Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses
Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses

Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses

Release Date: 09/27/2021

Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of threat vectors over the past twelve and a half years since the birth of bitcoin. Many of these threat vectors will target similar vulnerabilities as DLTs are deployed for financial technology (FinTech) and enterprise blockchain applications. These Top 10 DLT Attacks from the early days of virtual assets provide illustrative examples and costly lessons that can help develop blockchain applications that are protected from the top 10 attacks. Those attacks include: Exchange Hack, DeFi Hack, 51% Attack, Phishing, Rug Pull/Exit Scam, Ransomware, Investment Scam, High Profile Doubler Scam, Extortion, Fraudulent Services Key Takeaways: An understand of 10 popular DLT/blockchain attack The best practices to defend against attacks Concrete examples and case studies for each attack 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
10 Tips to Guide Your Cloud Email Security Strategy
10 Tips to Guide Your Cloud Email Security Strategy
Published: 04/17/2024
The Widening Overlap Between Cloud Workloads and Cybersecurity
The Widening Overlap Between Cloud Workloads and Cybersecurity
Published: 04/17/2024
How to Audit Your Outdated Security Processes
How to Audit Your Outdated Security Processes
Published: 04/16/2024
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Published: 04/12/2024

Acknowledgements

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

This person does not have a biography listed with CSA.

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Jyoti Ponnapalli
Jyoti Ponnapalli

Jyoti Ponnapalli

Jyoti Ponnapalli is the SVP, Head of Blockchain Innovation Strategy at Truist. She has more than 18 years of experience leading emerging technology and complex digital transformations for fortune 500 companies across a range of industries including Finance, Telecom, Airline, Energy, and Food & Beverage. Prior to joining Truist, she was a Director of Blockchain at DTCC leading strategic initiatives in support of efforts to modernize the fina...

Read more

Adalberto Valle Headshot Missing
Adalberto Valle

Adalberto Valle

This person does not have a biography listed with CSA.

Dave Jevans Headshot Missing
Dave Jevans

Dave Jevans

This person does not have a biography listed with CSA.

Kurt Seifried
Kurt Seifried
Chief Blockchain Officer & Director of Special Projects, CSA

Kurt Seifried

Chief Blockchain Officer & Director of Special Projects, CSA

For over 2 decades Kurt has been involved in the information security field, starting with Windows and Linux and continuing on to cloud and now Blockchain. With a strong focus on security and privacy Kurt brings a wealth of knowledge and experience to the CSA.

Read more

Julio Barragan Headshot Missing
Julio Barragan

Julio Barragan

This person does not have a biography listed with CSA.

John Jefferies Headshot Missing
John Jefferies

John Jefferies

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training