While the blockchain itself is secure, digital currency holders are becoming the target of cybercriminals. BPM’s David Trepp explains how.
Earlier this year, a cybersecurity firm identified an elaborate cyberattack campaign designed to steal cryptocurrency users’ private keys to their digital wallets. This sophisticated Trojan program was a coordinated attack, targeting members of the crypto community by promoting apps on cryptocurrency forums, creating realistic and professional-looking websites and even paying a social media influencer to post about their fake crypto trading platform.
In his article on Dark Reading, BPM Partner David Trepp explains that cybercriminals target endpoints that connect to the blockchain, since that offers the best avenue of success for accessing money tied into blockchain. With more than $5 billion invested in cryptocurrency just last year, businesses and individuals in the crypto space have much at stake. The best defense, Trepp says, is educating employees on cyber tactics and phishing schemes.
About David Trepp
An avid technologist since he discovered programmable HP calculators in the 1970s, David has been a technology entrepreneur for over 30 years. David has led thousands of information security penetration test engagements for satisfied customers across all major industries throughout the United States and abroad. He has given dozens of presentations to audiences nationwide, on a variety of information security topics. David has worked in information security with commercial, healthcare, government, financial, utility, law enforcement and nonprofit organizations since 1998.
About BPM’s Information Security Assessment Services
The value of information security is often only recognized after a breach or incident has impacted a business and its bottom line. Without specific regulatory guidance, businesses are often unsure of the risk mitigation measures that are appropriate for their industry and threat environment. BPM understands how to balance information security and business needs. Our Comprehensive Penetration Testing service will identify vulnerabilities in your IT infrastructure, allowing you to make well-educated decisions on where to best allocate your resources. To learn more, visit our CyberSecurity Assessment page.