\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

The threat posed by AI technology goes beyond voice cloning. Earlier this year, OpenAI, the company behind the popular AI chatbot ChatGPT, introduced a voice replication tool called Voice Engine but chose not to make it widely available due to concerns about misuse. As AI becomes more adept at mimicking human voices, there are growing concerns about its potential for misuse, from financial fraud to spreading misinformation.<\/p>\n\n\n\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Starling Bank is urging people to take steps to protect themselves by agreeing on a \"safe phrase\" <\/em>with family members. This simple, random phrase can be used to verify the identity of the person on the other end of the call, providing an extra layer of security. However, the bank advises that this phrase should not be shared via text, and if it is, the message should be deleted immediately to prevent it from being intercepted by fraudsters.<\/p>\n\n\n\n

The threat posed by AI technology goes beyond voice cloning. Earlier this year, OpenAI, the company behind the popular AI chatbot ChatGPT, introduced a voice replication tool called Voice Engine but chose not to make it widely available due to concerns about misuse. As AI becomes more adept at mimicking human voices, there are growing concerns about its potential for misuse, from financial fraud to spreading misinformation.<\/p>\n\n\n\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

Preventive Measures By Sterling Bank<\/h2>\n\n\n\n

Starling Bank is urging people to take steps to protect themselves by agreeing on a \"safe phrase\" <\/em>with family members. This simple, random phrase can be used to verify the identity of the person on the other end of the call, providing an extra layer of security. However, the bank advises that this phrase should not be shared via text, and if it is, the message should be deleted immediately to prevent it from being intercepted by fraudsters.<\/p>\n\n\n\n

The threat posed by AI technology goes beyond voice cloning. Earlier this year, OpenAI, the company behind the popular AI chatbot ChatGPT, introduced a voice replication tool called Voice Engine but chose not to make it widely available due to concerns about misuse. As AI becomes more adept at mimicking human voices, there are growing concerns about its potential for misuse, from financial fraud to spreading misinformation.<\/p>\n\n\n\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

See Related: <\/em><\/strong>OpenAI Has Recently Unveiled Their Latest Voice Engine, Which Is Capable Of Cloning Human Voices<\/a><\/p>\n\n\n\n

Preventive Measures By Sterling Bank<\/h2>\n\n\n\n

Starling Bank is urging people to take steps to protect themselves by agreeing on a \"safe phrase\" <\/em>with family members. This simple, random phrase can be used to verify the identity of the person on the other end of the call, providing an extra layer of security. However, the bank advises that this phrase should not be shared via text, and if it is, the message should be deleted immediately to prevent it from being intercepted by fraudsters.<\/p>\n\n\n\n

The threat posed by AI technology goes beyond voice cloning. Earlier this year, OpenAI, the company behind the popular AI chatbot ChatGPT, introduced a voice replication tool called Voice Engine but chose not to make it widely available due to concerns about misuse. As AI becomes more adept at mimicking human voices, there are growing concerns about its potential for misuse, from financial fraud to spreading misinformation.<\/p>\n\n\n\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

People frequently post content online, including audio or video recordings of their voice, without considering the potential risk this poses. The ability of AI to mimic voices is advancing rapidly, and it only takes a few seconds of audio for a fraudster to create an effective clone. This makes it easier than ever for scammers to prey on the emotional bonds between family members, tricking people into sending money to what they believe are loved ones in need.<\/p>\n\n\n\n

See Related: <\/em><\/strong>OpenAI Has Recently Unveiled Their Latest Voice Engine, Which Is Capable Of Cloning Human Voices<\/a><\/p>\n\n\n\n

Preventive Measures By Sterling Bank<\/h2>\n\n\n\n

Starling Bank is urging people to take steps to protect themselves by agreeing on a \"safe phrase\" <\/em>with family members. This simple, random phrase can be used to verify the identity of the person on the other end of the call, providing an extra layer of security. However, the bank advises that this phrase should not be shared via text, and if it is, the message should be deleted immediately to prevent it from being intercepted by fraudsters.<\/p>\n\n\n\n

The threat posed by AI technology goes beyond voice cloning. Earlier this year, OpenAI, the company behind the popular AI chatbot ChatGPT, introduced a voice replication tool called Voice Engine but chose not to make it widely available due to concerns about misuse. As AI becomes more adept at mimicking human voices, there are growing concerns about its potential for misuse, from financial fraud to spreading misinformation.<\/p>\n\n\n\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

A story originally reported by CNN quoted that according to a recent survey conducted by Starling Bank<\/a> and Mortar Research, more than a quarter of respondents had been targeted by an AI voice-cloning scam within the last year. What\u2019s more worrying is that 46% of those surveyed didn\u2019t even know such scams existed, leaving them vulnerable to deception. In some cases, the survey found that 8% of people would willingly send money even if the phone call seemed suspicious, simply because the voice sounded familiar.<\/p>\n\n\n\n

People frequently post content online, including audio or video recordings of their voice, without considering the potential risk this poses. The ability of AI to mimic voices is advancing rapidly, and it only takes a few seconds of audio for a fraudster to create an effective clone. This makes it easier than ever for scammers to prey on the emotional bonds between family members, tricking people into sending money to what they believe are loved ones in need.<\/p>\n\n\n\n

See Related: <\/em><\/strong>OpenAI Has Recently Unveiled Their Latest Voice Engine, Which Is Capable Of Cloning Human Voices<\/a><\/p>\n\n\n\n

Preventive Measures By Sterling Bank<\/h2>\n\n\n\n

Starling Bank is urging people to take steps to protect themselves by agreeing on a \"safe phrase\" <\/em>with family members. This simple, random phrase can be used to verify the identity of the person on the other end of the call, providing an extra layer of security. However, the bank advises that this phrase should not be shared via text, and if it is, the message should be deleted immediately to prevent it from being intercepted by fraudsters.<\/p>\n\n\n\n

The threat posed by AI technology goes beyond voice cloning. Earlier this year, OpenAI, the company behind the popular AI chatbot ChatGPT, introduced a voice replication tool called Voice Engine but chose not to make it widely available due to concerns about misuse. As AI becomes more adept at mimicking human voices, there are growing concerns about its potential for misuse, from financial fraud to spreading misinformation.<\/p>\n\n\n\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

These scams are unsettlingly simple. Fraudsters need only a few seconds of someone's voice, often found in videos posted online, to create a replica. With this AI-generated voice, they can impersonate the victim and make phone calls to friends or family members, requesting money or sensitive information.<\/p>\n\n\n\n

A story originally reported by CNN quoted that according to a recent survey conducted by Starling Bank<\/a> and Mortar Research, more than a quarter of respondents had been targeted by an AI voice-cloning scam within the last year. What\u2019s more worrying is that 46% of those surveyed didn\u2019t even know such scams existed, leaving them vulnerable to deception. In some cases, the survey found that 8% of people would willingly send money even if the phone call seemed suspicious, simply because the voice sounded familiar.<\/p>\n\n\n\n

People frequently post content online, including audio or video recordings of their voice, without considering the potential risk this poses. The ability of AI to mimic voices is advancing rapidly, and it only takes a few seconds of audio for a fraudster to create an effective clone. This makes it easier than ever for scammers to prey on the emotional bonds between family members, tricking people into sending money to what they believe are loved ones in need.<\/p>\n\n\n\n

See Related: <\/em><\/strong>OpenAI Has Recently Unveiled Their Latest Voice Engine, Which Is Capable Of Cloning Human Voices<\/a><\/p>\n\n\n\n

Preventive Measures By Sterling Bank<\/h2>\n\n\n\n

Starling Bank is urging people to take steps to protect themselves by agreeing on a \"safe phrase\" <\/em>with family members. This simple, random phrase can be used to verify the identity of the person on the other end of the call, providing an extra layer of security. However, the bank advises that this phrase should not be shared via text, and if it is, the message should be deleted immediately to prevent it from being intercepted by fraudsters.<\/p>\n\n\n\n

The threat posed by AI technology goes beyond voice cloning. Earlier this year, OpenAI, the company behind the popular AI chatbot ChatGPT, introduced a voice replication tool called Voice Engine but chose not to make it widely available due to concerns about misuse. As AI becomes more adept at mimicking human voices, there are growing concerns about its potential for misuse, from financial fraud to spreading misinformation.<\/p>\n\n\n\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT
\n

In a growing concern for everyday online users, Starling Bank has issued a warning about a new wave of scams using artificial intelligence (AI) to clone people\u2019s voices. The bank has raised the alarm that millions could be vulnerable to this increasingly sophisticated fraud.<\/p>\n\n\n\n

These scams are unsettlingly simple. Fraudsters need only a few seconds of someone's voice, often found in videos posted online, to create a replica. With this AI-generated voice, they can impersonate the victim and make phone calls to friends or family members, requesting money or sensitive information.<\/p>\n\n\n\n

A story originally reported by CNN quoted that according to a recent survey conducted by Starling Bank<\/a> and Mortar Research, more than a quarter of respondents had been targeted by an AI voice-cloning scam within the last year. What\u2019s more worrying is that 46% of those surveyed didn\u2019t even know such scams existed, leaving them vulnerable to deception. In some cases, the survey found that 8% of people would willingly send money even if the phone call seemed suspicious, simply because the voice sounded familiar.<\/p>\n\n\n\n

People frequently post content online, including audio or video recordings of their voice, without considering the potential risk this poses. The ability of AI to mimic voices is advancing rapidly, and it only takes a few seconds of audio for a fraudster to create an effective clone. This makes it easier than ever for scammers to prey on the emotional bonds between family members, tricking people into sending money to what they believe are loved ones in need.<\/p>\n\n\n\n

See Related: <\/em><\/strong>OpenAI Has Recently Unveiled Their Latest Voice Engine, Which Is Capable Of Cloning Human Voices<\/a><\/p>\n\n\n\n

Preventive Measures By Sterling Bank<\/h2>\n\n\n\n

Starling Bank is urging people to take steps to protect themselves by agreeing on a \"safe phrase\" <\/em>with family members. This simple, random phrase can be used to verify the identity of the person on the other end of the call, providing an extra layer of security. However, the bank advises that this phrase should not be shared via text, and if it is, the message should be deleted immediately to prevent it from being intercepted by fraudsters.<\/p>\n\n\n\n

The threat posed by AI technology goes beyond voice cloning. Earlier this year, OpenAI, the company behind the popular AI chatbot ChatGPT, introduced a voice replication tool called Voice Engine but chose not to make it widely available due to concerns about misuse. As AI becomes more adept at mimicking human voices, there are growing concerns about its potential for misuse, from financial fraud to spreading misinformation.<\/p>\n\n\n\n

Looking ahead, the risks associated with AI-driven scams are likely to expand. As technology becomes more advanced and accessible, scammers will find new ways to exploit it. Consumers must remain vigilant, not just in guarding their financial information but in understanding the new vulnerabilities created by digital footprints.<\/p>\n\n\n\n

Starling Bank's advice to agree on a safe phrase is a simple yet effective solution for now, but as AI technology continues to develop, there will be a growing need for more sophisticated safeguards. While innovation promises many benefits, it\u2019s clear that the rapid pace of AI development also poses new challenges, making it crucial for both individuals and institutions to stay one step ahead of cybercriminals.<\/p>\n","post_title":"Starling Bank Warns How Voice-Cloning Technology Puts Millions At Risk","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"starling-bank-warns-how-voice-cloning-technology-puts-millions-at-risk","to_ping":"","pinged":"","post_modified":"2024-09-25 19:10:49","post_modified_gmt":"2024-09-25 09:10:49","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=18852","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":11031,"post_author":"12","post_date":"2023-04-18 23:53:23","post_date_gmt":"2023-04-18 13:53:23","post_content":"\n

MetaMask announced that a cybersecurity threat has hit their platform; users who submitted a customer support ticket from August 1st 2021 to February 10th 2023, have had some of their emails leaked, around 7000 to be exact.<\/p>\n\n\n\n

ConsenSys, the parent company of MetaMask, made a statement<\/a> regarding the cyberattack;<\/p>\n\n\n\n

\"A third-party service provider that provides customer support ticketing services to ConsenSys was the target of a cyber-security incident...unauthorised actors gained access to the third-party service provider\u2019s systems...users who submitted personal data to our customer support may have had that data accessed by an unauthorised third party.\"<\/em><\/p>\n\n\n\n

ConsenSys stated that the \u201cthreat is no longer on-going.\u201d<\/em><\/p>\n\n\n\n

Phishing Attacks And Security Within Crypto<\/h2>\n\n\n\n

A common threat when emails are leaked are phishing attacks. These are cyberattacks which bad players will formulate an email pretending to be a well-known organisation in the hopes that a user will give up sensitive information. <\/p>\n\n\n\n

In reference to phishing attacks, ConsenSys stated, \"we ask that you be extremely vigilant for any suspicious activity and unsolicited contacts which may be made to you by phone, text, email or instant message.\"<\/em> Apart of many companies nowadays are anti-phishing phrases, so make sure that if you're recieving messages from an exchange or other company, your phrase is there.<\/p>\n\n\n\n

MetaMask has been victim to various phishing scams this year through Namecheap<\/a>, they also warned of another fake airdrop<\/a> token launch.<\/p>\n\n\n\n

This incident highlights the importance of strong security for users and businesses alike. Ensure never to share your private keys, verify that you're not receiving phishing emails, and stay vigilant when there is any contact with someone relating to your private data.<\/p>\n","post_title":"MetaMask Hit With Cyberattack; 7000 User's Emails Threatened","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"metamask-hit-with-cyberattack-7000-users-emails-threatened","to_ping":"","pinged":"","post_modified":"2023-04-18 23:55:28","post_modified_gmt":"2023-04-18 13:55:28","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=11031","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10946,"post_author":"12","post_date":"2023-04-15 13:52:58","post_date_gmt":"2023-04-15 03:52:58","post_content":"\n

In a blog post<\/a> titled \"New initiatives to reduce the risk of vulnerabilities and protect researchers,\"<\/em> Head of Security Policy at Google, Charley Snyder, announced that;<\/p>\n\n\n\n

\"We are pleased to be founding members of the Hacking Policy Council, a group of like-minded organizations and leaders who will engage in focused advocacy to ensure new policies and regulations support best practices for vulnerability management and disclosure, and do not undermine our user\u2019s security.\"<\/em><\/p>\n\n\n\n

The other companies joining Google in the Hacking Policy Council<\/a> include; Intel, HackerOne, Bugcrowd, Intigriti, and Luta Security. This organisation aims to create a favourable legal environment for vulnerability disclosure and management, bug bounties and security research, among other factors.<\/p>\n\n\n\n

Improving The Ecosystem; Escaping The Doom Loop<\/h2>\n\n\n\n

Google's announcement states that cyber security risks often remain even after they're known and fixed, and new cyber security risks are often adaptations from previously patched ones.<\/p>\n\n\n\n

An accompanying whitepaper<\/a> titled \"Escaping The Doom Loop\" <\/em>was released by Google. The doom loop is the endless cycle of vulnerability, followed by patch, followed by vulnerability will be mitigated only by \"focusing on the fundamentals of secure software development, good patch hygiene, and designing for security and ease of patching from the start.\"<\/em><\/p>\n\n\n\n

The whitepaper proposes a new response to these risks which include; greater transparency in vulnerability exploitation and patch adoption to deduce if current approaches are working, more attention on friction points to ensure risks to users are being comprehensively addressed, address the root cause\u00a0of vulnerabilities and prioritize modern secure software development, and protect good-faith security researchers\u00a0who make significant\u00a0contributions\u00a0to security through their efforts to find vulnerabilities before attackers can exploit them - these researchers are often met with legal threats and misunderstandings behind their intentions.<\/p>\n\n\n\n

Google also stated that \"independent security researchers make enormous contributions to security, including at\u00a0Google<\/a>,\"<\/em> so they're also developing a fund which would protect good-faith security research in legal cases. <\/p>\n","post_title":"Google Establishes A Hacking Policy Council Among Others; Cybersecurity And Vulnerability Management","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"google-establishes-a-hacking-policy-council-among-others-cybersecurity-and-vulnerability-management","to_ping":"","pinged":"","post_modified":"2023-04-15 18:30:50","post_modified_gmt":"2023-04-15 08:30:50","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10946","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":10884,"post_author":"12","post_date":"2023-04-13 14:49:02","post_date_gmt":"2023-04-13 04:49:02","post_content":"\n

The once loved, now disgraced crypto exchange FTX has had further details about the company's inner workings released in its latest bankruptcy report<\/a> from April 9th.<\/p>\n\n\n\n

Under a section titled \"Lack of security controls to protect crypto assets\", the report states that;<\/p>\n\n\n\n

\"The FTX Group failed to implement basic, widely accepted security controls to protect crypto assets. Each failure was egregious in the context of a business entrusted with customer transactions, and any one of the controls may have prevented the loss in the November 2022 Breach. Taken together, the failures were further magnified, since each control failure exacerbated the risk posed by the others.\"<\/em><\/p>\n\n\n\n

The November breach is in reference to a $650M breach just hours after Sam Bankman-Fried stepped down<\/a> as CEO.<\/p>\n\n\n\n

See Related: <\/strong><\/em>Bankrupt FTX Investigates $650M Hack, Users Warned To Delete FTX App<\/a><\/p>\n\n\n\n

Security, Encryption, Cold Storage, And Authentication<\/h2>\n\n\n\n

The report details that FTX didn't have a cybersecurity staff, or a Chief Information Security Officer either. These important jobs meant to protect the billions of dollars of customer assets were relied upon on two software developers - neither of which had formal training within this field.<\/p>\n\n\n\n

On top of this, \u201cthe FTX Group made little use of cold storage\u201d<\/em>. Instead they opted for hot storage for \"virtually all\"<\/em> assets, which has a direct link to the internet making these wallets hackable, compared to cold storage which remains offline. Using hot wallets is common place in exchanges, this allows liquidity to remain within the exchange, but often just enough is stored to keep assets liquid, the rest is put into cold storage - as it is far safer.<\/p>\n\n\n\n

See Related:<\/em><\/strong> Sam Bankman-Fried Released on a $250M Bail; Former FTX Executives Plead Guilty<\/a><\/p>\n\n\n\n

The phrase \"not your keys, not your coins\" is common place in the crypto industry, keys are the one barrier that prevent a bad player from stealing your assets, so it is understood that they should be protected with the upmost security. Well, the private keys and seed phrases were stored by FTX in plain text documents, no encryption, stored on AWS. These documents also weren't well organised and were left lying around different locations in their storage.<\/p>\n\n\n\n

FTX also \u201cfailed to implement in an appropriate fashion even the most widely accepted controls relating to Identity and Access Management,\u201d this is referring to multi-factor authentication which prevents someone accessing your account even if they have your password.<\/p>\n\n\n\n

The list goes on, but one thing is clear, if FTX weren't to blow up when it had, it was bound to happen sooner or later.<\/p>\n\n\n\n

See Related: <\/em><\/strong>FTX Co-Founder Pleads Guilty To Fraud Charges; Faces Up To 75 Years In Prison<\/a><\/p>\n","post_title":"FTXs Latest Bankruptcy Report Details Poor Financial Management And Cybersecurity","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"ftxs-latest-bankruptcy-report-details-poor-financial-management-and-cybersecurity","to_ping":"","pinged":"","post_modified":"2023-04-13 14:50:08","post_modified_gmt":"2023-04-13 04:50:08","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.thedistributed.co\/?p=10884","menu_order":0,"post_type":"post","post_mime_type":"","comment_count":"0","filter":"raw"}],"next":false,"total_page":false},"paged":1,"class":"jblog_block_13"};

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT

Cybersecurity

Most Read

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

ADVERTISEMENT