigate. Share your comments today! Lawrence – Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com/

Wednesday, August 15, 2018

What impact will Axoni’s AxCore distributed ledger have on Blockchain auditing and assurance?

Colleagues, the holy grail of Blockchain-based distributed ledgers is likely to be auditability and assurance for domestic and trans-border financial transactions. Auditability and assurance in the Blockchain world are synonyms for “transparency” … the elusive element that has been a critical barrier to adoption for cryptocurrencies. Enter AxCore, the new auditable distributed ledger technology from Axoni which has raised some $55m venture capital in total from the likes of Andreessen Horowitz, Goldman Sachs, JP Morgan, Wells Fargo and other firms with a vested stake in fintech. While still in its infancy AxCore’s auditable distributed ledger technology is a potential breakthrough which could propel Blockcain in general and leading cryptocurrencies in specific from early adopter to mass market adoption. A recent report from AICPA entitled “Audit & Assurance Alert — Blockchain Technology and Its Potential Impact on the Audit and Assurance Profession” could be a forerunner to such a technology paradigm shift with major implications for the broader cryptosphere and fintech ecosystem. Share your comments today! Lawrence – Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com/

Tuesday, August 14, 2018

Crypto Money Laundering, Fraud and Mining Malware Drive Increase in FinCEN SARs

Colleagues, over the past year Financial Crimes Enforcement Network (FinCEN) – a branch of the US Treasury - has reported a significant increase in Suspicious Activity Reports (SARs). Money laundering, fraud and mining malware complaints by financial institutions have all contributed to a rise in SARs to over 1500 per month. It is no wonder that the rise in SARs is directly correlated with in growth in cryptocurrency market capitalization. And in turn, cybercrime – which are at the core of SARs – also correlates the number and trading volume of cryptocurrencies. FinCEN offers an online SAR Stats reporting tool in their web site. Bottom line: The Cryptocurrency Academy and Cyber Security Defender propose the formation of cybercrime protection alliance between the US Treasury, financial institutions, crypto exchanges and security vendors with the goal of reducing cybercrime related to the cryptocurrency ecosystem. Share your comments today! Lawrence – Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com/

Monday, August 13, 2018

How will Bitcoin’s emerging crypto monopoly impact global cryptocurrency markets?

Colleagues, despite an aggregate decline in total cryptocurrency market cap since early CY2018, Bitcoin’s percent of total market value has reached staggering 50% threshold. Data also reveal that the top 5 cryptocurrencies – Bitcoin, Ethereum, Bitcoin Cash, Litecoin and Ripple – control almost 60% of the global crypto market. View the data from CoinMarketCap tracking stats. The Cryptocurrency Academy and the Cyber Security Defender draw two key conclusions from these numbers. First, is the definitive market vale concentration – which is nearing monopoly status – around Bitcoin. Thus, the extended crypto ecosystem needs to serve customers by developing tools and applications which are purpose-built for Bitcoin. Second, is the rapid bi-furcation of the global cryptocurrency market between the “Big 5” and the second-tier cryptocurrencies which serve niche geographic- and application-specific markets. We believe that bad actors – such as Russia, Iran, North Korea, Syria, ISIS, and AOAP - will be the primary users of this cryptocurrency underclass of as they seek to evade economic sanctions and conduct nefarious financial transactions with little-to-no transparency. Share your comments today! Lawrence – Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com/

Saturday, August 11, 2018

Does Bitmain’s Plans Signal a Major Wave of Crypto IPOs?

Colleagues, by most accounts China-based Bitmain is the world’s largest cryptocurrency mining operator and manufacturer of mining CPU-GPUs. Potentially valued at some $18 B Bitmain’s IPO could usher in a major trend for crypto-blockchain companies with plans to move out of the shadows and go public. Bitmain controls about 40% crypto mining pools and over 66% of mining equipment. The Cryptocurrency Academy does not find this move a surprise. Rather, we fully expect several IPOs over the coming 12-24 months of industry-leading crypto and blockchain ecosystem players to go public. This includes crypto exchanges, mining equipment vendors and mining operators, blockchain software firms and custody service companies as the industry matures. Which firms come to mind? Crypto exchange Binance and OKEx, Mining pools and Bitmain competitors BTC.com and AntPool. Blockchain software players Kik Interactive, Coindesk and EOS.io just to name a few. Such IPOs are in addition to the tsunami of cryptocurrency ICOs witnessed during the past two years. Share your comments today! Lawrence – Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com/)  

Friday, August 10, 2018

Cyber Attacks Targeting Crypto Mining Continue to Infect Hundreds of Thousands of Devices

Colleagues, 2018 has seen the meteoric rise in cyber-attacks focusing on crypto mining applications. Thus, it is no surprise that over 170,000 consumer devices in Brazil which operate under MicroTik routers were infected with Coinhive mining software. Both SkyBox and Trustwave security firms affirms such attacks. We reported earlier this week that some 32% of cyber-attacks now involve crypto mining which far outweighs the relatively modest 8% of ransomware attacks. The weakest link in the crypto ecosystem appears to be network routers. Our previous post cited Cisco routers. Now MicroTik is also on the target list. Bottom line: Whether corporate or service provider networks, router hygiene is of utmost importance. Keeping all security software and patches up-to-date has become more critical than ever. We recommend that IT professionals managing routers increase their vigilance by:  A) Tracking security threats, and B) Maintaining security software. Each router vendor maintain security threat alerts and mitigation tactics on their web sites. Bottom line: The cyber threat against network routers by nefarious crypto miners is likely to get much worse until vendors can make a quantum leap forward in their security measures. Share your comments today! Lawrence – Cryptocurrency Academy (https://cryptocurrencyacademy.blogspot.com/