everyone: older news
Cryptocurrencies Get Hacked
by Brent Kirkpatrick
(Date Published: 6/11/2018.)
The security vulnerabilities exploited by hackers appear to be weaknesses in the exchange client software. In the Coinrail heist, tokens were taken from Coinrail users, not from the companies that issued the tokens. In the Ethereum heist, wallets were raided when investors left port 8545 open on their Geth clients.
Security researches at NetLab run a honeypot on port 8545. They track IP addresses that scan for open Ethereum wallets. "There are quite a few IPs scanning heavily on this port now," according to a tweet from NetLab.
There are options for securing your client wallets while still being able to participate in currency exchanges. For example, you can keep most of your tokens in a cold wallet (unavailable to the exchange), and transfer tokens to a wallet available to the exchange when you have a transaction.
Contact Intrepid Net Computing if you want to discuss your options for security.
defendIT (TM). AI-driven incident response measures derived from security incident data.