Sun, Dec 22, 2024 | Jumada al-Aakhirah 21, 1446 | DXB ktweather icon0°C

From Bitcoin to the metaverse: Dangers behind blockchain evolution

Top Stories

Oded Vanunu, head of products Vulnerability at Check Point Software. — Supplied photo

Oded Vanunu, head of products Vulnerability at Check Point Software. — Supplied photo

Over the past 12 months, Check Point Research (CPR) has found serious security flaws in leading Web3 platforms such as OpenSea, Rarible and Everscale.

Published: Thu 26 May 2022, 1:57 PM

Updated: Fri 17 Jun 2022, 6:58 PM

Check Point Software Technologies, a leading provider of cyber security solutions globally, warns users of the persistent dangers of cryptocurrencies and provides recommendations to keep wallets safe. While the concept of Bitcoin and blockchain first came on the scene in 2008, things have progressed considerably since, including the introduction of Ethereum, Non-Fungible Tokens (NFTs), the metaverse and the Internet of Value.

Despite these advancements, there are still huge risks to users. Indeed, just last year, crypto scammers stole a record $14 billion. So what are these risks? Why are crypto scammers so successful? And what can users do to keep themselves safe?

Rapid innovation leaves vulnerabilities

Cryptocurrency is growing fast – in just fifteen years, the crypto asset market has grown to over $2 trillion. While innovation is great, the pace of development often leaves potential holes for breaches. Over the past 12 months, Check Point Research (CPR) has found serious security gaps in leading Web3 platforms such as OpenSea, Rarible and Everscale.

More focus on tech, less focus on security

Rapid innovation means new projects are coming out each day. The problem with this, however, is that there is not enough focus on securing what is being built. And the bigger risk here is that new frontiers, like the Metaverse, will then be built on an insecure foundation. In fact, security and privacy issues are the main concerns holding back the development of the metaverse.

Not enough security experts

According to the 2021 (ISC) Cybersecurity Workforce Study, the world is already lacking 2.72 million cybersecurity professionals, let alone any that specialise in Web3. The same study states that the global cybersecurity workforce needs to grow by 65 per cent to effectively defend organizations’ critical assets. That percentage is likely to be a lot higher if we also consider cryptocurrencies and the Metaverse.

“Bitcoin Day is a good reminder for us to look back and review the technological milestones the blockchain has achieved. Today with the big tech companies investing in the Metaverse, the fine-tuning of blockchain technologies and active innovations are creating the new internet - the internet of value. We now stand at the dawn of a new era, the metaverse era, and it will be fascinating to see what is to come and how we will secure its future," said Oded Vanunu, head of products Vulnerability at Check Point Software.

“In the meantime, users should remain aware of crypto wallet risks and remain vigilant when it comes to suspicious activity that may lead to theft. Threat actors will continue to expand their efforts in order to hijack crypto wallets while exploiting system vulnerabilities as we’ve already seen in 2022.”

How to stay protected

Blockchain transactions are irreversible. In blockchain, unlike a bank, you cannot block a stolen card or dispute a transaction. If the keys for your wallet are stolen, your crypto funds can become easy prey for cybercriminals, and therefore safety should be the user’s concern at all times. To prevent theft of keys, and as general safety tips, CPR recommends:

1.Do not open suspicious links, especially from a source you do not recognize.

2.Keep your OS, anti-virus software and cyber security software updated at all times.

3.Do not download software and browser extensions from unverified sources.

4.Be wary whenever receiving requests to sign any link within any marketplace

5.Prior to approving a request, users should carefully review what is being requested, and consider whether the request seems abnormal or suspicious.

6.If there are any doubts, users are advised to reject the request and examine it further before providing any kind of authorisation.

7.Users are advised to review and revoke token approvals under this link: https://etherscan.io/tokenapprovalchecker. — business@khaleejtimes.com



Next Story