IT Security Company Partners With Exchanges and Wallets to Block Usage of Stolen Crypto

Published at: June 26, 2018

A Singapore-based IT security company offers a potential blockchain-based solution to help protect individual crypto users and block the use of stolen cryptocurrencies on crypto wallets and exchanges.

Sentinel Protocol allows security experts and organizations to collect, share and analyse comprehensive threat intelligence data on its blockchain platform. The information about hacks, scams, and fraud is stored on the decentralized Threat Reputation Database (TRDB).

As previously reported by Cointelegraph, hackers have recently stolen $30 million worth of cryptocurrencies from Bithumb, South Korea's leading cryptocurrency exchange.

Patrick Kim, the founder of Sentinel Protocol, who previously worked at F5 Networks and Palo Alto Networks, says he himself was hacked two years ago when he lost 7,218 Ethereum due to a vulnerability in the geth-mist wallet. As the company’s website states, he “investigated the attack vectors and informed the geth-mist development team, who quickly applied security patches.”

As a hacking victim, Patrick was concerned that, as he said, at the expense of freedom of decentralization, the burden of proof is imposed on an individual when hacking happens. “The ideology of decentralization is central to both cryptocurrency and the internet, but it is impossible to say that blockchain implements perfect autonomy,” he wrote in the company’s white paper. “Autonomy in openness is subject to individual responsibility. Decentralization is not a magical solution to all problems … the ideology of decentralization must develop a philosophy of security.”

Building a security alliance

The company says that the TRDB data is provided to crypto exchanges, wallets and payment services to allow their users to transact safely without unintentionally aiding criminal activity. Any address or sub-address associated with attackers could be automatically identified and flagged, helping exchanges and wallets block the movement of stolen cryptocurrencies.

According to Sentinel Protocol, the more exchanges, wallets and payment services join the partner alliance, the more difficult it would be to spend stolen cryptocurrencies. The company has already announced a partnership with Bibox, a centralized exchange, as well as several new collaborations with decentralized exchanges including IDEX, DDEX, and DEx.top.

“On top of preventing the sale of stolen cryptocurrencies anywhere and thus disincentivizing malicious behavior, properly setting up proactive security measures is equally important,” said Sentinel Protocol’s Chief Evangelist John Kirch. “While we continue to form partnerships, we will provide preventive solutions to raise the security bar and help the community protect their assets.”

Three aspects of safety

According to the company, Sentinel Protocol’s platform hinges on three key aspects — a Sentinel Portal, a go-to-place for crypto community to report hackings and get the needed help from the security experts; a S-wallet powered by a machine learning that assesses future threats; and a distributed malware analysis sandbox that verifies unknown threats in an virtual environment.

On June 25 the company announced that Sentinel Portal will be pre-released to previously selected Pre-Sentinels Cybersecurity Experts on June 27, 2018. These experts will collect and verify incident information.

Starting from July, the experts will work directly on the TRDB as well as S-Wallet Lite, a solution for initial coin offering (ICO) investors to prevent scams.

The distributed sandboxing is designed to keep security a step ahead of hackers at all times. This involves testing for suspicious and unidentified files or links. It augments threat tests and simulations, runs virtual machines on decentralized nodes, and generates incentivized threat vectors.

The company plans to make the Sentinel Portal and S-Wallet Lite linked with the TRDB available to all users in August.

 

Disclaimer. Cointelegraph does not endorse any content or product on this page. While we aim at providing you all important information that we could obtain, readers should do their own research before taking any actions related to the company and carry full responsibility for their decisions, nor this article can be considered as an investment advice.

Tags
Related Posts
PIVX, Possibly Other PoS Chains Vulnerable to Bug, Attackers Profit
Private transactions cryptocurrency PIVX and over 200 other blockchains are vulnerable to attackers obtaining disproportionately high staking rewards. A major staking vulnerability Cryptocurrency consulting firm Lunar Digital Assets claimed in a post published on its website on Aug. 12 that a staking vulnerability is being used across PIVX and its forks. The weakness reportedly allows the attacker to obtain mathematically impossible staking rewards on vulnerable proof-of-stake (PoS) chains. According to the post’s author, the PIVX development team claimed to have solved the issue in January. Nonetheless, a core developer of PoS altcoin BitGreen (BITG) noticed that the vulnerability in question …
Blockchain / Aug. 13, 2019
World Economic Forum Releases Report About Blockchain Cybersecurity
The World Economic Forum (WEF) released a report about blockchain cybersecurity on April 5. The report points out that most data breaches do not result from the level of skill of the hackers, but instead happen because appropriate security measures often are not implemented. The WEF further claims that while attackers do compromise blockchains themselves, they much more often try to exploit or compromise their deployment. The WEF references the data breach of retail giant Target, which lead to both the CEO and chief information officer being fired, also mentioning that the director of the United States Government Office of …
Blockchain / April 8, 2019
Ledger Discloses Five Reported Vulnerabilities in Two Models of Trezor Hardware Wallets
Major hardware wallets manufacturer Ledger has unveiled vulnerabilities in its direct competitor Trezor’s devices, according to a report published on Monday, March. 11. As of press time, Trezor was not immediately available to comment on Ledger’s findings. The study states that the vulnerabilities were found by Attack Lab, the company’s department that hacks into both its own and competitors’ devices to improve security. Ledger claims that it has repeatedly addressed Trezor about weaknesses in their Trezor One and Trezor T wallets, and has decided to make them public after the responsible disclosure period ended. The first issue is related to …
Blockchain / March 11, 2019
Crema hacker returns $8M, keeps $1.6M in deal with protocol
The hacker who exploited Solana-based liquidity protocol Crema Finance on July 2 returned most of the funds but was allowed to keep $1.6 million as a white hat bounty. The bounty, 45,455 Solana (SOL), is worth a generous 16.7% of the $9.6 million Crema lost initially, which forced the protocol to suspend services. Crema’s team began an investigation to identify the hacker by tracking their Discord handle and tracing the original gas source for the hacker’s address. Just as it seemed the team may have been onto the secret identity, it announced that it had been negotiating with the hacker. …
Blockchain / July 7, 2022
Crypto app targeting SharkBot malware resurfaces on Google app store
A newly upgraded version of a banking and crypto app targeting malware has recently resurfaced on the Google Play store, now with the capability to steal cookies from account logins and bypass fingerprint or authentication requirements. A warning about the new version of the malware was shared by malware analyst Alberto Segura and treat intelligence analyst Mike Stokkel on Twitter accounts on Sept. 2, sharing their co-authored article on Fox IT’s blog. We discovered a new version of #SharkbotDropper in Google Play used to download and install #Sharkbot! The found droppers were used in a campaign targeting UK and IT! …
Blockchain / Sept. 5, 2022