After A $65m Hack, Is Bitcoin Really Safe & Secure?

It seemed bitcoin exchange Bitfinex was doing all the right things. In the end, that didn’t stop hackers from stealing $65 million.

The latest in a long list of attacks on the digital currency since its birth in 2009 has been particularly vexing for the bitcoin community. Not only was Bitfinex the largest exchange for US dollar transactions, but the hack highlights that the industry hasn’t figured out critical security, despite years of learning from mistakes and making improvements to its infrastructure.

Even as the incident has triggered calls for audits in certain parts of the industry, experts don’t anticipate the investigations will unearth new ways of radically strengthening protection. What’s more telling, they say, is that the community’s willingness to vilify targets while shrugging off the need for industry-wide solutions is a sign it’s doomed to happen again.

“There is a long tradition of blaming the victim in the bitcoin community,” said Emin Gun Sirer, a Cornell University computer science professor who researches the currency. “But when you have a six-year long history of near-continuous key theft, at some point, we have to stop shirking off the responsibility.”

The fallout has been widespread. Bitfinex imposed a levy on customers to cover the lost $65 million, taking 36 percent of everyone’s assets whether they had been hit by the hackers or not.

The price of bitcoin also plunged on news of the hack, slashing the value of the digital currency well beyond Bitfinex. Collectively, investors have lost about $1.2 billion since the attack, according data from Coindesk.

That’s not to say bitcoin security hasn’t come far, through the efforts of thousands who work and volunteer to improve the digital currency. Since Mt. Gox, at one time the world’s largest exchange, was hacked for $450 million in early 2014, most venues have adopted tough security measures, including segregated client accounts, external audits of systems and two-factor authentication for securing logins.

Another step forward has been multi-signature security, which essentially splits the private keys attached to every bitcoin into several copies and hides them in multiple locations. The technology requires a sign-off from a majority of the copies (for example, two out of three) before the bitcoin can be moved again. That forces hackers to breach multiple systems before they can get access to funds.

Bitfinex made use of the technology and, as suggested by security experts, stored copies offline and with a third party, its security partner BitGo Inc. When it was implemented in June 2015, confidence was so high that BitGo’s chief executive officer boasted the system made “breaches such as those of Mt. Gox impossible.”

Bitfinex hasn't disclosed details of how hackers managed to compromise that system, saying the investigation is still pending. It did suspend its use of BitGo's technology and said hackers had increased withdrawal limits without BitGo realizing it.

BitGo has said its software functioned properly and denied its systems were breached. “Securing tiny electronic files from leaking - keys - pushes the bounds of known computer science,” Jeff Garzik, one of bitcoin’s earliest developers and founder of blockchain startup Bloq Inc., wrote in an e-mail. “Multi-sig raises that bar considerably, but nothing is perfect.”

After a hack thought ‘impossible’ just a year ago, bitcoin proponents are scrambling for solutions. Some argue that existing technology is strong enough to keep out hackers, but implementation has to be better. Individuals, for example, can protect themselves by storing bitcoin in individual wallets rather than at exchanges, which remain targets for attack.

“When users choose to store their bitcoin in a custodial wallet or exchange, they are giving the provider control over their bitcoins,” said Peter Smith, chief executive officer of Blockchain, which provides bitcoin wallets to individuals. “As a result, customers are not only subjected to the possibility that they will lose their funds via cybertheft but also that the provider can impose a tax to cover the loss of other clients, as Bitfinex is doing here.”

A more radical solution is to use technology to punish thieves. This summer, hackers siphoned off about $60 millions of Ethereum, the world’s second most-popular digital currency behind bitcoin. The community reacted by adopting a so-called hard fork, which effectively migrated users to a new version of Ethereum in which the theft never occurred.

The decision triggered a rebellion from a significant chunk of the community, who argued that nullifying the theft was a violation of Ethereum’s free market ethos. Given such extreme steps, some say the time has come for the bitcoin community to consider a form of regulation, either self-imposed or with the assistance of governments. The key, they say, will be educating regulators so that they don’t slow down innovation in the name of protecting consumers.

Some, including BitGo, have begun work with auditors like Deloitte LLP to standardize security requirements for the industry, although how and who would enforce the guidelines is unclear.

“Even bitcoin enthusiasts are slowly realizing that regulation is necessary,” said Trond Undheim, a former senior lecturer at Massachusetts Institute of Technology’s Sloan School of Management. “That’s the only way it will survive. That’s also the key to its wider adoption.”

Investors want solutions. Kay Van-Petersen, a strategist at Saxo Capital Markets, avoided Bitfinex but still saw a tenth of his bitcoin investment wiped out as prices dropped after the attack. “Every time an exchange gets hacked, it just looks bad on everybody,” he said.

Information-Management:

 

« Snowden: NSA Hacking Tools Leak Is ‘a warning’
The 3 Biggest Mistakes in Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Issue53

Issue53

We empower organizations to thrive in the digital landscape. Strengthen your defenses, enhance resilience – Choose Issue53 for a secure and future-ready IT environment.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

Seven AI

Seven AI

Seven AI develops cyber security software designed to identify online threats.