Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
How Vulnerable are Cryptocurrency Wallets to DNS Attacks?
Friends, as we now know countless of Myetherwallet users began to report suspicious activity on April 24, 2018 when trying to access the web-based Ethereum interface. As the web’s most popular client-side Ethereum wallet, MEW is widely used for buying Cryptokitties, sending money to crowdsales and beyond. BGP (Border Gateway Protocol) messages to the internet’s core routers to convince them to send traffic destined for some of AWS’s servers to a renegade box in the US. The rogue machine then acted as AWS’s DNS service, and gave out the wrong IP addresses for MyEtherWallet.com, pointing some unsuspecting visitors to the dot-com at a phishing site that stole their money. Bottom line: Just how vulnerable are today’s Cryptocurrency wallets to DNS and related cyber attacks? The April 24 event not only sent shockwaves through the MEW community but also calls into question of the integrity of the broader Cryptocurrency juggernaut. Send us your comments today! Lawrence, Cyber Security Defender
You must be logged in to reply to this topic.