Explained: The Blockfolio Hack (Feb 2021) (2024)

Blockfolio is a portfolio management application that allows no-fee trading of cryptocurrency and stocks. On February 9, 2021, the platform was hacked, causing it to send offensive and racist messages to its users.

Inside the Hack

The Blockfolio hack did not target the company’s trading infrastructure. No trading functionality was impacted by the incident, user funds are still safe, and the company is even providing a $10 credit to current and new users (for one week).

The target of this particular attack was Blockfolio’s customer communications infrastructure. The company uses Signal to broadcast messages to its users, enabling Blockfolio to provide direct updates to customers. Additionally, Blockfolio maintains a display and news section for customer interactions.

These customer-facing systems are what were compromised in the attack. With access to the company’s Signal submitter and other infrastructure, the attacker was able to push racist and offensive messages to Blockfolio users.

3 Key Takeaways from the Hack

Unlike many blockchain project hacks, this particular attack did not involve the theft of users’ money or even place it at risk. Instead, the attacker exploited a weak point in the company’s defenses to tarnish customer relationships. Analysis of this attack provides a few important takeaways for Blockfolio in particular and any blockchain company in general.

1. Strong Access Management is Vital

In this hack, the attacker was able to take control of Blockfolio’s Signal submitter to broadcast racist and offensive messages to its users. While the details of the incident are still unknown, it is likely that the hack was enabled by poor access management policies within Blockfolio.

Strong access management requires implementing least privilege and multi-factor authentication (MFA). Least privilege limits the access of a particular user to what is necessary, which limits the damage that a user account can do if compromised. MFA makes it harder for an attacker to compromise a user’s account by requiring access to the second authentication factor to log into the account. By implementing both of these policies, an organization limits its attack surface and makes account compromise much more difficult to perform.

2. Comprehensive Security Audits Are a Necessity

In response to the hack, Blockfolio CEO Sam Banman-Fried stated, “Over the next month I’ll be leading a security review of the old, non-trading-related parts of Blockfolio to bring them in line with the standards set by trading, and by FTX more generally.” While this is a good effort, it amounts to locking the barn door after the horse has escaped.

Cybercriminals commonly take advantage of the weakest point in an organization’s or system’s defenses. This means that true cybersecurity requires securing all aspects of an organization’s business. For many dApps, a common mistake is to audit only the smart contract, leaving potential vulnerabilities in the web front-end overlooked. In Blockfolio’s case of being a centralized app, a failure to secure its customer communications infrastructure led to an embarrassing security incident.

3. Reputational Damage Can Have Financial Impacts

The Blockfolio hack allegedly did not impact the trading-related components of the Blockfolio application, meaning that users’ funds are not at risk and Blockfolio won’t have to pay restitution. However, that doesn’t mean that this incident won’t hurt Blockfolio financially.

Reputation matters, and this hack may cause users to doubt Blockfolio’s ability to keep their money secure. While this hack may not have cost the company any money directly, it definitely hurt its reputation and may have cost it in the long term as investors look elsewhere.

Securing Blockchain Solutions

Blockchain infrastructure is complex, and that isn’t counting all of the blockchain-adjacent systems like an organization’s web front-end, communications systems, and other back-end infrastructure. As this incident – and numerous other blockchain hacks – have demonstrated, an end-to-end security audit is essential for maintaining customer trust and confidence in an organization’s products. Contact Halborn for help should your organization be in need: [email protected].

Explained: The Blockfolio Hack (Feb 2021) (2024)
Top Articles
Managing Transactions
What are Ports 20 and 21?
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Melvina Ondricka

Last Updated:

Views: 5880

Rating: 4.8 / 5 (48 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.