Cyber Security Threats to Bitcoin Exchanges: Adversary Exploitation and Laundering Techniques

Research output: Contribution to journalArticleScientificpeer-review

8 Citations (Scopus)

Abstract

Bitcoin is gaining traction as an alternative store of value. Its market capitalization transcends all other cryptocurrencies in the market. But its high monetary value also makes it an attractive target to cyber criminal actors. Hacking campaigns usually target an ecosystem's weakest points. In Bitcoin, the exchange platforms are one of them. Each exchange breach is a threat not only to direct victims, but to the credibility of Bitcoin's entire ecosystem. Based on an extensive analysis of 36 breaches of Bitcoin exchanges, we show the attack patterns used to exploit Bitcoin exchange platforms using an industry standard for reporting intelligence on cyber security breaches. Based on this we are able to provide an overview of the most common attack vectors, showing that all except three hacks were possible due to relatively lax security. We show that while the security regimen of Bitcoin exchanges is subpar compared to other financial service providers, the use of stolen credentials, which does not require any hacking, is decreasing. We also show that the amount of BTC taken during a breach is decreasing, as well as the exchanges that terminate after being breached. Furthermore we show that overall security posture has improved, but still has major flaws. To discover adversarial methods post-breach, we have analyzed two cases of BTC laundering. Through this analysis we provide insight into how exchange platforms with lax cyber security even further increase the intermediary risk introduced by them into the Bitcoin ecosystem.

Original languageEnglish
Article number9300238
Pages (from-to)1616-1628
Number of pages13
JournalIEEE Transactions on Network and Service Management
Volume18
Issue number2
DOIs
Publication statusPublished - 2021

Keywords

  • attacks
  • Bitcoin
  • cryptocurrency exchanges
  • cyber security
  • cyber threat intelligence
  • forensics
  • vulnerabilities

Fingerprint

Dive into the research topics of 'Cyber Security Threats to Bitcoin Exchanges: Adversary Exploitation and Laundering Techniques'. Together they form a unique fingerprint.

Cite this