• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Record $3.8bn Stolen Via Crypto in 2022

You are here: Home / General Cyber Security News / Record $3.8bn Stolen Via Crypto in 2022
February 2, 2023

North Korean condition-backed hackers and insecure decentralized finance (DeFi) protocols aided to make 2022 a document yr for cryptocurrency heists, in accordance to Chainalysis.

The blockchain analysis corporation teased the figures in advance of an impending yearly crypto criminal offense report.

A full of $3.8bn was stolen from cryptocurrency firms past yr, 82% of which resulted from concentrating on of weaknesses in DeFi protocols. This was up from 73% the past 12 months.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


North Korean hackers stole $1.7bn, the broad the vast majority of which ($1.1bn) came from DeFi, and particularly the attack on Ronin Network in March, which was calculated at the time to have expense the organization $618m.

Chainalysis stated cross-chain bridge protocols of the type targeted in that attack accounted for the greater part (64%) of DeFi protocol attacks.

“Cross-chain bridges are protocols that allow users port their cryptocurrency from 1 blockchain to an additional, typically by locking the user’s assets into a smart contract on the initial chain and then minting equal assets on the 2nd chain,” it stated.

“Bridges are an interesting target for hackers for the reason that the clever contracts in impact grow to be large, centralized repositories of resources backing the assets that have been bridged to the new chain – a more appealing honeypot could scarcely be imagined. If a bridge will get big sufficient, any error in its underlying clever agreement code or other prospective weak place is virtually absolutely sure to finally be located and exploited by poor actors.”

The intelligent deal code in DeFi is publicly viewable by default, which assists with transparency but also enables menace actors to scan for vulnerabilities, Chainalysis warned.

Code auditing carried out by third-party suppliers and a higher target by developers on security relatively than progress at all costs would support to mitigate risk, the report argued.

Chainalysis also claimed that North Korean hackers deliver big sums of stolen crypto to “mixers,” which mix the digital currencies of various users collectively to obfuscate their origins.

These de facto funds laundering equipment have caught the eye of regulators. Even so, when just one mixer common with North Korea (Tornado Money) was sanctioned by the US in August 2022, risk actors merely moved to another Sinbad.


Some pieces of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Researchers Warn of Crypto Scam Apps on Apple App Store
Next Post: Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout lacklustre leadership from dcms delays uk wide biometric identity platform rollout»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BreachForums Shuts Down After Admin’s Arrest
  • New Android Banking Trojan ‘Nexus’ Promoted As MaaS
  • CISA and NSA Enhance Security Framework With New IAM Guide
  • CISA Alerts on Critical Security Vulnerabilities in Industrial Control Systems
  • ScarCruft’s Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques
  • Surge in compromised credentials highlights rampant cyber hygiene failings
  • Preventing Insider Threats in Your Active Directory
  • Security Researchers Spot $36m BEC Attack
  • Just 1% of Dot-Org Domains Are Fully DMARC Protected
  • Ransomware Attacks Double in Europe’s Transport Sector

Copyright © TheCyberSecurity.News, All Rights Reserved.