How do you hack an enterprise blockchain? We may find out soon enough.
Enterprise blockchain products have been designed mostly as private networks, limited to authorized parties. This is supposed to make them more efficient than public chains like Bitcoin and Ethereum because fewer computers have to reach agreement on who owns what, and in a sense safer because the participants know each other.
These products apply technology originally developed for the Wild West of cryptocurrency to a range of unglamorous corporate activities, including cross-border transactions, storing records, and tracking goods and information. Their promise has attracted some of the worldâs largest corporations and software vendors.Â
But like any software, they can in theory be hacked, although how to prevent that hacking isnât as well documented.Â
âI canât recall a single major company announcing a loss of any kind from a hack on a private blockchain,â says Paul Brody, global blockchain lead at consulting giant EY.Â
Read more: Meet Red Date, the Little-Known Tech Firm Behind Chinaâs Big Blockchain Vision
That may change in the near future as companies start bringing these gated systems out of the lab and into real-world use.Â
âBig companies have been working on blockchain apps for a couple years now,â said Pavel Pokrovsky, the blockchain lead at Kaspersky, the Moscow-based anti-virus software vendor. âSoon, they will start pushing those apps into production and might face new challenges in managing their risks. As more such solutions get deployed, attacks on them might become more frequent.â
One problem is that private, permissioned systems are most vulnerable to insider threats, both Pokrovsky and Brody said.Â
âInsider risk is particularly high in private blockchains because the work that is usually done to secure information within the private network is very low compared to public networks,â said EYâs Brody, who has been a rare voice among the Big Four professional-services firms in stumping for open systems. âOn public networks, we make extensive use of zero-knowledge proofs and other tools to keep sensitive data off-chain.âÂ
Only one or two of EYâs corporate clients went to such lengths with private networks, he said. âAs a result, if you can gain access to the network or you already have it as an insider, nearly all the critical data is actually visible to all the members.âÂ
In general, Pokrovsky said, the most common type of attack that can theoretically be employed against an enterprise blockchain network is a denial of service attack. This is different from a DDoS, or distributed denial of service, where a companyâs servers are inundated with useless requests that overwhelm them.
Read more: Miners Trick Stablecoin Protocol PegNet, Turning $11 Into Almost $7M Hoard
Denial of service, on the other hand, is a focused attack that uses knowledge â perhaps an ex-employee â rather than electronic muscle power.
âLetâs say an employee of a company gets fired and heâs angry at his ex-employer. He goes to the dark web and sells his knowledge of the vulnerabilities in the system to hackers,â Pokrovsky said.
In the case of enterprise blockchains, an attacker would need to know the addresses of the nodes and what can put them offline.Â
âAn attacker can overwhelm the nodeâs data storage capacity, flood it with useless calculations,â Pokrovsky said. âFor example, one of our clientsâ nodes could not process very large numbers, say, 12 zeroes and more. They would just freeze.â
The cure for that kind of attack is proper filtering of the data entering the nodes, he said: âItâs a very widespread mistake, not filtering the incoming data.â
Exploiting such a vulnerability is easy when you know where the nodes are and, unlike DDoS, it does not require buying traffic in the form of bots that flood your target with garbage traffic, or deploying a lot of hardware to attack the server.Â
âYou just write a simple script and send it to the nodes,â Pokrovsky said. Then the nodes go offline. This can be utilized for criminal purposes from sabotaging a competitor to terrorist attacks, Pokrovsky said.
The situation can be exacerbated by the fact that the most convenient way to set up nodes for a private blockchain is to use cloud infrastructure so companies donât have to figure out how to set up a physical node in their office.
âMost private blockchains have very few nodes and, in many cases, they all reside inside a single cloud infrastructure, creating a single point of failure,â Brody said. âThat also means that far from being immutable stores of information, they are in fact easy to erase or shut down.â
The risks can vary. For example, Masterchain, the enterprise blockchain for banks developed under the auspices of Russiaâs central bank, is a fork, or modified copy, of the Ethereum blockchain, which uses a proof-of-work consensus mechanism. Taking down nodes on such a network would lead to the consensus re-distributing among the remaining nodes, which would continue to validate transactions.Â
However, if it turns out all the remaining nodes are controlled by the central bank, the network participants might argue, the transactions recorded while everyone else was down are not legitimate, Pokrovsky said.Â
Read more: DeFi Project dForce Refunds All Affected Users After $25M Hack
âDDoS is an attack easy and cheap to organize, but itâs also easy to prevent, and services like Cloudflare can identify and effectively prevent it. But the denial of service is not identifiable by the filters such services use,â Pokrovsky said, adding that sometimes attackers donât even need an insider to locate the nodes â itâs possible to find such information via open source intelligence methods.Â
âItâs very hard to fix such vulnerabilities as the attack is happening, when everythingâs crashed, everyoneâs running around and everything is on fire,â he said â itâs better to try to predict such situations in a testing environment.Â
If a blockchain uses smart contracts, they can be attacked as well, Pokrovsky said.Â
âFor the enterprise blockchains, the typical attack is when a contract contains variables that can turn out different for each node, for example, timestamps or random numbers,â he said. âIn this case, every node would execute the smart contract with a different result and the transaction will not be recorded into the blockchain as a result.â
If a smart contract refers to documents, there is another possible way to attack it: inserting malicious code into the document.Â
Read more: Hacker Exploits Flaw in Decentralized Bitcoin Exchange Bisq to Steal $250K
âItâs the same as the SQL injection attack and to prevent it you need to filter the incoming data and limit the use of external data by the smart contract,â Pokrovsky said.Â
The fact that most private blockchains donât enjoy the attention of a broad blockchain community is also a weakness, Brody said.Â
âPerhaps the biggest risk posed by private blockchains is the risk of complacency,â he said. âOpen source code that isnât widely used and doesnât have a vigilant community testing and inspecting it is far less secure and reliable than systems like Bitcoin and Ethereum, which are continuously hardened by nearly constant attack and public inspection.â
With an eye perhaps toward broadening its revenue stream, Kaspersky moved into blockchain-oriented research and consulting in 2018, first focusing on public blockchains including Bitcoin and Ethereum.Â
Kaspersky has been working with crypto exchanges and completed a security audit for the trading software company Merkeleon in October 2018.Â
In October 2019, Kaspersky started working with enterprise blockchains, too. Pokrovsky told CoinDesk the company audited a number of such systems, only two of which he could name publicly: Russia-based blockchain startup Insolar and Waves, which has been re-focusing from public to private blockchains since last year.
Kaspersky software has been listed among the top 10 antivirus products globally by PC Magazine in March but it has been banned from being installed on U.S. government computers since 2017 as part of the U.S. response to Russian meddling in the 2016 presidential election. That ban caused sales to plunge in the U.S. and Europe but they have expanded in Russia as well as Africa. Kaspersky reported 4 percent revenue growth in 2018.
Kasperskyâs Waves Enterprise audit took three months, from November 2019 to the end of January 2020. âThe task was to check the security of the nodes, network infrastructure and nodesâ web interfaces,â Pokrovsky said.
The security firm ran what it calls âgrey boxâ testing, in which the tester does not have access to the blockchain platformâs full code, but does have administrator-level access to the system. This kind of testing would show possible insider threats, like an ex-employee going rogue.Â
After the testing is over, Kaspersky presents the client with the list of vulnerabilities and the client fixes them. Then the testing is run again.Â
Pokrovsky would not disclose what weaknesses had to be âfixedâ on Waves Enterpriseâ blockchain. (Waves confirmed it hired Kaspersky.)