Page 776«..1020..775776777778..790800..»

High severity flaw patched in widely used curl tool – CSO Online

The developers of the curl open-source software application and library have released patches for two vulnerabilities in the widely used command-line tool. One of the flaws is rated with high severity and could potentially be exploited by rogue servers to execute malicious code on systems that access them with curl under certain conditions.

Curl, which is short for client for URL, is a cross-platform and portable command-line tool designed to transfer data or files to and from URLs. Dating back 27 years, it supports many internet communication protocols and technologies including DICT, FTP, FTPS, Gopher, HTTP 1/2/3, HTTP proxy tunneling, HTTPS, IMAP, Kerberos, LDAP, MQTT, POP3, RTSP, RTMP, SCP, SMTP, and SMB. In addition to the command-line tool, curl also provides a library called libcurl that many other applications can integrate to benefit from the functionality.

Daniel Stenberg, the maintainer of curl, made an announcement last week that an important security patch will be released on October 11 to fix probably the worst curl security flaw in a long time. The flaw, tracked as CVE-2023-38545, is a heap buffer overflow and affects curl versions 7.69.0 to 8.3.0 and was patched in version 8.4.0 released Wednesday.

The second flaw, CVE-2023-38546, affects only libcurl and allows for arbitrary cookies injection into a program that uses libcurl. However, the issue is considered low severity.

A buffer overflow is a type of security vulnerability that happens when a program writes data in an allocated memory buffer in a way that exceeds the size of the buffer and the data spills into other memory regions overwriting data there. Buffer overflows can at the very least result in application crashes (denial of service), but in many cases, controlled exploitation can lead to arbitrary code execution.

This is also the case with CVE-2023-38545. While proof-of-concept exploits have only demonstrated denial of service for now, researchers believe its only a matter of time until code execution is achieved. The good news is that only certain configurations of the tool are vulnerable, and they are not the default ones.

Seeing that curl is an ubiquitous project it can be assumed with good confidence that this vulnerability will get exploited in the wild for remote code execution, with more sophisticated exploits being developed, researchers from DevOps security firm JFrog said in their analysis. However - the set of pre-conditions needed in order for a machine to be vulnerable is more restrictive than initially believed. Therefore, we believe the vast majority of curl users won't be affected by this vulnerability.

The vulnerability is located in curls implementation of the SOCKS5 proxy handshake. SOCKS5 is a network protocol for tunneling data from a client to a server through a proxy server and is widely used on the internet.

When curl is asked to access an URL through a SOCKS5 proxy it can behave in two ways: if the hostname of the URL is 255 bytes long or less, it will ask the SOCKS proxy to resolve it. However, if the host is longer than 255 bytes, the application will switch to local hostname resolution because the SOCKS5 protocol doesnt allow for hostnames longer than 255 bytes. After resolving the hostname locally, curl will only forward the resulting IP address to the proxy.

Due to a bug, the local variable that means let the host resolve the name could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there, the curl developers said in their advisory.

This can lead to a buffer overflow if the allocated download buffer is too small to fit the long hostname. An attacker could trigger this from a malicious server by performing a redirect to an address with a long hostname.

For an overflow to happen it needs a slow enough SOCKS5 handshake to trigger the local variable bug, and the client using a hostname longer than the download buffer, the maintainers said. Perhaps with a malicious HTTPS server doing a redirect to an especially crafted URL. Typical server latency is likely slow enough to trigger this bug without an attacker needing to influence it by DoS or SOCKS server control.

Multiple pre-conditions need to be met for an exploit to work and they are different for libcurl and the curl CLI tool. According to JFrog, the libcurl library is only vulnerable if used in any of the following ways:

The Curl CLI tool is only vulnerable if any of the following conditions are true:

Moreover, even if these conditions are met, exploiting this flaw using a hostname is not easy because the curl parser only allows ASCII characters in URLs and will invalidate any arbitrary bytes. This makes it hard to build a payload.

More:
High severity flaw patched in widely used curl tool - CSO Online

Read More..

Generative AI is scaring CISOs but adoption isnt slowing down – CSO Online

The march of generative AI isn't short on negative consequences, and CISOs are particularly concerned about the downfalls of an AI-powered world, according to a study released this week by IBM.

Generative AI is expected to create a wide range of new cyberattacks over the next six to 12 months, IBM said, with sophisticated bad actors using the technology to improve the speed, precision, and scale of their attempted intrusions. Experts believe that the biggest threat is from autonomously generated attacks launched on a large scale, followed closely by AI-powered impersonations of trusted users and automated malware creation.

The IBM report included data from four different surveys related to AI, with 200 US-based business executives polled specifically about cybersecurity. Nearly half of those executives -- 47% -- worry that their companies' own adoption of generative AI will lead to new security pitfalls while virtually all say that it makes a security breach more likely. This has, at least, caused cybersecurity budgets devoted to AI to rise by an average of 51% over the past two years, with further growth expected over the next two, according to the report.

The contrast between the headlong rush to adopt generative AI and the strongly held concerns over security risks may not be as large an example of cognitive dissonance as some have argued, according to IBM general manager for cybersecurity services Chris McCurdy.

For one thing, he noted, this isn't a new pattern -- it's reminiscent of the early days of cloud computing, which saw security concerns hold back adoption to some degree.

"I'd actually argue that there is a distinct difference that is currently getting overlooked when it comes to AI: with the exception perhaps of the internet itself, never before has a technology received this level of attention and scrutiny with regard to security," McCurdy said.

Global think tanks have sprouted up to study the security implications of generative AI, he highlighted, and although there's a great deal of education that needs to happen in C-suites, organizations are generally moving in the right direction.

"In other words, we're seeing that security isn't an afterthought, but a key consideration in these early days," McCurdy said.

It's important to recognize that the positive impact of generative AI on business operations has the potential to be transformative, he added. If security, to say nothing of governance and compliance, are part of the conversation from the beginning, cyber threats don't need to stand in the way of progress.

"There is a lot of focus on how AI will impact organizations positively, but it's our responsibility to also consider what guardrails we have to put in place to ensure the AI models we rely on are trustworthy and secure," McCurdy said.

More here:
Generative AI is scaring CISOs but adoption isnt slowing down - CSO Online

Read More..

Newest Ransomware Trend: Attackers Move Faster with Partial … – Check Point Blog

On Wednesday morning, May 3, 2023, security personnel with the City of Dallas were horrified when their security software alerted them that they had likely become the target of a ransomware attack. Multiple servers across a range of departments were affected: 911 dispatchers, courts, and police services couldnt use their computers for days.

It later emerged that sensitive data had been stolen[1]800,000 files containing full names, home addresses, Social Security numbers, dates of birth, and the health and insurance data of at least 30,000 city employees and other individuals. Two weeks later, the Royal ransomware group, which took responsibility for the attack, threatened to release the information. In particular, police officers and others whose data had been stolen feared the data could fall into the hands of violent offenders who might try to retaliate[2].

The City of Dallas wasnt the first government to be hit by ransomwareor the first ransomware attack where lives could have been lost. The Royal ransomware group was originally part of the Conti group, which previously took credit for bringing the entire Irish healthcare system to a halt in 2021[3].

One of the reasons Royal was able to strike so quickly and effectively in Dallas is that they took advantage of todays fastest-growing ransomware trend: partial encryption.

The term partial encryption may sound more benign at first than traditional attack strategies, since theoretically less damage is being done. However, in fact, its no less devastating to organizations that find themselves under attack.

In this post, well explore the emergence of partial encryption as a strategy to make cybercrime even more profitable, which industries are at risk, and finally, a few key steps to help you protect your business.

Encryption is a tried and true strategy for malware actors. Malware within the victims systems leaves their data in place but completely inaccessible. Attackers then demand a price to unlock the data so victims can resume business as usual. In a second-tier strategy, in the event that victims refuse to pay, attackers can still make money by selling the compromised data.

Based on this model, ransomware has become big business over the last decades. And like all big businesses, attackers are always seeking to optimize their operations and find more efficient, cost-effective ways to achieve the same or better results.

Encryption in particular can be very time-consuming, especially for large amounts of data. This has led attackers to seek more efficient, effective ways to render victims data inaccessible unless they pay the ransom.

Partial encryption, also known as intermittent encryption, has emerged as just one example of increasingly sophisticated attack tactics, often in readily available off-the-shelf ransomware products that are openly sold on the darkweb much like traditional software.

Rather than encrypt the entire compromised system, partial encryption does just that: It encrypts a portion of the victims files either at random, encrypting a predetermined percentage of the data, as Royal ransomware does[4], or encrypting only the most important files, as determined by fingerprinting: financial documents, photos, and personal information. Ransomware can also selectively encrypt files related to a particular project or task, bringing it to its knees until payment is made.

For attackers, the advantages of partial encryption over complete encryption are clear:

Royal ransomware is particularly insidious because it not only uses partial encryption but also a multithreaded model, another increasingly popular strategy. In a single attack, there is only one ransomware process; a multithreaded attack uses multiple CPU cores to encrypt files simultaneously. This can quickly overwhelm the available processing power and make the attack more difficult to stop; even if one or two child processes can be stopped, the others will continue to encrypt files. This means that multithreaded ransomware attacks can be very destructive.

Even more frightening, todays attackers have begun using a triple extortion strategy. With a double extortion strategy, as previously described, attackers not only hold the encrypted drives for ransom, they threaten to release or sell encrypted data if the organization does not pay. For the victim, this means that even if files can be restored from a backup, they must still pay to avoid data leakage.

However, a triple extortion strategy unfolds, as the name suggests, over three stages:

However, whether ransomware attackers use one of these new strategies or a more traditional approach, the goal is always the same: to extort money. And the truth is that even after paying up, few organizations can reconstruct 100% of their compromised data.

Therefore, the best defense against todays ransomware is thwarting attacks altogether.

When combating ransomware, its important to understand who youre up against. Todays ransomware attackers are far from the stereotypical hooded criminal-in-a-basement, although that may have been who was behind very early ransomware, 10 to 15 years ago. Attackers back then would use broad-scale, fairly obvious, and generally imprecise attacks that succeeded in bringing in small amounts of money.

Today, like all technology industries, ransomware has matured beyond these modest origins. Ransomware gangs have formed larger-scale enterprises and brought talented developers on board to research and implement increasingly sophisticated techniques, methods deployed against wealthier targets to reap the highest rewards.

And these illicit enterprises have found safe havens in places like Russia, Asia, and Eastern Europe. Today, in addition to these large and highly professional enterprises, hostile governments and other nation-state entities are using ransomware for nation-level intelligence-gathering operations. And beyond literal warfare, ransomware has become a powerful digital weapon in corporate warfare as well.

There are numerous hacking groups out there, but a few leading ones deserve a mention.

A likely nation-state group and the developer of Pipedream, U.S. law enforcement has called this modular industrial control system (ICS) toolset a Swiss army knife for attacking utility companies[5] (electricity, water, natural gas) in the U.S. and Europe.

An opportunistic group affiliated with Iranian hacking groups Phosphorus and Nemesis Kitten, Bentonite leverages known vulnerabilities in maritime oil and gas, government, and manufacturing infrastructure.

BlackCat is a relatively new ransomware group that popped up in late 2022. It is known for its sophisticated encryption and ability to target a wide range of organizations. It is believed BlackCat is operated by a group of Russian-speaking cybercriminals and is known to use intermittent encryption[6] via customizable byte-skipping patterns.

Before being brought down by the U.S. FBI, German law enforcement, and the Dutch National High-Tech Crime Unit, this ransomware group had extorted over $100M by terrorizing healthcare organizations, schools, and public infrastructure worldwide. While the investigation is ongoing, Hive is believed to have ties to the Kremlin[7].

In just the first half of 2023, 48 ransomware groups including these and otherssuch as Ryuk, Medusa, Play, LockBit3, and many morehave breached over 2,200 victims, 45% of whom are in the U.S.

These groups use two main vectors to introduce ransomware: through software vulnerabilities, which are unintentional weaknesses or flaws in applications or code libraries that can go unpatched for years, and social engineering techniques, such as phishing. Attacks often combine these two strategies, or use variations such as callback phishing attacks, which are commonly used by the Royal ransomware group, the group behind the Dallas attack.

Regardless of how individual groups operate, and which encryption technologies theyre using, the consequences can be dire, as in an August 2023 ransomware attack on two Danish cloud hosting companies that resulted in the total loss (to encryption) of all customer data[8]. An unidentified attack group demanded 6 bitcoins in ransom (approx $155,000 as of this writing), an amount CloudNordic was unable to pay; the company has since shut down its operations.

There are several sectors that find themselves frequently targeted by ransomware attacks.

Medical IT departments are both the most obvious and the most sensitive target since lives are most clearly on the line. When the Rhysida ransomwaregroup, which had gained notoriety for its attack on the Chilean army, attacked Prospect Medical in August of 2023[9], the companywhich operates 16 hospitals and numerous clinics all over the U.S.was forced to use paper charts until systems could be restored.

Healthcare data is both sensitive and valuable; it also features a large threat surface and a wide range of device types, including a mix of old and new technologies. This type of environment is hard to securely administer and update. This is especially true of medical IoT devices, which are often not built securely by design. Finally, healthcare organizations are historically more likely to pay ransoms compared with other industries, specifically so that life-saving operations will not be interrupted.

The year 2022 brought an average of 1,426 attempted breaches per week per organization in the healthcare industry, a 78% year-over-year increase. There was also a distinct uptick in mortality following a cyber attack, although attributing deaths directly to ransomware is almost impossible due to the complexity of the events involved.

Deaths connected with ransomware attacks can come about due to slowdowns, meaning delays in important surgeries and other care, as well as a lack of electronic health records, leading to a higher chance that patients will be given the wrong medication or an incorrect dose. In a recent Ponemon study of healthcare IT professionals, almost half (45%) said ransomware led to increased complications from medical procedures[10], up from 36% just a year earlier.

Just as school was starting back in September of 2021, Howard University, one of the U.S.s five largest historically black colleges and universities, was forced to cancel classes due to a ransomware attack[11].

Attacks against higher education institutions are on the rise, with at least eight reporting ransomware attacks[12] since December 2022. Why are attackers targeting these schools? Colleges and universities are seen as attractive targets because they hold valuable data and their IT departments are often understaffed and outdated, with limited security resources. Educational institutions are also considered slower to recover than other sectors.

Despite the fact that 64% of higher education institutions experienced attacks[13] in the past year, many are still unwilling to discuss these incidents due to the negative influence they may have on a schools reputation. Unfortunately, because of this silence, others in the sector may not realize that they are at riskfurther perpetuating the cycle.

In February of 2023, MKS Instruments, a little-known U.S.-based supplier to major players in the semiconductor industry, woke up to every manufacturers worst nightmare: a ransomware attack. Hackers compromised production and business systems, leading to predictions of $200M in losses from the attack. But the worst may be yet to come: Employees have filed a class action suit[14], claiming that the company did not adequately protect their sensitive personal data.

Attacks on semiconductor companies have continued: Taiwan Semiconductor Manufacturing Company (TSMC) itself, the worlds largest chip manufacturer, was hit by the LockBit ransomware group in June 2023. The group demanded $70M, adding: In the case of payment refusal, also will be published points of entry into the network and passwords and logins company.

But the semiconductor sector is not alone; almost every major field of manufacturing is being targeted. In fact, the manufacturing sector has been the industry most heavily hit by ransomware[15]. The primary vector is unpatched vulnerabilities, particularly in industrial control systems. Manufacturers may also be more likely to pay ransoms to avoid production disruptions and financial losses, as well as devastating repercussions up and down the supply chain.

Although these three industries are among the most frequently targeted, attacks like the one in Dallas, the cloud providers in Denmark, and other victims profiled above reveal the broader truth that any organization storing sensitive data is at risk today, from financial services and insurance to retail and logistics.

Thats especially true now, with partial encryption likely to increase in popularity as ransomware gangs study one anothers techniques. As more and more adopt this hyperefficient technique, they will find it easier and more effective than ever to steal your assets and avoid interception. So regardless of your industry, now is the time to take a few important steps to protect your organization from ransomware.

All comprehensive security strategies begin with a comprehensive assessment of what you need to protect, including OT assets that may be the weakest link in your organization.

When it comes to ransomware attacks, hackers usually take advantage of times when people are not as vigilant. In the past year, most breaches have occurred on weekends and holidays.

Keep up to date with a rigorous patching regimen, since known vulnerabilities are a popular attack vector. Also, automate patching wherever possible.

Trojan malware infections like Trickbot, Emotet, Dridex, and Cobalt Strike should be dealt with immediately, as these can all be used to let ransomware in the door; similarly, taking steps to prevent phishing and train users can help foster a culture of security.

Store multiple copies of data in different locations (cloud, on-premises, and physical locations), and establish a backup testing regimen. Remember, never attach an uninfected backup to an infected computer. This could spread the ransomware to the backup and make it impossible to recover your data.

Reduce the impact of a potential attack with security measures such as strong user authentication and network segmentation to limit the radius of an attacks spread.

It is important to note that none of these measures can provide complete protection. And particularly in light of the fact that partial encryption is notoriously difficult to detect, your best bet is a comprehensive anti-ransomware solution.

The best way to keep your organization safe is effective threat prevention with an organization-wide anti-ransomware solution that uses up-to-the-minute threat intelligence data along with advanced algorithms that work automatically in the background, around the clock.

Check Point Harmony is the first unified security solution that protects users, devices, and internet connections from the most sophisticated attacks, including phishing, zero-day ransomware, and more. It also ensures that users only have access to the applications they need, which helps reduce the risk of data breaches.

Check Point Harmony delivers peace of mind with a total, holistic defense against malware:

Check Point Harmony is prevention-focused, stopping attacks before they become a threat to your organization. Powered by real-time threat intelligence through Check Points ThreatCloud AI and backed by the industry-leading Check Point Research team, Check Point Harmony gives you todays best security, hands down.

Talk to one of Check Points ransomware experts and get started safeguarding your business from todays most urgent ransomware threats.

Register for the Webinar on October 18th: Concerned about Ransomware? Understand the Inner Workings of an Attack:

[1] https://statescoop.com/dallas-ransomware-sensitive-data/

[2] https://www.cbsnews.com/texas/news/royal-ransomware-group-threatens-release-sensitive-information-dallas/

[3] https://www.cbsnews.com/texas/news/royal-ransomware-group-threatens-release-sensitive-information-dallas/

[4] https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a

[5] https://www.wired.com/story/pipedream-ics-malware/

[6] https://www.bleepingcomputer.com/news/security/ransomware-gangs-switching-to-new-intermittent-encryption-tactic/

[7] https://www.theguardian.com/us-news/2023/jan/26/hive-ransomware-servers-seized-us

[8] https://techcrunch.com/2023/08/23/cloudnordic-azero-cloud-host-ransomware/

[9] https://www.bleepingcomputer.com/news/security/rhysida-claims-ransomware-attack-on-prospect-medical-threatens-to-sell-data/

[10] https://www.healthcareitnews.com/news/ransomware-stakes-are-life-or-death-says-ponemon-report

[11] https://techcrunch.com/2021/09/07/howard-university-cancels-classes-after-ransomware-attack/

[12] https://www.csoonline.com/article/574739/universities-and-colleges-cope-silently-with-ransomware-attacks.html

[13] https://edscoop.com/ransomware-colleges-universities-data/#:~:text=The%20survey%2C%20published%20last%20week,79%25%20reporting%20attacks%20this%20year.

[14] https://www.scmagazine.com/news/mks-instruments-lawsuit-ransomware-attack

[15] https://newsroom.ibm.com/2022-02-23-IBM-Report-Manufacturing-Felt-Brunt-of-Cyberattacks-in-2021-as-Supply-Chain-Woes-Grew

Continue reading here:
Newest Ransomware Trend: Attackers Move Faster with Partial ... - Check Point Blog

Read More..

Citi goes live on 2 smart contract platforms for stocks, syndicated loans – Ledger Insights

YesterdayCitiSecurities Services announced it went live on theHKEX Synapsesmart contract platform to settle securities between Hong Kong and China. Separately,Versanasaid Citi went live on its smart contract solution for syndicated loans.

Last week we reported that Hong Kong Exchanges and Clearing (HKEX) was about togo live with its Synapsesmart contract solution for post trade processes for Northbound Connect. The latter is the HKEX conduit enabling Hong Kong and international investors to sette stock trades on Chinas mainland Shanghai Stock Exchange. Stock settlement involves numerous intermediaries. Synapse lets them all share data simultaneously rather than processing transactions through each sequentially.

Citihas worked with HKEX since the 2019 pilots and is one of the first live Synapse participants. The bank is the worlds fourth largest global custodian, with $27.8 trillion in assets under custody. Its also the first bank to fully integrate its custody solution with Synapse.

ChinaAMC(HK) was involved in the initial transaction on Citis Synapse offering.

We are delighted to be among the first group of asset managers to pilot the HKEX Synapse platform. This marks another significant win in optimizing the two-way flow of capital between Hong Kong and the Mainland, said Tian Gan, CEO of ChinaAMC (HK). As a leading Chinese fund management company in Hong Kong, we are working diligently with our partners such as Citi as our custodian, to prepare for this rollout, as we connect China and the world.

A separate division of Citi is involved in the other smart contract platform, Versana.

On Friday we reported that syndicated lending platformVersanahad surpassed $900 billion worth of loans. It was co-founded by Bank of America, Citi, Credit Suisse and J.P. Morgan to help digitize the syndicated lending process. Citi is the last founder agent bank to go live on the platform.

Citi has been committed to the Versana platform from the very beginning as we recognized that real-time information sharing is critical for the growth of the syndicated loan market, said Michael Hershkowitz, COO of Wholesale Lending for Citis institutional businesses.

In March Versana closed a $40 million funding round, including new investors Deutsche Bank, Morgan Stanley, U.S. Bancorp and Wells Fargo. Apart from U.S. Bancorp, the others are major syndicated loan agents and will onboard onto Versana in the coming months.

Both HKEX Synapse and Versana use Digital AssetsDAML smart contracts. Digital Asset was also one of the providers involved in theU.S. Regulated Liability Network (RLN)trials for interbank payments. While the RLN is an industy collaboration, Citi was the founder. Additionally, Citi recently launchedCiti Token Services, which supports money movements between Citis global branches around the clock usingtokenized deposits.

Read this article:

Citi goes live on 2 smart contract platforms for stocks, syndicated loans - Ledger Insights

Read More..

Coinbases security team has fought crypto hackers for a decade: Heres what has to change – Yahoo Finance

Philip Martin is an impressive guy. A veteran of the U.S. Army, where he spent years working on counterintelligence, he did stints at Amazon and Palantir before coming to Coinbase to lead its security operations. So his views on the crypto industrys horrendous hacking problems carry considerable weight.

I caught up with Martin last week, and asked him how the industry beset by hackers since the very beginning has evolved when it comes to security. He noted that, while fundamental principles remain the same, the rise of smart contracts has made the job considerably harder.

Today, we have these massive, immutable, interrelated smart contracts that are storing tens of billions of dollars. I equate it to whipping back to 1970 and asking a dev to write secure codethey would fail miserably, Martin observed. He added that, because building and accessing smart contracts is extremely easy, it has meant many core code libraries have gaping security holes.

Martin said it doesnt have to be this way, but many in the industry lack the incentives to build with security in mind. Coinbase, which has a strong track record on cyber defense, is trying to set an example with its new Base blockchainbuilding an open-source monitoring tool called Pessimism onto the chain itself. More broadly, Martin said, he hopes the crypto industry will imitate Microsoft, which famously switched to a security-by-design approach with the launch of Windows 7 in 2009.

The crypto industry may have no choice if it wants to grow and be taken seriously. I wrote recently about an embarrassing incident where a custody firm, ironically named Fortress, let itself get robbed, and how this was just the latest in a long series of sloppy behavior that has made crypto a byword for hacking. It doesnt help that the most formidable threats are not rogue individuals, but a nation-stateNorth Koreaand organized crime outfits in Eastern Europe. Little wonder companies are getting robbed every week.

Story continues

The news isnt all bad, though. Martin noted correctly that smart contracts are barely five years old and that the basic building blocks of security to support them are still being built. Its also encouraging that big crypto companies that are fierce rivalsincluding Coinbase and Binanceregularly help each other when it comes to unmasking and stopping hackers.

But Martin said the industry needs to move faster and, in his words, act like grownups. He has that right. Each new breach is yet another blow to the industrys already battered reputation, and, if there is going to be another crypto boom, it will have to be built around a new ethos that values security as much as getting rich quick.

Jeff John Robertsjeff.roberts@fortune.com@jeffjohnroberts

This story was originally featured on Fortune.com

Excerpt from:

Coinbases security team has fought crypto hackers for a decade: Heres what has to change - Yahoo Finance

Read More..

ESMA assesses market developments in DeFi and explores the … – ESMA

DeFi: developments and risks in the EU market

The article on DeFi developments and risks in the EU shows that DeFi raises serious risks to investor protection, because of the highly speculative nature of many DeFi arrangements and important operational and security vulnerabilities. Risks to financial stability are not meaningful at this point owing to DeFis small size but require monitoring. In addition, DeFis unique features have led to new market manipulation issues that need to be addressed.

DeFi has seen significant development over the last few years, although it remains very small in size (the Total Value Locked in DeFi protocols reached USD45bn as of end-June 2023 representing less than 4% of the total crypto-assets market capitalisation), and has garnered attention from consumers, but also from global regulators because of the risks it raises.

The article introduces a methodology for the categorisation of smart contracts which leverages on the latters source code and on topic modelling. It explores the rate of deployment of smart contracts belonging to the identified categories over time, contributing to an enhanced and nuanced understanding of DeFi,and also to identifying related significant risks.

ESMA defines five major smart contract categories and monitors their relative incidence over time. It notes a significant difference in terms of heterogeneity between the first and the second surge in smart contract deployment (occurring in 2017 2018 and in 2021 2023, respectively), reflecting the adoption of increasingly complex and interdependent protocols that have come to characterise DeFi.

ESMA is organising a public webinar on the findings of these articles. During the webinar, the authors of the articles and OECD representative will deliver a presentation, followed by a Q&A session.

The webinar will be held online on Wednesday, 25 October 2023 from 11:00 to 12:00.

Interested persons are welcome to register by Monday, 23 October 2023 at 12:00 via this link.

More:

ESMA assesses market developments in DeFi and explores the ... - ESMA

Read More..

AnChain.AI and BlockTrace Join Forces to Provide Cutting Edge Solutions to National Security Sector Partners – Yahoo Finance

Leading Blockchain Investigation Firms Team Up to Deliver Training, Investigation Services and Innovative Solutions to Empower Global Regulators, Law Enforcement Agencies, and Financial Institutions

SAN FRANCISCO, Oct. 10, 2023 /PRNewswire/ -- AnChain.AI, the world's first company delivering Generative AI, LLM, and GPT-powered solutions for investigating Smart Contract Web3 Digital Assets, and BlockTrace, the leading digital assets, cyber intelligence and integrations firm, today announced a new partnership to deliver cutting-edge solutions to national security sector partners engaged in the fight against crypto-related crime to address national security challenges. With the proliferation of decentralized finance (DeFi) and blockchain-based applications, the need for national security focused institutions to partner with companies that offer unique expertise has never been more important.

AnChain.AI and BlockTrace are leading the fight against crypto crime, equipping regulators and law enforcement around the world with the technology and expertise necessary to stay ahead of state actors and cybercriminals alike.

In what was a record year, 2022 saw more than $4 Billion in assets stolenthrough hacks, scams, and other attacks against DeFi protocols. Additionally, state and non-state actors continue to abuse this ecosystem in ways that threaten national security priorities. AnChain.AI and BlockTrace share a commitment to helping national security agencies build a safer DeFi ecosystem with the tools and knowledge to address the increasingly complex challenges posed by smart contracts and cybercrime.

Victor Fang, Ph.D, CEO & Co-founder of AnChain.AI, expressed his enthusiasm for the partnership, stating "The escalating threat of smart contract crime demands next-gen solutionsand a united front. Our collaboration with BlockTrace signifies a powerful alliance that harnesses AnChain.AI cutting-edge smart contract data capabilities, powered by LLM Large Language Models, and BlockTrace's ability to fuse cyber intelligence and deliver custom solutions to equip national security focused stakeholders with the insights and capabilities needed to stay ahead of cybercriminals."

Story continues

The cornerstone of this partnership is the fusion of AnChain.AI's world-leading smart contract investigation capabilities and AI-powered attribution datawith BlockTrace's unique ability to build and integrate custom blockchain intelligence solutions using a service it calls Fusion. Furthermore, BlockTrace is in a unique position to integrate custom cyber data solutions at facilities focused on national security which require a government security clearance. The two companies are already collaborating with multiple U.S. government clients to bring state of the art capabilities not only to track malicious activities, but also to train various public sector partnersand equipthem with specialized skills in cryptocurrency and smart contract investigations.

Shaun MaGruder, Founder & CEO of BlockTrace, emphasizing the power of data integration and expertise, stated, "When it comes to intelligence gathering, targeting, and analysis, the ability to fuse multiple data sources from world leading blockchain intelligence companies is what gives our national security and other public sector partners the edge they need to stay ahead of evolving threats. By merging BlockTrace's cyber capabilities, the ability to build and integrate custom solutions, with AnChain.AI's expertise in AI-powered security and Web3 smart contract data, we're empowering organizations to navigate the complexities of the digital asset ecosystem to proactively defend against emerging threats"

Both the regulatory and law enforcement spaces havewitnessed a rapid escalation in both the scale and complexity of smart contract attacks. The worrying proliferation of exposed state-sponsored groupsorchestrating sophisticated attacks within the DeFi space has continued to accelerate through the first half of 2023, further highlighting the need for rapid and comprehensive global responses to such threats.

As the world grapples with these evolving challenges, AnChain.AI and BlockTrace stand at the forefront of innovation, poised to redefine excellence in cybersecurity and digital resilience.

For all your blockchain intelligence and data integration needs, please visit http://www.blocktrace.com

Schedule training for your organization today at anchain.ai/schedule-training

About AnChain.AI:AnChain.AI (HQ in San Francisco) is an AI-powered cybersecurity company enhancing Web3 security, risk, and compliance strategies. Recognized as one of CNBC's Top Startups for Enterprise and 2023 RSAC Innovation Sandbox Finalist, AnChain.AI was founded in 2018 by cybersecurity and enterprise software veterans from FireEye and Mandiant. Backed by both Silicon Valley and Wall Street VCs, and selected in the Berkeley Blockchain Xcelerator, the company is trusted by 100+ customers from over 10+ countries in these sectors: VASPs, financial institutions, and government, including the U.S. SEC (Securities and Exchange Commission). Featured by CBS News, MIT Tech Review, Coindesk, and DEFCON, AnChain.AI's AML engine screens over $1 billion in daily crypto transactions.

About BlockTrace:BlockTrace, established in 2018, was founded with the mission to assist both government bodies and private enterprises in tackling issues related to the investigation of financial crimes involving cryptocurrencies, such as money laundering, asset recovery, and fraud. Utilizing a multidisciplinary team proficient in cyber and cryptocurrency investigations, software engineering, big data analytics, and forensics, BlockTrace has successfully aided numerous entities in confronting these challenges. Their comprehensive expertise enables them to deliver robust investigative and engineering services, reinforcing their pivotal role in the fight against digital financial crime.

BlockTrace is a pioneer in blockchain intelligence, having developed an innovative solution, Fusion, that aggregates data from leading crypto intelligence providers globally. This groundbreaking API platform affords users, including government agencies, unparalleled access to a comprehensive range of cyber intelligence, liberating them from the confines of single datasets. Fusion facilitates the creation of common user interfaces and dashboards, enabling unique insights into blockchain transactions that were previously unattainable.

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/anchainai-and-blocktrace-join-forces-to-provide-cutting-edge-solutions-to-national-security-sector-partners-301951583.html

SOURCE AnChain.AI

See the original post here:

AnChain.AI and BlockTrace Join Forces to Provide Cutting Edge Solutions to National Security Sector Partners - Yahoo Finance

Read More..

Crypto token ether could rise five-fold by end-2026, StanChart says – Reuters.com

Representation of Ethereum, with its native cryptocurrency ether, is seen in this illustration taken November 29, 2021. REUTERS/Dado Ruvic/Illustration Acquire Licensing Rights

LONDON, Oct 11 (Reuters) - Ether, the second-largest cryptocurrency, may rise more than five-fold in value by the end of 2026, according to global bank Standard Chartered (STAN.L), its latest prediction of rocketing crypto prices.

Ether may hit $8,000 over the next two years as it becomes more widely used in blockchain-based covenants known as "smart contracts," as well as gaming and the "tokenisation" of traditional assets, StanChart Head of FX Research, West, Geoff Kendrick wrote.

Ether was trading on Wednesday at about $1,575.

Assessing the value of cryptocurrencies is fraught with difficulty, as tokens such as ether or bitcoin that are not backed by traditional assets lack the gauges used to price stocks, bonds or currencies. The price of crypto tokens are generally driven by the sentiment of investors.

"We see the $8,000 level as a stepping stone to our long-term 'structural' valuation estimate of $26,000-$35,000," wrote Kendrick, who also heads the bank's digital assets research.

"That valuation assumes future use cases and revenue streams that may not have emerged yet, although the real-world use cases of gaming and tokenisation should support their development."

Kendrick told Reuters that the structural valuation estimate was "very long term, say 2040."

Ether has gained some 30% this year, though remains almost 70% below its all-time high of about $4,869, hit in Nov. 2021.

StanChart said in July that top crypto token bitcoin could reach $50,000 this year and $120,000 by the end of 2024. Bitcoin was last trading at around $27,275.

Reporting by Tom Wilson and Elizabeth Howcroft, Editing by Louise Heavens

Our Standards: The Thomson Reuters Trust Principles.

Read more from the original source:

Crypto token ether could rise five-fold by end-2026, StanChart says - Reuters.com

Read More..

OpenZeppelin excludes isContract, urging ecosystem evolution By … – Investing.com

Crypto.news - OpenZeppelin eradicates the isContract function, fostering a shift towards greater adaptability and enhanced user experiences in the Ethereum ecosystem.

Smart contract development service OpenZeppelin recently removed a commonly used smart contract function called isContract to push the ecosystem forward toward greater flexibility and improved user experiences.

The isContract function returns true if an Ethereum (ETH) address belongs to a smart contract account rather than an externally owned account (EOA). Many decentralized application (dapp) developers have relied on it for security purposes, such as preventing bots from minting non-fungible tokens (NFTs).

However, as Ambire Wallet co-founder and CEO Ivo Georgiev pointed out rejoicing for removing the feature, relying on isContract breaks compatibility with account abstraction wallets like Ambire, Argent, and Safe. These wallets use smart contracts to manage users funds while abstracting some complexities away from the end user.

According to Georgiev, better ways to prevent issues like NFT minting abuse and security vulnerabilities exist. The presence of isContract has led to a harmful myth that smart contracts cannot function as user accounts.

In response, OpenZeppelin removed the function to push developers to reconsider assumptions about smart contracts and user accounts. This controversial move could accelerate the adoption of account abstraction and its associated benefits.

Safe a decentralized custody protocol previously known as Gnosis Safe developer Misha highlighted legitimate use cases of isContract, like ensuring that added Safe modules are valid contracts. However, Georgiev argued that there are better solutions that dont preclude important account abstraction techniques.

The OpenZeppelin documentation warns that isContract should not be relied upon as the sole determiner of contract or EOA status. According to him, with clever programming, bots can return false positives or negatives.

This debate represents an important step forward as Ethereum builders rethink outdated assumptions and plant the seeds for the next generation of user-friendly decentralized applications. Removing isContract forces developers to find alternative solutions, ultimately benefiting end users by stopping discrimination against abstracted accounts.

This article was originally published on Crypto.news

Read market moving news with a personalized feed of stocks you care about.

Get The App

Visit link:

OpenZeppelin excludes isContract, urging ecosystem evolution By ... - Investing.com

Read More..

What is tokenization? – McKinsey

A terracotta soldier figurine emerging from a digital tablet. The soldier looks digitized at it's base but becomes a solid form at it's top.

Were progressing toward the next era of the internet in fits and starts. Web3 is said to offer the potential of a new, decentralized internet, controlled by participants via blockchains rather than profit-motivated corporations. But progress hasnt been linear: one major setback has been the meltdown of the cryptocurrency market in 2022, triggered by multiple cryptocurrency failures and high-profile cases of fraud. Regulators are paying increased attention to Web3 players, and public curiosity is peaking.

Robert Byrne is a senior partner in McKinseys Bay Area office, and Prashanth Reddy is a senior partner in the New Jersey office.

But Web3 is about much more than crypto. Blockchain, smart contracts, and digital assetsthe latter created via a process called tokenizationstand to change the way we exchange ideas, information, and money. For organizations and early adopters, there is significant value on the table.

Lets get specific: tokenization is the process of issuing a digital representation of an asset on a (typically private) blockchain. These assets can include physical assets like real estate or art, financial assets like equities or bonds, nontangible assets like intellectual property, or even identity and data. Tokenization can create several types of tokens. Stablecoins, a type of cryptocurrency pegged to real-world money designed to be fungible, or replicable, are one example. Another type of token is an NFTa nonfungible token, or a token that cant be replicatedwhich is a digital proof of ownership people can buy and sell.

Tokenization is potentially a big deal. Industry experts have forecast up to $5 trillionin tokenized digital-securities trade volume by 2030.

Theres been hype around digital-asset tokenization for years, since its introduction back in 2017. But despite the big predictions, it hasnt yet caught on in a meaningful way. We are seeing slow movement: US-based fintech infrastructure firm Broadridge now facilitatesmore than $1 trillion monthly on its distributed ledger platform.

In this article, well drill down into how tokenization works and what it might mean for the future.

Learn more about McKinseys Financial Services Practice.

Before we dig deeper into tokenization, lets get some basics defined. As weve seen, Web3 is a new type of internet, built primarily on three types of technology:

As well see, these technologies come together to support a variety of breakthroughs related to tokenization.

Some industry leaders believe tokenization stands to transformthe structure of financial services and capital markets by letting asset holders reap the benefits of blockchain, including 24/7 operations and data availability. Blockchain also offers faster transaction settlement and a higher degree of automation (via embedded code that only gets activated if certain conditions are met).

While yet to be tested at scale, tokenizations potential benefits include the following:

Learn more about McKinseysFinancial Services Practice.

There are four typical steps involved in asset tokenization:

Maybe. Financial services players are already beginning to tokenize cash. At present, approximately $120 billion of tokenized cash is now in circulation in the form of fully reserved stablecoins. As noted above, stablecoins are a type of cryptocurrency pegged to a physical currency (or commodity or other financial instrument) with the goal of maintaining value over time.

Financial services players may be starting to play with tokenizingtheirs is the biggest use case to datebut its not yet happening on a scale that could be considered a tipping point.

That said, there are a few reasons that tokenizing might take off. For one thing, the higher interest rates of the current cyclewhile cause for complaint for manyare improving the economics for some tokenization use cases, in particular those dealing with short-term liquidity. (When interest rates are high, the difference between a one-hour and 24-hour transaction can equal a lot of money.)

Whats more, since tokenization debuted five years ago, many financial services companies have significantly grown their digital asset teams and capabilities. These teams are experimenting more and continually expanding their capabilities. As digital asset teams mature, we may see tokenization increasingly used in financial transactions.

Learn more about McKinseysFinancial Services Practice, and check out Web3-related job opportunities if youre interested in working at McKinsey.

Articles referenced:

See original here:

What is tokenization? - McKinsey

Read More..