ARTICLE
27 August 2019

Study Of Ethereum Vulnerabilities And Defenses Released, While Dusting And Mining Malware Attacks And Cryptojacking Continue

B
BakerHostetler

Contributor

BakerHostetler logo
Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
According to reports, late last week a large-scale dusting attack affected almost 300,000 litecoin wallets. By leveraging the divisibility of cryptocurrency
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

According to reports, late last week a large-scale dusting attack affected almost 300,000 litecoin wallets. By leveraging the divisibility of cryptocurrency, dusting attackers can target certain networks by sending tiny amounts of litecoin, bitcoin and other cryptocurrencies ("dust") to many different wallets. There can be a number of motives for this kind of attack.

Also this week, it was reported that crypto-mining malware was recently found hidden in popular Ruby code libraries. According to reports, half of the malicious libraries were blockchain-related, and they were downloaded hundreds of times.

An academic paper published last week surveyed Ethereum vulnerabilities, attacks and defenses. Aimed at an audience of researchers, practitioners and students, the paper highlights the need for more secure programming languages. The paper also discussed how Ethereum smart contracts introduce new kinds of vulnerabilities that do not have traditional counterparts. The authors systematize 26 attacks according to layers of the Ethereum architecture, as well as 47 proactive and reactive defenses.

For more information, please refer to the following links:

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More