EmergentX Digital Asset Outlook 2022 - The Year of Consilience

Page 262

Digital Asset Outlook 2022

Theme 12. Cybersecurity

12.2 Key categories of cyberattacks related to cryptocurrency Cyberattackers are likely to take advantage of the digital asset transaction system vulnerabilities to commit crimes. Here are the different types of vulnerabilities that attackers and some specific examples frequently target. Figure 116. Cybersecurity for digital assets – Common vulnerabilities to cyberattacks Key cybersecurity vulnerabilities for digital assets

Detail

Selected examples

Digital asset accounts

Digital asset accounts are accessible and secured via private key. However, some users tend to store these keys on their PC, making them easily accessible for hackers.

April 2019 – A thief stole almost 45,000 ETH by successfully guessing weak private keys.

Digital asset exchanges

Certain digital asset exchanges are centralized, making them vulnerable to hacks and ransomware attacks.

2019 - Hackers stole $40 million from Binance through phishing

Frauds or scams are rampant in the digital assets space, such as in ICOs, fraudulent addresses.

US Federal Trade Commission (FTC) estimated that US consumers lost US$80 million to cryptocurrencyrelated scams in the period between Oct 2020 and May 2021; 2021 – South Korea has a crypto fraud case estimated to have involved a total of US$3.85 billion, taking the country’s losses in crypto scams to US$5 billion over the past five years.

Fraud or scams

Source: Gemini, Forkast, Crypto Head

262


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

13.2 Crypto-philanthropy – Key considerations for donors and non-profits

1min
page 274

13.1 What is Crypto-philanthropy?

0
page 273

12.5 Cybersecurity for digital assets – Industry metrics

1min
page 266

12.6 Cybersecurity for digital assets – Future outlook and key themes

7min
pages 267-272

12.4 How cybersecurity adds value to the existing digital assets ecosystem

0
page 265

12.3 Potential solutions to cybersecurity attacks

1min
page 264

12.2 Key categories of cyberattacks related to cryptocurrency

3min
pages 262-263

12.1 Cybersecurity in the context of digital assets

2min
pages 260-261

1.7 Approaches for gaining exposure to digital assets

12min
pages 62-68

1.6 Digital asset in portfolio construction

1min
page 61

1.5 Valuation approaches to digital assets

2min
pages 59-60

1.4 Digital asset as an investable asset class

20min
pages 46-58

1.2 Characteristics of digital assets

0
page 44

Theme 12: Cybersecurity in 2022

1min
pages 35-36

Bonus Theme: Crypto-Philanthropy in 2022

5min
pages 37-40

Theme 11: Consensus Mechanisms in 2022

1min
page 34

Theme 9: Blockchain Scalability in 2022

1min
page 32

Theme 10: Tokenomics in 2022

1min
page 33

Theme 6: Regulation and Institutionalization in 2022

3min
pages 27-28

Theme 7: Centralized and Decentralized Exchanges in 2022

1min
pages 29-30

Theme 1: Digital Asset Economy in 2022

2min
pages 17-18

Theme 4: NFT and Metaverse in 2022

3min
pages 23-24

Theme 5: Blockchain Gaming in 2022

1min
pages 25-26

Theme 8: Asset Tokenization in 2022

1min
page 31

Theme 3: DeFi in 2022

2min
pages 21-22

Theme 2: Web 3.0 in 2022

1min
pages 19-20
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.