After over a decade of development and evolution, the global blockchain ecosystem in 2020 now includes a multitude of businesses and enterprises, for example, information system integrators, integrators of fintech, financial holdings, banks, life insurance companies, and other financial technology industries.
In addition, examples of the sectors related to the blockchain or cryptocurrency, or industries that have incorporated blockchain technology and achieved technological integration include Domestic and foreign cryptocurrency exchanges, cryptocurrency software, hardware wallets, healthcare, cashless payment, digital asset integrators, supply chains, logistic system companies, business services providers (hotels, restaurants, and other companies in the service industries), e-commerce (online shopping), innovation, media services, and businesses and industries that are prepared to achieve blockchain technology integration.
The blockchain ecosystem has undergone a remarkable boom in the past decade and is able to generate more value for all kinds of services. In the past, hackers set general servers or systems as the target for their attacks. In recent times, however, the whole blockchain ecosystem has become a lucrative target for cyber attacks.
After summarization and analysis, the blockchain ecosystem can be categorized into the following four categories below. Common forms of a cyberattack are also analyzed:
Figure 1 lists digital currency exchanges (DCE), different types of cryptocurrency wallets, payment ecosystems, and other e-commerce service software, programs, or platforms offered by players in blockchain-related service industries.
Among the common types of cyberattacks, damage or disruption to the network bandwidth (in the lower-left corner of the figure) includes DDoS (Distributed Denial-of-Service) attacks which aim to exhaust the resources of the targeted network or system to crash its services. Eg. Affecting normal transactions or causing currency fluctuations.
The second type of attack, is one targetting account systems (in the lower-left corner of the figure) including phishing, user-end cracking using reverse engineering, installing backdoor or Trojan viruses, scams and frauds, wiretapping, traffic analysis and masquerading, message modification, man-in-the-middle attacks, and so on. E.g. Stealing accounts, modifying addresses, and transferring ownership in digital assets.
Attacks to payment and relevant services platforms include exploiting vulnerabilities, loopholes, zero-day threats in web apps codes, using hacking software or self-developed software to intrude the information system and obtain the administrative permission to unlawfully use the system to gain legitimate access and authorization; ultimately stealing users’ important data or information, or transferring users’ digital asset. Learn more, please click here.