After A $65m Hack, Is Bitcoin Really Safe & Secure?

It seemed bitcoin exchange Bitfinex was doing all the right things. In the end, that didn’t stop hackers from stealing $65 million.

The latest in a long list of attacks on the digital currency since its birth in 2009 has been particularly vexing for the bitcoin community. Not only was Bitfinex the largest exchange for US dollar transactions, but the hack highlights that the industry hasn’t figured out critical security, despite years of learning from mistakes and making improvements to its infrastructure.

Even as the incident has triggered calls for audits in certain parts of the industry, experts don’t anticipate the investigations will unearth new ways of radically strengthening protection. What’s more telling, they say, is that the community’s willingness to vilify targets while shrugging off the need for industry-wide solutions is a sign it’s doomed to happen again.

“There is a long tradition of blaming the victim in the bitcoin community,” said Emin Gun Sirer, a Cornell University computer science professor who researches the currency. “But when you have a six-year long history of near-continuous key theft, at some point, we have to stop shirking off the responsibility.”

The fallout has been widespread. Bitfinex imposed a levy on customers to cover the lost $65 million, taking 36 percent of everyone’s assets whether they had been hit by the hackers or not.

The price of bitcoin also plunged on news of the hack, slashing the value of the digital currency well beyond Bitfinex. Collectively, investors have lost about $1.2 billion since the attack, according data from Coindesk.

That’s not to say bitcoin security hasn’t come far, through the efforts of thousands who work and volunteer to improve the digital currency. Since Mt. Gox, at one time the world’s largest exchange, was hacked for $450 million in early 2014, most venues have adopted tough security measures, including segregated client accounts, external audits of systems and two-factor authentication for securing logins.

Another step forward has been multi-signature security, which essentially splits the private keys attached to every bitcoin into several copies and hides them in multiple locations. The technology requires a sign-off from a majority of the copies (for example, two out of three) before the bitcoin can be moved again. That forces hackers to breach multiple systems before they can get access to funds.

Bitfinex made use of the technology and, as suggested by security experts, stored copies offline and with a third party, its security partner BitGo Inc. When it was implemented in June 2015, confidence was so high that BitGo’s chief executive officer boasted the system made “breaches such as those of Mt. Gox impossible.”

Bitfinex hasn't disclosed details of how hackers managed to compromise that system, saying the investigation is still pending. It did suspend its use of BitGo's technology and said hackers had increased withdrawal limits without BitGo realizing it.

BitGo has said its software functioned properly and denied its systems were breached. “Securing tiny electronic files from leaking - keys - pushes the bounds of known computer science,” Jeff Garzik, one of bitcoin’s earliest developers and founder of blockchain startup Bloq Inc., wrote in an e-mail. “Multi-sig raises that bar considerably, but nothing is perfect.”

After a hack thought ‘impossible’ just a year ago, bitcoin proponents are scrambling for solutions. Some argue that existing technology is strong enough to keep out hackers, but implementation has to be better. Individuals, for example, can protect themselves by storing bitcoin in individual wallets rather than at exchanges, which remain targets for attack.

“When users choose to store their bitcoin in a custodial wallet or exchange, they are giving the provider control over their bitcoins,” said Peter Smith, chief executive officer of Blockchain, which provides bitcoin wallets to individuals. “As a result, customers are not only subjected to the possibility that they will lose their funds via cybertheft but also that the provider can impose a tax to cover the loss of other clients, as Bitfinex is doing here.”

A more radical solution is to use technology to punish thieves. This summer, hackers siphoned off about $60 millions of Ethereum, the world’s second most-popular digital currency behind bitcoin. The community reacted by adopting a so-called hard fork, which effectively migrated users to a new version of Ethereum in which the theft never occurred.

The decision triggered a rebellion from a significant chunk of the community, who argued that nullifying the theft was a violation of Ethereum’s free market ethos. Given such extreme steps, some say the time has come for the bitcoin community to consider a form of regulation, either self-imposed or with the assistance of governments. The key, they say, will be educating regulators so that they don’t slow down innovation in the name of protecting consumers.

Some, including BitGo, have begun work with auditors like Deloitte LLP to standardize security requirements for the industry, although how and who would enforce the guidelines is unclear.

“Even bitcoin enthusiasts are slowly realizing that regulation is necessary,” said Trond Undheim, a former senior lecturer at Massachusetts Institute of Technology’s Sloan School of Management. “That’s the only way it will survive. That’s also the key to its wider adoption.”

Investors want solutions. Kay Van-Petersen, a strategist at Saxo Capital Markets, avoided Bitfinex but still saw a tenth of his bitcoin investment wiped out as prices dropped after the attack. “Every time an exchange gets hacked, it just looks bad on everybody,” he said.

Information-Management:

 

« Snowden: NSA Hacking Tools Leak Is ‘a warning’
The 3 Biggest Mistakes in Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

National Accreditation Agency of Ukraine (NAAU)

National Accreditation Agency of Ukraine (NAAU)

NAAU is the national accreditation body for Ukraine. The directory of members provides details of organisations offering certification services for ISO 27001.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

SCS Technology Solutions

SCS Technology Solutions

SCS Technology Solutions has become the preferred partner for top performing organisations across Lincolnshire for IT support and consultancy.

Defence Labs

Defence Labs

Defence Labs is a cybersecurity company specialising in cost effective penetration testing for small-to-medium sized enterprises.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.