A record number of vulnerabilities have been discovered in the Ethereum network

A record number of vulnerabilities have been discovered in the Ethereum network

Experts from University College London studied smart contracts in the Ethereum network and discovered more than 34 thousand vulnerabilities that provide hackers with the ability to easily hack programs and connect to their control. However, the researchers noted that they are not sure that they have discovered all possible vulnerabilities.

To conduct the research, the experts created their own fork of the network, after which the team ran scenarios and scripts that monitored the behavior of smart contracts under certain conditions.

As a result, the experts were able to test more than a million smart contracts. After discovering a large number of vulnerabilities, separate testing was carried out for three thousand of them. All initial doubts were confirmed with almost 100% accuracy.

The researchers noted that if they wanted to steal funds, they could withdraw at least $6 million from Ethereum.

As for the release that was published after testing, it states that:

 • There is a high need for early detection of smart contract vulnerabilities in order to properly secure everything crypto community;

 • The main purpose of all the studied applications is to manage the financial capital of users; they cannot be changed;

 • The research team could not find the creators of the smart contracts in which vulnerabilities were discovered;

 • In general, the segment can be considered as conditionally safe; those who want to independently check it for vulnerabilities need to do serious work at the level of technical expertise;

Vulnerabilities are a serious problem that needs to be dealt with at an early stage. After all, in the future this could lead to serious hacker attacks and irreversible consequences. So, due to a problem with the vulnerability of one of the smart contracts, the Japanese exchange Coincheck was hacked in January.



You May Also Like

32018-05-18

WinstarNssmMiner is a new dangerous virus for hidden mining

At this stage in the development of cryptocurrencies, creating and distributing malware that uses your computer's CPU while you are visiting web pages or watching YouTube videos has become a popular practice. This practice even got its own name - cryptojacking. Typically, these malware (which are often used to mine Monero) stop working when you close your browser.

Security
22018-08-02

Monero's anonymity is greatly exaggerated

Another security vulnerability has been found in Monero (XMR), a coin designed to ensure maximum transaction privacy, according to news reports.

Security,

Latest articles from Security category

Fresh video on our Channel