sb-nz logo
Story image

Maximising blockchain’s potential with privilege controls - CyberArk

13 Mar 2019

Article by CyberArk A/NZ solutions engineering manager Andrew Slavkovic

Blockchain continues to be lauded as a technology that will open myriad new possibilities and solve endless business problems.

However, there are still many questions around how the distributed ledger technology can be best applied to securely conduct, verify and record the online transactions that cause the biggest headaches.

Following the rise in the value of Bitcoin and other cryptocurrencies, the size of the global blockchain technology market is set to reach US$7.59 billion by 2024 – representing a 37.2% compound annual growth rate over the next five years.

Estonia and other countries are taking the lead by migrating an increasing number of government services to blockchain-based transaction systems, however, the technology is still comparatively nascent in Australia.

The Australian government’s Digital Transformation Agency (DTA) recently declared that blockchain is still a solution looking for a problem.

While it finds the technology has potential, the DTA has not yet identified how blockchain can deliver better value for government services over other traditional solutions.

This national commentary is compounding the uncertainty around how to best secure blockchain and ensure its fit for purpose.

Blockchain, like any technology, has its downfalls.

Despite its inherently secure design, security is of particular concern.

While blockchain itself is considered to be ‘safe’, vulnerabilities can be targeted on the endpoints – where the technology interacts with less secure environments, such as common business networks. Business network infrastructure usually relies on standard IT components, including servers and databases, where cyber risks and vulnerabilities are well established.  

If an attacker is able to leverage a vulnerable entry point, such as an unprotected device or IoT sensor, and gain entry into a distributed ledger that doesn’t have the appropriate privilege controls in place, the application underpinned by blockchain is no longer secure.

One of the key threats leveraging this attack path is a new breed of malware known as cryptominers, which targets the cryptocurrency transactions that blockchain underpins.

Cryptominers take over a computer’s resources and uses them for illicit cryptocurrency mining.

The server, application, and ledger processes can be compromised, and attackers can tamper with the entries in the ledger.

Successful exploits can result in attackers being able to impersonate authenticated users and access sensitive data.  

Trend Micro reported that between January and July 2018, cryptomining attacks increased by nearly 1000% compared to the second half of 2017.

The appeal of cryptomining, compared with other exploits like ransomware, is the simple conversion of electricity and access to computer hardware into money – in most cases completely undetected.

Here are some tips for organisations looking to secure the blockchain against endpoint vulnerabilities:

  • Gain better control over the entire IT environment. By having more effective oversight – especially concerning IT administration activities and monitoring their use of privileges – businesses will have a greater understanding of both legitimate and suspicious activity.

  • Firewalls and antivirus software are not enough. Businesses must authenticate and record individual access into the blockchain environment to avoid fraudulent activity, and secure against privileged attacks that result in the compromise of the ledger.

  • Establish user security provisions. It’s a fine balance to retain user flexibility on the endpoint without compromising security. Containments and security policies can be added to allow applications to run when accessed by trusted users, and alternately block applications when suspicious activity is detected.

  • Leverage endpoint behavioural analytics. This emerging technology allows businesses to monitor and identify unusual activity. Such analysis will help businesses proactively lock down accounts with suspicious activity, thereby mitigating security risk in real time.  Once suspicious or malicious activities have been identified ensure the endpoint is able to take relevant actions to prevent further damage.

Blockchain has remarkable features that offer great potential.

Ground-breaking applications are being trialled across industries including financial services and healthcare.

However, businesses must ensure the environment the technology interacts with is secured.

Story image
UPDATED: RBNZ ascribes data breach to third-party file sharing service
“The nature and extent of information that has been potentially accessed is still being determined, but it may include some commercially and personally sensitive information,” says RBNZ Governor.More
Story image
Malware variants becoming increasingly prevalent, sophisticated and evolved
"The modern threat landscape and ongoing evolution of malware are loud factors pushing every business to understand and identify modern malware threats and the necessary precautions to take to protect against them."More
Story image
DDoS ransom attacks flare up again after brief hiatus
The second wave of attacks in December and January targeted organisations that were hit the first time and did not respond or pay the ransom. More
Story image
New year, time to update your passwords
The most popular passwords of 2020 were easy-to-guess number combinations, such as 123456, the word password, qwerty, iloveyou, and other uncomplicated options.More
Story image
Fortinet appoints new director of operation technology for A/NZ
Fortinet has appointed a new director of operational technology (OT) solutions in a bid to extend offerings to Australian and New Zealand customers.More
Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More