After A $65m Hack, Is Bitcoin Really Safe & Secure?

It seemed bitcoin exchange Bitfinex was doing all the right things. In the end, that didn’t stop hackers from stealing $65 million.

The latest in a long list of attacks on the digital currency since its birth in 2009 has been particularly vexing for the bitcoin community. Not only was Bitfinex the largest exchange for US dollar transactions, but the hack highlights that the industry hasn’t figured out critical security, despite years of learning from mistakes and making improvements to its infrastructure.

Even as the incident has triggered calls for audits in certain parts of the industry, experts don’t anticipate the investigations will unearth new ways of radically strengthening protection. What’s more telling, they say, is that the community’s willingness to vilify targets while shrugging off the need for industry-wide solutions is a sign it’s doomed to happen again.

“There is a long tradition of blaming the victim in the bitcoin community,” said Emin Gun Sirer, a Cornell University computer science professor who researches the currency. “But when you have a six-year long history of near-continuous key theft, at some point, we have to stop shirking off the responsibility.”

The fallout has been widespread. Bitfinex imposed a levy on customers to cover the lost $65 million, taking 36 percent of everyone’s assets whether they had been hit by the hackers or not.

The price of bitcoin also plunged on news of the hack, slashing the value of the digital currency well beyond Bitfinex. Collectively, investors have lost about $1.2 billion since the attack, according data from Coindesk.

That’s not to say bitcoin security hasn’t come far, through the efforts of thousands who work and volunteer to improve the digital currency. Since Mt. Gox, at one time the world’s largest exchange, was hacked for $450 million in early 2014, most venues have adopted tough security measures, including segregated client accounts, external audits of systems and two-factor authentication for securing logins.

Another step forward has been multi-signature security, which essentially splits the private keys attached to every bitcoin into several copies and hides them in multiple locations. The technology requires a sign-off from a majority of the copies (for example, two out of three) before the bitcoin can be moved again. That forces hackers to breach multiple systems before they can get access to funds.

Bitfinex made use of the technology and, as suggested by security experts, stored copies offline and with a third party, its security partner BitGo Inc. When it was implemented in June 2015, confidence was so high that BitGo’s chief executive officer boasted the system made “breaches such as those of Mt. Gox impossible.”

Bitfinex hasn't disclosed details of how hackers managed to compromise that system, saying the investigation is still pending. It did suspend its use of BitGo's technology and said hackers had increased withdrawal limits without BitGo realizing it.

BitGo has said its software functioned properly and denied its systems were breached. “Securing tiny electronic files from leaking - keys - pushes the bounds of known computer science,” Jeff Garzik, one of bitcoin’s earliest developers and founder of blockchain startup Bloq Inc., wrote in an e-mail. “Multi-sig raises that bar considerably, but nothing is perfect.”

After a hack thought ‘impossible’ just a year ago, bitcoin proponents are scrambling for solutions. Some argue that existing technology is strong enough to keep out hackers, but implementation has to be better. Individuals, for example, can protect themselves by storing bitcoin in individual wallets rather than at exchanges, which remain targets for attack.

“When users choose to store their bitcoin in a custodial wallet or exchange, they are giving the provider control over their bitcoins,” said Peter Smith, chief executive officer of Blockchain, which provides bitcoin wallets to individuals. “As a result, customers are not only subjected to the possibility that they will lose their funds via cybertheft but also that the provider can impose a tax to cover the loss of other clients, as Bitfinex is doing here.”

A more radical solution is to use technology to punish thieves. This summer, hackers siphoned off about $60 millions of Ethereum, the world’s second most-popular digital currency behind bitcoin. The community reacted by adopting a so-called hard fork, which effectively migrated users to a new version of Ethereum in which the theft never occurred.

The decision triggered a rebellion from a significant chunk of the community, who argued that nullifying the theft was a violation of Ethereum’s free market ethos. Given such extreme steps, some say the time has come for the bitcoin community to consider a form of regulation, either self-imposed or with the assistance of governments. The key, they say, will be educating regulators so that they don’t slow down innovation in the name of protecting consumers.

Some, including BitGo, have begun work with auditors like Deloitte LLP to standardize security requirements for the industry, although how and who would enforce the guidelines is unclear.

“Even bitcoin enthusiasts are slowly realizing that regulation is necessary,” said Trond Undheim, a former senior lecturer at Massachusetts Institute of Technology’s Sloan School of Management. “That’s the only way it will survive. That’s also the key to its wider adoption.”

Investors want solutions. Kay Van-Petersen, a strategist at Saxo Capital Markets, avoided Bitfinex but still saw a tenth of his bitcoin investment wiped out as prices dropped after the attack. “Every time an exchange gets hacked, it just looks bad on everybody,” he said.

Information-Management:

 

« Snowden: NSA Hacking Tools Leak Is ‘a warning’
The 3 Biggest Mistakes in Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of Maryland (CAMI)

CAMI’s mission is to create a global cybersecurity marketplace in Maryland and generate thousands of high-pay jobs through the cybersecurity industry.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

NetSecurity

NetSecurity

NetSecurity is a Brazilian company specializing in Information Security. We provide Managed Security Services (MSS), network security solutions and other specialist services.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Data Priva

Data Priva

Data Priva is the UK's leading subscription-based data protection, governance, risk and and compliance service.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

SIGLA Group

SIGLA Group

SIGLA Group specialize in the design and development of IT and OT solutions, from analysis to design, from implementation to commissioning, as well as consultancy, training and assistance.