Chinese internet security company 360 Total Security has discovered a number of critical vulnerabilities in the EOS network that could have a fairly large impact on the currency and the EOS platform as a whole.
This vulnerability is that a fraudster can publish a smart contract containing malicious code on the network. In this case, the master node will execute a contract which, depending on the nature of the code, could then compromise the security of the network and allow the EOS blockchain to be manipulated, opening the door to a swarm of hackers who could steal funds or personal data.
This unfortunate "find" will allow the EOS team to patch the vulnerability to prevent such attacks, but it also casts serious doubt on the reliability of the EOS network.
According to Bitcoinist: “This will allow attackers to do whatever they want. In theory, they could steal the network's master node key, control cryptocurrency transactions carried out on the EOS network, obtain users' keys stored in their wallets, gain access to user profiles, and much more. A potential attack could also cause damage to external networks.”.
EOS representatives have not yet made any official statements on this matter; most likely they are trying to solve the problem. Perhaps they will soon announce that the problem has been fixed. It is good that the error was discovered before any illegal actions were committed. But it once again proved how vulnerable cryptocurrency is, not only from the point of view of market volatility and changes in values, but also from the point of view of cybersecurity. Even the most stable digital currencies are subject to the risk of attack.
Fortunately, 360 Total Security was able to prevent such an attack. We will await an explanation from the EOS team regarding how this bug went unnoticed, as well as what measures will be taken to protect users from future problems within this and the new EOS network.
As a reminder, this is the second critical vulnerability discovered for the last month on the EOS network.
According to cryptodaily
You May Also Like
The Monero coin is most often mined through hidden mining.
Malware researcher Josh Grunzweig of Palo Alto Networks has identified 470,000 unique malware samples that covertly mine coins on other people's computers. 84 percent of these samples are aimed at mining Monero (XMR).
In Zaporozhye, cyber police detained a hacker who distributed viruses to steal data
Operatives of the cybercrime department identified and detained a 22-year-old resident of the Zaporozhye region who was distributing malicious software to obtain personal information of network users.
