Author: ronalthapa

  • How Much Money Has Been Stolen in Crypto throughout History?

    How Much Money Has Been Stolen in Crypto throughout History?

    Is Cryptocurrency Even Safe?

    The potential of blockchain applications is endless. It is based on principles of cryptography, decentralization and consensus, which ensure trust in transactions. It eliminates the need for intermediaries in a wide array of transactions, virtually transforming every corner of the global economy.

    Cryptocurrency, as a result of blockchain technology, gives us total control over our money, thereby becoming our own bank. On paper, crypto is generally safe thanks to the blockchain’s decentralized distributed ledger and the encryption process every transaction undergoes.

    However, the crypto space is still in development, and most of us still have to rely on third-party wallet providers to store our crypto. The security of our fund is only as safe as the safeguards and security measures the provider has in place.

    As crypto evolves, so do hackers and scammers. Malicious actors are getting more creative at exploiting vulnerabilities in blockchain projects, devising new tactics to bypass their security controls.

    How Much Money Has Been Stolen to Date?

    Over the years, hackers have exploited loopholes within the platforms of these third parties, especially on DeFi protocols. They have also coordinated attacks on certain cryptocurrencies directly such as utilizing flash loans to their advantage — borrowing a large amount of funds without collateral to quickly carry out pump-and-dump schemes.

    Crypto Hacks since 2011 (Source: Comparitech)

    To this date, more than $7 billion have been stolen in the crypto space. As crypto prices tend to change, that $7 billion would be worth so much more today. If the hackers were to cash it in today, they would have amassed a fortune worth more than $40 billion!

    This number alone is from exploits and thefts by hackers. It does not include other events such as rug pulls or corporate fraud. Those numbers would be even higher if they are added together.

    Five Largest Crypto Hacks in History

    Comparitech, a pro-consumer website that focuses on cyber security, has managed to track and record all attacks that have happened in the crypto space since 2011.

    There are 365 recorded attacks so far and the five largest hacks make up more than one-third of the stolen $7+ billion:

    Ronin Network (Axie Infinity) – $620 Million Stolen

    Ronin Network is an Ethereum-linked sidechain that powers Axie Infinity, one of the leading blockchain games. On 29 March 2022, Ronin Network was hacked and 173,600 ETH and 255,000 USDC were stolen as a result, worth $620 million at the time.

    See also: The Pros and Cons of Stablecoins: Why You Need To Know How They Work

    The U.S. Treasury Department attributed the hack to Lazarus, a North Korean hacking group. Lazarus reportedly reached out to developers of Axie Infinity via LinkedIn on the pretense of a fake company, offering them an “extremely generous” compensation package.

    A senior engineer took the bait and clicked a PDF which supposedly contained the “offer.” This led to the engineer’s computer being compromised as well as the validator nodes of the Ronin Network.

    Poly Network – $610 Million Stolen

    Poly Network is a cross-chain protocol that implements blockchain interoperability in DeFi. In August 2021, a hacker managed to exploit a vulnerability in Poly Network’s code which enabled them to transfer more than $600 million worth of tokens to their own account.

    Through a series of negotiation, Poly Network pleaded with the hacker to return the stolen funds, calling him “Mr. White Hat.” The platform even offered him a $500,000 bounty and a job as “chief security advisor.” Surprisingly, the hacker returned all of the stolen funds!

    Security experts believe that it was likely the hacker realized it would be impossible to launder the money and cash out, since all transactions are recorded on the blockchain.

    Coincheck – $532 Million Stolen

    Coincheck is a Japanese cryptocurrency exchange and NFT marketplace founded in 2012. In January 2018, its NEM (XEM) tokens worth more than $530 million at the time were stolen and transferred to 11 different addresses.

    Hackers exploited the fact that the tokens were being stored in a “hot wallet”, which was connected to the server. This made it susceptible to phishing attacks.

    Coincheck also did not have a multi-signature security measure in place, which requires more than one person to sign off before funds can be moved. As a result, a single point of failure would be established.

    MT Gox – $470 Million Stolen

    MT Gox was a Japanese Bitcoin exchange founded in 2010, and it was handling over 70% of all Bitcoin transactions worldwide by early 2014.

    It is arguably the most infamous case of crypto hacks in history. It was the first large-scale hack on an exchange and is still the biggest theft of Bitcoin (BTC) from an exchange to this day.

    The attack on MT Gox was not a solitary event. Rather, the exchange had been leaking funds since 2011, until it was discovered in February 2014. During this period, around 100,000 BTC were stolen from the exchange and 750,000 BTC were stolen from the exchange’s customers. At the time, these BTC were both $470 million, but today, they are worth around $4.7 billion!

    MT Gox filed for bankruptcy shortly after the hack. Only 200,000 of the stolen BTC were successfully recovered.

    Wormhole – $326 Million Stolen

    Wormhole is a blockchain bridge between Solana and other top DeFi networks, allowing users to swap Solana tokens (SOL) for other crypto on DApps across the Ethereum network.

    The attack exploited a signature verification vulnerability in the network that allowed the hacker to freely mint 120,000 wrapped ETH (wETH), worth $326 million at the time.

    Cross-chain bridges are critical infrastructure in the DeFi ecosystem as users can move their funds between blockchains. A lot of money is being moved. This means that security is a number one priority for these platforms. However, Wormhole was harshly criticized for its lack of comprehensive security audit before going live.

    According to an article by Hacken, though Solana may be blamed for providing the instrument with security flaws to its projects, Wormhole might have “prevented the incident by auditing the instruments it used.”

    The Bottom Line

    Despite improvements, the crypto industry still faces security concerns, especially in peer-to-peer ecosystems where anybody can join anonymously. It becomes almost impossible to track malicious actors when their identity is hidden.

    New forms of cyber threats are emerging that are capable of causing massive, irreparable damage. And this list will only continue to grow unless there is a solid security measure that is widely established.

    Therefore, it is important to learn about the potential security flaws that are prevalent in third-party platforms like DeFi, crypto wallets and exchanges. As investors, we should recognize the kinds of attacks that hackers pull off so that we can spot and avoid them beforehand.

  • Bearish Chart Patterns Cheat Sheet: Crypto Technical Analysis

    Bearish Chart Patterns Cheat Sheet: Crypto Technical Analysis

    Technical analysis made easy with bearish chart patterns packed into a cheat sheet, so that you can cut your loss during the bear market.

    Is Technical Analysis Useful?

    Crypto, as a new asset class, is volatile in nature. Its price fluctuates because it is heavily influenced by supply and demand, and it reflects how the public feels about the asset. This is known as market sentiment — bullish when prices are rising, bearish when prices are falling.

    The market is constantly changing. In many cases, it does not matter how you feel about it, it only matters how the market is going to feel about it.

    Market sentiment is a critical indicator to predict price movements and make investment decisions. An easy way to gauge market sentiment is by looking at chart patterns. They tend to repeat themselves, and once you are able to recognize them, it becomes easier to strategize your entries and exits.

    However, it is important to note that they are NOT a guarantee that the market will move in that predicted direction. It should only serve as a frame of reference for you to feel how the market moves.

    Bearish Chart Patterns

    These are some of the most common bearish chart patterns you will see in the market. This cheat sheet will help you identify real-time candlestick patterns whenever you’re on Binance, FTX or other crypto exchanges, so that you can spot bearish trends earlier and better prepare your exits to cut loss.

    Head and Shoulders (Bearish)

    Head and Shoulders (Bearish)

    The head and shoulders pattern is regarded as one of the most reliable trend reversal patterns. It is one of the top patterns that generally signals the end of an upward trend. The pattern is most prevalent among two of the largest coin by market cap, Bitcoin and Ethereum.

    The pattern occurs when a large peak has two slightly smaller peak on its side, resembling the shape of a head in the middle and the shoulders on the sides.

    The only thing you have to know is that all three peaks will fall back to the same level of support, also known as the “neckline.” Once the third peak has fallen back to the support line, it is likely that it will continue into a bearish downtrend. (Alprazolam) Traders would opt to short the market as a result.

    But if the tide turns in favor of a bull market, the asset will attract buying pressure, and the price will reverse into a bullish uptrend as a result. This usually happens if the third peak is slightly higher than the first peak.

    This is why the head and shoulder pattern is reliable because the result of the market being bullish or bearish is 50/50. There is a possibility the price action would go sideways following the third peak.

    Descending Triangle (Bearish)

    Descending Triangle (Bearish)

    A descending triangle is a bearish pattern which signifies the continuation of a downtrend, hence “descending” triangle. It happens when the downward-sloping line of lower highs crosses the support line, continuing the downtrend.

    This means that the market is dominated by sellers. Typically, traders will also enter a short position during a descending triangle in an attempt to profit from the continuous price drop.

    Successively lower peaks are likely to occur and unlikely to reverse. However, it could turn out to be a false breakout in which the price moves sideways for some time after breaking through the support line.

    Rising Wedges (Bearish)

    Rising Wedges (Bearish)

    A rising wedge occurs when the trend line is sandwiched between two upwardly slanted lines, getting narrower as the support line gets closer to the resistance line. In this case, the line of support is steeper than the resistance.

    It may seem like an upward trend but it isn’t. In fact, it is a reversal pattern. A rising wedge is usually indicative that an asset’s price will rise before it drops and breaks through the level of support, as shown in the second picture above.

    Generally, the asset’s price will eventually decline more permanently as a result. The rising wedge is difficult to spot because it resembles a bullish consolidation formation — the series of higher highs and higher lows keep the trend inherently bullish.

    There are no measuring techniques to estimate the decline. But the next best thing is to look at the trading volume. If volume declines as the price rises, the wedge gets narrower. This marks the exhaustion of the buying trend which is a sign of a bearish reversal. Thus, a break of the support line accompanied by high volume confirms the bearish pattern.

    Double Top (Bearish)

    Double Top (Bearish)

    A double top is when the price experiences a peak, before retracing back to the support line. It will then climb up once more before dropping more permanently. It resembles an M shape, hence “double top.” Jokingly, the M stands for working at “McDonalds” during the bear market!

    It may seem like a bullish trend, but it is in fact a bearish reversal pattern. The buyers push the price higher, creating a series of higher highs and higher lows. However, at a certain point, the buyers cannot extend this bullish trend, and the second peak is registered as an equal high as a result. This is when the sellers target this weakness, pushing the price even lower.

    Summary

    These are some of the most common bearish patterns you will see in the market. This cheat sheet will help you spot bearish downtrends earlier so that you can exit and avoid loss. However, it is important to note that crypto is volatile in general.

    These chart patterns are NOT a guarantee that the market will move in that predicted direction. It should only serve as a frame of reference for you to feel how the market moves.

  • Urgent: Ongoing Solana Hack, Million Dollars Drained from more than 5,000 Wallets

    Urgent: Ongoing Solana Hack, Million Dollars Drained from more than 5,000 Wallets

    What Happened to Solana?

    More than $6 million have been stolen from more than 5000 Solana wallets late Tuesday night, according to a tweet from Solana auditor OtterSec. The tweet is supported by other accounts on Twitter that claimed their holdings were wiped in a matter of minutes.

    The Solana auditor revealed that the transactions were in fact authorized by the owners of the wallets, suggesting a private key breach on a massive scale.

    ETH users may also be impacted by the attack. It is uncertain that the attack is limited only to the Solana blockchain. A TrustWallet and Slope wallet user reported losing USDC on both Solana and Ethereum.

    See also: What is Solana (SOL token): explained

    What Caused the Solana Attack?

    The exact cause of the Solana attack is as yet unknown, but Magic Eden, leading NFT marketplace of Solana, urged all Solana users to “revoke permissions for any suspicious links” as well as all apps if necessary.

    Reports indicate that all internet-connected hot wallets on Solana such as Phantom and Slope have been affected. Wallets that have not been used in more than six months seem to be mostly targeted, and all Phantom wallets have been compromised.

    Phantom tweeted, “We are working closely with other teams to get to the bottom of a reported vulnerability in the Solana ecosystem. At this time, the team does not believe this is a Phantom-specific issue.”

    On the other hand, crypto security firms believe that the exploit was not the result of a vulnerability with the Solana blockchain itself. Instead, they suspect the attack was a result of a mass compromise of users’ private keys by a third party.

    Sam Bankman-Fried, founder and CEO of FTX, commented in an interview with Fortune, “this wasn’t a core blockchain problem, likely seems like one app someone built was buggy.”

    Slope wallet to blame for the Solana attack?

    Solana is still investigating the hack, but so far is suggesting that wallet provider Slope is largely responsible for the security exploit. In a tweet, they state that “…it appears affected addresses were at one point created, imported, or used in Slope wallet applications.”

    Solana’s investigation is suggesting that Slope may be responsible.

    The Solana team has also found that whilst 60% of the victims were Phantom users, those who were affected did not generate their seed phrase using Phantom. Also, those who were solely Phantom users did not have their wallets drained.

    How Do I Protect Myself from this Attack?

    Users are advised to move their funds to a cold wallet such as a Ledger or Trezor hardware wallet, and ensure that the wallet has no previous approved authorizations to spend funds and is created offline following best security practices.

    For users without a hardware wallet, sending funds to major crypto exchange is a viable temporary solution.

    In the form of a community warning, web3 gaming company Star Atlas also urges users to withdraw permission for all of the apps in their wallets and shift money to cold storage with the Solana exploit underway.

    I have been affected by the Solana attack. What should I do?

    As ongoing investigations suggest that Slope may be responsible for the recent hack, Solana co-founder Anatoly Yakovenko advised Slope wallet users to regenerate their feed phrase in a different wallet.

    Slope has also issued a statement recommending ALL Slope users (not just those affected by the Solana attack) create a new and unique seed phrase wallet and transfer all their assets there. They also reassure users who have been using hardware wallets that their keys have not been compromised. Check this page for our hardware wallet reviews and guides.

    Note: Until 8th Aug 2022, Ledger is offering 10% off the Ledger Nano X and Ledger Nano S Plus when entering the code MOVESOL2LEDGER at checkout. Click here to buy!

    Is the Attack Still Ongoing?

    It’s unknown at this point whether the breach is still active, where it came from, and whether any further user funds are still in danger. Blockchain fraud investigator @zachxbt revealed that the attackers funded the main wallet connected to this operation via Binance seven months ago.

    The transaction history reveals that the wallet was inactive until today, at which point, the hackers made transactions with four separate wallets ten minutes before the incident occurred.

    Solana Hacker Wallet Address

    Frequently Asked Questions (FAQ)

    How do I protect myself from the Solana Hack?

    The current best strategy is to move funds into a cold wallet – such as the ledger hardware wallet. Make sure that the wallet has no previous approved authorizations to spend funds and is created offline following best security practices.

    Where to move my Solana funds if I don’t have hardware wallet?

    If you don’t have a hardware wallet, moving funds to a major crypto exchange is also a viable option now. However, it is recommended that users should get a hardware wallet and transfer their funds there as soon as possible. Check this page for our hardware wallet reviews and guides.

    Which Solana wallets were hacked?

    Multiple wallets – Phantom, Slope, Solflare, TrustWallet – across a wide variety of platforms are compromised. It is advised to move your funds to a hardware wallet or major crypto exchange for security purposes.

    Who were the Solana hackers?

    Investigators identified the following four wallets as the address of the attackers:
    CEzN7mqP9xoxn2HdyW6fjEJ73t7qaX9Rp2zyS6hb3iEu Htp9MGP8Tig923ZFY7Qf2zzbMUmYneFRAhSp7vSg4wxV 5WwBYgQG6BdErM2nNNyUmQXfcUnB68b6kesxBywh1J3n GeEccGJ9BEzVbVor1njkBCCiqXJbXVeDHaXDCrBDbmuy

    Is Solana dead?

    The widespread Solana wallet hack certainly impacts the market sentiment toward Solana, and many investors have expressed doubt about the project’s future. As of now, the attack has prompted an 8% drop in Solana’s price in the two hours following the first reports of the attack.

    What caused the Solana wallet hack?

    Crypto security firms believe that the exploit was not the result of a vulnerability with the Solana blockchain itself. Instead, they suspect the attack was a result of a mass compromise of users’ private keys by a third party.

    An ongoing investigation by Solana suggests that wallet provider Slope is responsible. This is because affected addresses were once created, imported, or used in Slope mobile wallet applications.

  • Crypto Bitcoin Horror Stories to Give You Nightmares

    Crypto Bitcoin Horror Stories to Give You Nightmares

    You’d be surprised at how people, loaded with Bitcoin and other crypto, managed to lose their ticket to retirement.

    One Wrong Click – $120,000 Crypto Gone

    A phishing attack is the oldest play in the book, the bread and butter of web3 scammers.

    They work by tricking victims with fake error messages, wallet pop ups, or flashy hyperlinks. They will then lead you to unofficial websites or extensions that would expose your wallet seed phrase or other sensitive information. 

    You’d think people would be more careful about connecting to shady websites, but the truth is both crypto newbies and veterans still fall victim to these to this day!

    Reddit user PowerofTheGods shared his story of how he lost $120,000 after clicking on a malicious link. While his ledger was unlocked, a Trojan malware took control of his computer and wiped all of his wallets in a matter of minutes. The sight of all his assets being transferred to the hacker’s wallet address still haunts him to this day.

    The story went viral and countless people also shared their unlucky experience. They reported to the authorities, but there was nothing they could do as cryptocurrency is still largely unregulated.

    Always be cautious when encountering suspicious links especially from an unknown source. Also always double-check the link that you are clicking is indeed the right one. Some scammers can even copy the domains of well-known DApps with slight moderations to it, and you won’t even notice the difference.

    Crypto Exchange CEO Died – All Users’ Assets Locked

    This case is the literal sense of the phrase, “taking secrets to the grave.”

    Canadian exchange QuadrigaCX’s CEO Gerald Cotten allegedly passed away in India in 2018. He was the sole custodian of the exchange’s crypto store, which is all held in cold storage.

    No one has ever been able to unlock the digital wallet passwords on his encrypted laptop. As a result, over 115,000 users’ assets are locked indefinitely, including 26,500 Bitcoin, 11,000 Bitcoin Cash, 200,000 Litecoin, and 430,000 Ethereum.

    In fact, in early 2022, Netflix released a documentary, Trust No One: The Hunt for the Crypto King, about Cotten’s life and his death in India.

    The morale of the story is never store your crypto on exchanges, especially if you have large holdings. Consider holding your funds in hardware wallets like Ledger Nano XLedger Nano S or Trezor Model T.

    Forgotten Password to 7,002 Hard-Earned Bitcoin

    About 20% of all Bitcoins are lost in circulation. That is a lot of money that is unlikely to be recovered. This happens when users forget their private key or even the password to the hard drive containing the private key.

    German engineer Stefan Thomas was given 7,002 Bitcoin in exchange for creating an animated video in 2011 called “What is Bitcoin?” However, he has forgotten the password to his encrypted hard drive called IronKey, which stores the private key to the Bitcoins.

    IronKey allows users 10 attempts to input their password correctly before the funds are encrypted forever. Thomas only has two attempts left before his Bitcoins are gone forever.

    Always remember to write down your password and seed phrase on a piece of paper and store it securely. Or it would be a lifetime of regret.

    Spring Cleaning Gone Wrong – 8,000 Bitcoins Lost

    Remember when some of your stuff would go missing, only to find out your mom had thrown them away because she thought it was useless? An action figure with sentimental value? No big deal!

    But for James Howells, it was life-changing. He had two identical laptop hard drives — one was blank and the other contained 8,000 Bitcoins. Howells had meant to throw out the blank one when he was clearing out the office, but instead the drive containing the crypto ended up in a landfill in Newport, Wales!

    This unlucky disaster continues to haunt Howells to this day. He has repeatedly petitioned Newport City Council if he can dig up the landfill site, which were all denied.

    10,000 Bitcoins for 2 Pizzas

    May 22 is known as Bitcoin Pizza Day. It is a well-known story in the crypto world. It was the day Laszlo Hanyecz paid 10,000 Bitcoins for two Papa John’s pizzas in 2010, which was worth $30 at the time. Now they are worth nearly $230 million!

    We can’t blame him for not knowing the future. Since Bitcoin did not have that much value back then, it was more like redemption points for pizza. Had he held his Bitcoins, he would not have to work a day in his life again.

    Amazingly, Laszlo said that he had no regrets about it, and was happy to be a part of the early history of Bitcoin. In fact, Hanyecz is the first person to use Bitcoin in a commercial transaction.

  • 3 Ways You’re Losing Crypto Without You Knowing!

    3 Ways You’re Losing Crypto Without You Knowing!

    If you think you are safe on the blockchain, think again! You’re constantly being watched, and malicious actors are getting more creative at stealing your precious crypto. Here’s what might be waiting for you.

    Your Crypto and IP Address Are Exposed Interacting on DApps

    Did you know that your personal data including your crypto and IP address are exposed whenever you connect to a DApp? Here’s how it works.

    Your wallet does not actually interact with the blockchain directly. Instead, it can only do that through nodes. A node is one of the computers that run the blockchain’s software to validate and store the entire history of transactions on the network.

    Each time you connect to a DApp, make a transaction or deposit funds to a protocol, the request is sent to a node, which verifies and executes the transactions. These nodes are usually deployed and run by node providers. But what you do NOT know is that node requests are also packed with sensitive information like your IP address, web browser version, and so on.

    Now, of course, these data remain at the node company. They have strict policies not to share the data with a third party. But what if the company gets hacked or acquired by some other company? That is when your personal information is out in the open. Node providers can also ban you from accessing the blockchain entirely via their nodes.

    Crypto Sandwich Attack on Decentralized Exchanges

    Have you ever wondered why you end up paying more for the tokens you buy on certain decentralized exchanges (DEX), only to find out they are worth less afterwards? The truth is, when you trade on DEXes, you are always losing out to bots. Here’s how it works.

    When you execute a trade, a bot front-runs your trade by buying the tokens right before your transaction is mined. This increases the price, making you buy for a higher price and pushing it even further up. Afterwards, the bot profits by selling the tokens after your purchase transaction is mined. This is called the “sandwich attack” because your pending transaction is “sandwiched” between the bots’ orders.

    Each transaction is sent to a public mempool, which is a queue for the transactions that have not been added to a block and are still unconfirmed. It is visible to everyone, and bots, being quick enough, can exploit that. There is nothing much we can do about it because that is just the public nature of blockchains.

    Getting Doxxed by Your Ethereum Name Service Domain

    Showing off your Ethereum Name Service (ENS) domain is cool, but did you know that people can use that to track down your wallet addresses?

    You can check out Unstoppable Domains: Get ready for a censorship immune future on how domain name services work.

    While ENS is a huge step forward in terms of convenience, it also means several steps backward when it comes to privacy. Since most blockchains are open and transparent, anyone can use your ENS to snoop on your finances. It is the difference between sending someone an email and them being able to look at your entire inbox.

    Here’s how it works. You will need a wallet address to register an ENS domain. As a result, each ENS domain has a wallet address attached to it. Even if you do not use your main wallet address to register your ENS, it is easy to trace this address back to your other addresses.

    Let’s look at an example – neutral.eth. At first glance, there isn’t much going on. At first glance, there isn’t much going on, but when digging a little deeper, the Ethereum address that registered the name held 58,000 Ethereum at one point, worth about $15 million at the time. This address regularly received large payments from the crypto exchange Poloniex’s main wallet. And all activities stopped the same day Circle – who owned the Poloniex exchange at the time, got rid of trading fees. This shows it was a company wallet that created neutral.eth.

    Just from an ENS domain alone, you can watch people’s movements, see insights into business deals and know just how much money people really have – all by observing public blockchain data. If your valuable information falls into the wrong hands, there would be a target on your back.

    Are DApps private?

    Certain DApps are run by node providers who can see your personal information such as IP address and web browser version etc.

    What is a Sandwich Attack?

    When you execute a trade, a bot front-runs your trade by buying the tokens right before your transaction is mined. This increases the price, making you buy for a higher price and pushing it even further up. Afterwards, the bot profits by selling the tokens after your purchase transaction is mined.

    Are ENS domains private?

    Since each ENS domain has a wallet address attached to it, it is easy to trace this address back to your other addresses.

  • Will Tether Stablecoin (USDT) Depeg Again? Reserve FUD Continues

    Will Tether Stablecoin (USDT) Depeg Again? Reserve FUD Continues

    USDT has reclaimed its peg after UST collapse. But will this happen again amidst FUD rumors surrounding Tether?

    What is USDT?

    Tether (USDT) is the world’s largest stablecoin by market cap with more than $65 billion in circulation at the time of writing. Stablecoins have long been the anchor of cryptocurrency trading because they are pegged to the U.S. Dollar, allowing investors to “cash out” of risky investments instead of swapping to another crypto coin that would fluctuate in value.

    For more information on stablecoins, check out “The Pros and Cons of Stablecoins: Why You Need To Know How They Work.”

    What Happened to USDT?

    However, stablecoins are not exactly 100% “stable”. This is shown by the sudden vaporization of $18 billion in the collapse of Terra’s algorithmic stable terraUSD (UST), which caused a dangerous domino effect across the market.

    This catastrophic event spurred panic selling in other stablecoins, and Tether Ltd., the company behind USDT, honored billions of dollars’ worth of redemptions following UST’s bank run. As a result, USDT’s peg broke and fell to as low as 95 cents. It is a huge red flag if a stablecoin drops below 99 cents, especially for stablecoin heavyweights such as USDT itself.

    Fortunately, USDT has passed the market’s stress test. They were able to withstand redemptions in extremely volatile conditions, eventually reclaiming the peg. However, Tether is still facing criticisms for the lack of transparency about the nature of assets backing the stablecoin.

    Tether fights back: calls short-selling hedge funds “flat out wrong”

    Many hedge funds saw the collapse of Terra as a reason to short USDT. According to a Wall Street Journal podcast, the reason for this is twofold. Firstly is the fact that institutional investors are withdrawing from risky investments (such as crypto) since the Federal Reserve is aggressively raising interest rates. Secondly, they are worried about the quality of the assets backing Tether.

    In Tether’s blog post on 28th July 2022, Tether hit back at these hedge funds, saying that, “…the underlying thesis of this trade is incredibly misinformed and flat-out wrong. It is further supported by a blind belief in what borders on outright conspiracy theories about Tether.”

    Tether also added in a blog post on 27th July 2022 that its portfolio does not contain any Chinese commercial paper. Furthermore, as of the date of the post, its total commercial paper exposure has been reduced to around 3.7 billion (from 30 billion a year ago). Tether also states that it has plans to further reduce its total commercial paper exposure to 0 by October/early November 2022.

    What is Exactly Backing USDT Value?

    Tether has claimed that all USDT tokens are backed 100% by the company’s reserves. According to their latest reserves attestation report audited by MHA Cayman, an independent accounting firm, the company’s total assets exceed its total liabilities, suggesting that USDT is fully backed. Its holdings include U.S. Treasury bills, money market funds, cash, and commercial paper.

    Great, this finally puts an end to what is in their reserves and we can all sleep peacefully without worrying about a USDT collapse, right? Not quite. In fact, there are namely two big issues surrounding Tether’s backing.

    • Nearly Half of USDT’s Reserves Were in Commercial Paper

    According to the report, Tether has more than $20 billion worth of commercial paper in their total assets. Commercial paper is a short-term unsecured debt issued by companies. This poses a problem to backing stablecoins because they are generally seen as less secure and illiquid, unlike cash and U.S. Treasury bills.

    There have also been rumors that most Tether’s commercial paper holdings are backed by debt-ridden property developers in China, albeit Tether denies the rumors. As mentioned previously, Tether has denied rumours that its portfolio contains Chinese commercial paper.

    On the positive side, Tether has taken an initiative in reducing its commercial paper holdings to zero in favor for U.S. Treasuries to back USDT reserves. Tether currently has around 3.7 billion in commercial paper exposure (as of July 2022) but plans to eliminate this completely by October/early November 2022.

    Does this mean that Tether is taking on a leadership role in support of greater transparency for the stablecoin industry? Or is this just a facade, given that Tether continues to avoid a comprehensive audit? This brings us to the next issue. Ambien

    • Tether Has Yet to Undergo an Impartial and Comprehensive Audit

    Though Tether was open about the state of their reserves, the problem lies with the firm that audited it. MHA Cayman is a small-time independent accounting firm based in Cayman Islands. So it is understandable that critics believe that it is more of a validation of information based on management claims than an audit.

    John Reed Stark, an SEC attorney leading cyber-related projects for 15 years, tweeted that the best way for Tether to end the allegations against them would be to “engage a big-four accounting firm to conduct an audit which finds a rock-solid balance sheet. He also added, that, “without a proper audit, everything else Tether’s CFO says is just noise.”

    The big-four refers to the four largest professional services networks in the world, consisting of the global accounting networks Deloitte, Ernst & Young, KPMG, and PwC. They have recently been getting involved in the blockchain industry, working with many crypto companies for regulation purposes.

    A big-four audit carries a lot of weight with the SEC, and many larger companies want to be a part of it because it would make their enterprise more attractive and trustworthy to investors.

    What Would Happen if USDT Collapses?

    If USDT were to collapse, it would deliver catastrophic results in the industry, sparing nothing. It would mean the end of Ethereum DeFi which is a predominantly USDT-based market. This would trigger a chain reaction across all smart-contract networks.

    Bitcoin will also be severely impacted as more than half of bitcoin is traded for USDT since 2019, according to data cited by JPMorgan analysts. As a result, history would repeat itself, triggering another bank run, destabilizing exchanges and causing a panic drop in Bitcoin’s price.

    But we should not forget that USDT was able to maintain its stability through multiple black swan events and extremely volatile conditions, and has managed to stick to its values and honor all redemption requests during the UST collapse in May.

    After all, USDT has long been the king of stablecoins and is critical for maintaining any confidence in the industry. All the big players in crypto will simply not let a collapse happen.

  • 10 Best Smart Contract Security Auditing Firms in 2022

    10 Best Smart Contract Security Auditing Firms in 2022

    We have compiled an updated list of the top performing blockchain security and smart contract auditing companies in 2022, giving you comprehensive data and history of these firms for you to make the best informed decision possible.

    Why Do Smart Contract Auditors Matter?

    A lot has happened since 2020 when we last ranked the best smart contract auditors at the time. As the crypto space is evolving, so are hackers and scammers around the world. Web3 attacks are becoming increasingly frequent, and each day malicious players have found creative ways to exploit smart contract vulnerabilities for quick profit.

    One of the largest crypto hacks in history happened earlier this year when Wormhole, Solana’s cross-chain bridge, was hacked on February 2nd. The attack exploited a signature verification vulnerability in the network that allowed the hacker to freely mint 120,000 wETH, worth $325 million at the time. As a result, security audits are extremely important. According to an article by Hacken, though Solana may be blamed for providing the instrument with security flaws to its projects, Wormhole might have “prevented the incident by auditing the instruments it used.”

    Quality smart contract assurance helps identify potential issues, and ensure that the protocol is ready at all times to address any threat that could put its users’ funds at risk. However, there are no guarantees that a protocol will be 100% secure after an audit, but a good smart contract auditor can still perform thorough reviews to potentially prevent major vulnerabilities after launch. To keep up with the increasing demand in blockchain security, certain auditing firms have also branched out to offer other cybersecurity services such as penetration testing, running bug bounty programs, vulnerability assessments, and threat modelling.

    What Makes a Good Smart Contract Auditor?

    We have compiled our list of the top smart contract auditors this year based on a set of criteria. One of the first steps in finding a reliable smart contract auditor is to check the portfolios of projects they have audited. Doing so allows you to see the size and popularity of the projects they have audited, and more importantly if any of the projects they have worked on have been compromised. Larger projects tend to attract more attention from hackers, and if they have not been exploited for a long period of time, then it is a good sign that their security is up to date thanks to their auditor(s).

    The next factor to consider is the auditor’s expertise in certain blockchains. As of now, most auditors offer only Ethereum contract audits. Only some are specialized in auditing projects on altchains such as BNB, Solana or Polygon. This is because EVM-compatible chains have different architectures, and certain altchains use a completely different programming language, e.g. Rust for Solana. Different firms have different areas of expertise in auditing protocols built on different blockchains, so it is best to assess their level of competency before engaging them for an audit. For example, if you are looking for a Polygon-based contract audit, check the firm’s past audits for Polygon-based projects.

    Finally, it goes without saying but the quality of audit reports is an important consideration to look for in a reliable auditor. Different auditing firms have their own methodology and approach. In many instances, the scope of an audit varies according to the scale and complexity of the project as well as the auditor’s agreement with their clients. It is important to note that a good report should include a comprehensive description of all the problems that were found during the test and inspection, and the findings of the audit have been addressed by the project.

    Hacken

    Website: https://hacken.io/

    Projects Audited: 700+

    Major Clients: FTX, Avalanche, VeChain, Huobi, Kyber, Air Asia

    Chains Supported: Ethereum, EVM Chains, BNB Chain, Solana, Polygon, Avalanche, NEAR, Fantom

    Hacken is a leading cybersecurity consulting company focused on blockchain security. Since its inception in 2017, Hacken has been educating and growing the ethical white hat hacker community to continually nurture and build the blockchain security ecosystem. Who better to identify and address cybersecurity threats than a hacker? (https://www.kambioeyewear.com/)

    Hacken provides a wide range of security services including blockchain security consulting, web/mobile penetration testing, vulnerability assessments, coordination of bug bounty programs and more. The company also encompasses security products such as HackenAI Security Platform, hVPN, and hPass etc. Beyond just blockchain security ecosystem, Hacken has also partnered with non-blockchain giants like Air Asia.

    Over the years, Hacken has built a commendable reputation as a security risk assessment for companies requiring a digital environment to create or enable services for their consumers, which is why Hacken is certified as Web 3.0 security standard by two of the world’s largest cryptocurrency data aggregator Coingecko and Coinmarketcap.

    Quantstamp

    Website: https://quantstamp.com/

    Projects Audited: 200+

    Major Clients: Ethereum 2.0, Solana, BNB Chain, Cardano, Maker, Curve, OpenSea

    Chains Supported: All chains

    Quantstamp is a security validation protocol for smart contracts and is one of the most recognized auditing companies in the blockchain sector. Their security team consists of PhDs and security professionals with experience in top IT companies such as Google, Facebook, Apple, and Ethereum Foundation.

    Quantstamp specializes in auditing services of all programming languages designed for use in blockchain applications. Since its launch in 2017, Quantstamp has audited over 200 projects and helped secure over $200 billion in value. Its services include auditing layer-1 blockchains, smart contract-powered NFT and DeFi protocols, and developing financial frameworks for layer-1 blockchain ecosystems.

    Trail of Bits

    Website: https://www.trailofbits.com/

    Projects Audited: 500+

    Major Clients: 0x Protocol, Compound, MakerDAO, Acala, Balancer, yearn.finance

    Chains Supported: Ethereum, Polkadot, Polygon, Tezos, Arbitrum

    Trail of Bits is a cybersecurity industry giant with a long list of big-name clients such as Microsoft, Adobe, Reddit, Zoom, Airbnb, and Reddit etc. Founded in 2012, before smart contracts were even invented, the company prides itself as a network of developers with the capabilities of identifying and fixing loopholes in software, devices, and code. They have long developed tools that help developers find and fix critical vulnerabilities. Manticore is one of their signature tools, a multi-contract and multi-transaction emulator. Other tools include Cryptic, Slither and Echidna which are also blockchain-focused solutions.

    ConsenSys Diligence

    Website: https://consensys.net/

    Projects Audited: 100+

    Major Clients: 0x Exchange, Aave, Balancer, Uniswap

    Chains Supported: Ethereum

    Consenys is a US-based blockchain technology solutions company and is one of the biggest and prominent blockchain incubators in the industry. Unlike other security firms mentioned on this list, ConsenSys dedicates its resources and technological expertise solely to the development of Ethereum blockchain applications and software, especially financial infrastructures.

    Its signature product, MythX, is one of the most powerful automated scanners for Ethereum smart contracts, providing a solid API which developers can use to access security analytics tools. Over the years, ConsenSys has successfully protected over 100 Ethereum-based projects and uncovered over 200 issues. Apart from security auditing, the company also provides two other services known as Fuzzing, a bug-finding tool for first specifications, and Scribble, a runtime verification tool that translates high-level specifications into Solidity code.

    CertiK

    Website: https://www.certik.com/

    Projects Audited: 1800+

    Major Clients: BNB Chain, Polygon, The Sandbox

    Chains Supported: All chains

    CertiK is a blockchain security company specialized in formal verification and AI technology in collaboration with some of the world’s best cybersecurity experts to create end-to-end audit services. The company has developed “CertiK Chain”, a public blockchain focused on mathematically validating the safety of smart contracts through formal and manual verification. Other services of CertiK include Skynet, Skytrace and Penetration Testing.

    CertiK is an official partner company of Binance, and is also backed by numerous big-name firms such as Golden Sachs, Coinbase, Lightspeed, Matrix Partners, and DHVC.

    LeastAuthority

    Website: https://leastauthority.com/

    Projects Audited: 80+

    Major Clients: Ethereum Foundation, Chia Network, O(1) Labs, Protocol Labs, cLabs, Tezos Foundation

    Chains Supported: Ethereum, Chia Network, Tezos

    LeastAuthority is a cybersecurity consulting firm with its main focus on privacy. Using privacy-enhancing technologies, it classifies itself as an enabler of private and disruptive storage solutions. The platform offers two major products which are essentially storage architectures. The first, Privatestorage (formerly S4), is a centralized system that provides storage infrastructure to end-users and offers them the autonomy over the collection, processing and distribution of their private data. The second product, Tahoe LAFS, enables a decentralized, distributed and fault-tolerant storage facility.

    Apart from security audits, other services also include penetration testing, network and traffic analysis, and mechanism and incentive design. The company’s consultants work with developers throughout their development cycles to ensure that their projects are not susceptible to security threats.

    ChainSecurity

    Website: https://chainsecurity.com/

    Projects Audited: 85+

    Major Clients: yearn.finance, Maker, Compound, Curve, Rarible, Kyber Network

    Chains Supported: Ethereum

    ChainSecurity is a blockchain security firm led by security experts from the renowned university ETH Zurich. Similar to ConsenSys, the company specializes in Ethereum contract auditing. They have developed an automated audit platform that allows projects to thoroughly analyze smart contract designs, test their viability, and monitor metrics detailing their performances after launch. The company has worked with more than 85 Ethereum-based projects and helped secure more than $17 billion worth of assets.

    OpenZeppelin

    Website: https://openzeppelin.com/

    Projects Audited: 150+

    Major Clients: Ethereum Foundation, Coinbase, Compound, Aave, The Graph

    Chains Supported: Ethereum

    OpenZeppelin is a cybersecurity technology and services company known for its development of Solidity libraries known as “OpenZeppelin Contracts.” These libraries are used in most Solidity projects as a tested and standard template for contracts deployable on DApps. Developers can easily integrate these solutions into their applications through OpenZeppelin’s native SDK.

    OpenZeppelin was the first cybersecurity company to reinvent blockchain security by introducing elements of gamification to identify security vulnerabilities in smart contracts. “Ethernaut” is a web3/Solidity war game which challenges gamers to find and exploit loopholes in smart contracts to progress to the next level. The company also provides free services such as “Defender”, which helps clients automate their smart contract administration, offering a more secure and private transaction infrastructure.

    SlowMist

    Website: https://www.slowmist.com/en/

    Projects Audited: 1000+

    Major Clients: Binance, OKX, Huobi, Pancakeswap, Crypto.com

    Chains Supported: Ethereum, EVM Chains, EOS, Fabric, Solana, VeChain, ONT

    SlowMist is China’s leading blockchain security company founded in 2018. The team at SlowMust has over 10 years of experience in network security, specializing in smart contract audits, blockchain security, wallet security testing, and more. The company constantly tracks and publishes data about security situation on crypto exchanges through their Blockchain Threat Intelligence (BTI) service. Their most notable product MistTrack is a system that tracks the movement of stolen funds. Since its launch, it has helped recover nearly $1 billion in stolen funds.

    The company also offers security-related products such as anti-money laundering software, DarkHandBook (crypto safeguarding handbook), SlowMist Hacked (crypto hack archives), and FireWall.X (firewall for EOS smart contracts).

    Runtime Verification

    Website: https://runtimeverification.com/

    Projects Audited: 100+

    Major Clients: Algorand, Polkadot, Tezos Foundation, Ethereum Community Fund, NASA

    Chains Supported: All Chains

    Runtime Verification is a research and development company focused on verification-based techniques to perform security audits on virtual machines and smart contracts on public blockchains. The platform is a dynamic software analysis approach that analyzes programs as they execute, observing the results of the execution and using those results to find bugs. This solution designs standard models for high-value applications and uses them as templates to develop security-sensitive products.

    Runtime Verification has developed two main smart contract security products. The first, K Semantic Framework, offers smart contract correctness proofs to validate the viability of Ethereum and Cardano’s smart contracts. The second, Firefly, is a test coverage analysis tool for Ethereum smart contracts. The company has also worked with Ethereum Foundation on building a formal framework for Ethereum 2.0 testing.

  • Ethereum Merge is Coming, Is This the End of Ethereum Killers?

    Ethereum Merge is Coming, Is This the End of Ethereum Killers?

    The Ethereum network is said to be the fastest and most scalable blockchain after the Merge in September, effectively cementing its position as the front-runner of smart-contract networks. What will this mean for other popular competing layer-1 blockchains known as “Ethereum Killers?” If you are holding any of these coins, you might want to consider its future prospects.

    The Ethereum Merge in September

    Ethereum founder Vitalik Buterin addressed at the Ethereum Community Conference in Paris that the Ethereum network will hit the 55% roadmap completion level after its much-anticipated “Merge” in September. The Merge will mark the beginning of Ethereum’s proof-of-stake upgrade, potentially enabling the network to process 100,000 transactions per second (tps), according to Buterin, which is significantly higher than even centralized financial services like Visa and Mastercard.

    For the longest time, the biggest problem that has been plaguing Ethereum is scalability. In its current state, Ethereum can only process 12 to 25 tps with an average confirmation time of around six minutes. As a result, the network gets congested, leading to extremely high gas fees. To address that problem, the Merge involves many protocol changes that would allow users to enjoy fast transactions and low gas fees. Buterin has even given each of these planned upgrades rhyming names which he calls the “merge”, “surge”, “verge” and “purge.

    • Merge
      • Refers to combining the Ethereum mainnet with the proof-of-stake beacon chain, also known as EIP-3675.
    • Surge
      • Refers to the addition of Ethereum sharding, a scaling solution which will further enable cheap layer-2 blockchains and lower the cost of rollups or bundled transactions, making it easier for users to operate nodes that secure the Ethereum network. This reduces congestion on the main chain by distributing traffic to 64 shard chains.
    • Verge
      • Refers to the implementaion of “Verkle trees” (a kind of mathematical proof) and “stateless clients”, aimed at making the network more decentralized. These features will allow users to become network validators without having to store large amounts of data on their nodes.
    • Purge
      • Refers to the removal of historical data in a bid to streamline the network, also known as EIP-4444, a proposal focused on storing said historical data in execution clients such as The Graph, BitTorrent and block explorers, since relying to store everything on existing nodes can hamper scalability.

    What are “Ethereum Killer” Blockchains?

    “Ethereum Killers” refer to Ethereum’s competing layer-1 blockchains, namely Solana, Avalanche, Polkadot, Algorand, and Cardano. They inherited the killer name because they offer similar features to Ethereum but at significantly lower costs and faster speed.

    Ethereum Killer coins have been a very popular asset to investors looking for an alternative network to Ethereum. Smart-contract platforms have been dominating the market cap in the crypto space. According to Coingecko, it is the second highest crypto category by market cap, just behind the Ethereum ecosystem.

    What will happen to “Ethereum Killers” after Merge in September?

    If Buterin is able to deliver what he promised, then Ethereum will most certainly be the front-runner of smart-contract networks. People will look to Ethereum to being the primary platform for DApp development, DeFi activities, NFT minting and marketplace and more.

    Although Ethereum Killer coins have been pumping recently due to bullish sentiment surrounding Ethereum and its long-awaited Merge, communities are speculating whether this is just hype as competing blockchains of Ethereum will no longer have competitive advantage in terms of speed and scalability. Even until now, none of them have been able to dethrone Ethereum from its number two spot by market cap. The upcoming merge will only propel Ethereum upward, but that is if Buterin delivers what he promised. He stated that they will soon test the merge on Ropsten (Ethereum’s testnet).

    The largest future problem for Ethereum will most likely remain to be scalability. Although the new system will be faster, it is unlikely to solve the issue of high gas fees immediately since network demand is likely to rise as efficiency increases. But that is not to say that gas fees will forever be expensive on the Ethereum blockchain. But until Ethereum is able to achieve high scalability, Ethereum Killer blockchains remain to be viable alternatives for fast transactions and low gas fees. We will just have to wait and see in September.

  • Top Cryptocurrency News Today (22 July 2022)

    Top Cryptocurrency News Today (22 July 2022)

    Ethereum Massively Scales to 100K Transactions Per Second Post-Merge, What Will Happen to “ETH Killers?”

    Ethereum founder Vitalik Buterin addressed at the Ethereum Community Conference in Paris that the network will hit the 55% roadmap completion level after its much-anticipated “Merge” in September. The biggest problem that has been plaguing Ethereum is scalability. In its current state, Ethereum can only process 12 to 25 transactions per second with an average confirmation time of around six minutes. As a result, the network gets congested, leading to extremely high gas fees.

    The shift from proof-of-work to proof-of-stake post-merge will enable Ethereum to process 100,000 transactions per second, according to Buterin, which is significantly higher than even centralized financial services like Visa and Mastercard. This will greatly benefit the ecosystem as users can enjoy instant transactions and low gas fees. So the question is, “What will happen to Ethereum Killer coins such as Solana or Avalanche?” If Buterin is able to deliver what he promised, then Ethereum will most certainly be the front-runner of all smart-contract platforms. The whole purpose of Ethereum Killers is to have a competitive advantage over Ethereum in terms of scalability. Will we see the end of Ethereum Killers after September?

    Zipmex Suspends Withdrawals, Joins Growing List of Struggling Crypto Exchanges

    Zipmex, a cryptocurrency exchange based in Southeast Asia, has frozen withdrawals until further notice due to “volatile market conditions” and the “resulting financial difficulties of key business partners.” Much like the rest of the crypto fallout, the insolvency of Zipmex’s counterparty has caused the company to face liquidity issues. According to their official statement, Zipmex’s current exposure to crypto lender Babel Finance is $48 million, with an additional $5 million to Celsius Network, which filed for bankruptcy last week.

    With the series of defaults continuing to haunt the industry, investors should be cautious when dealing with any crypto exchange at the moment. Consider holding your funds in hardware wallets like Ledger Nano X, Ledger Nano S or Trezor Model T.

    Coinbase Urges SEC to Begin Regulating Digital Asset Securities after Inside Trading Bust, Desperate Move?

    Coinbase has called on the Securities and Exchange Commission (SEC) to develop a viable regulatory framework for digital asset securities following the arrest of a Coinbase ex-manager involved in inside-trading earlier today. With rumours of Coinbase’s insolvency growing, communities are speculating whether this initiative is an attempt to revive the crypto exchange. Coinbase has yet to comment on that matter but explained that the existing rules for traditional securities being inapplicable to crypto assets calls for new rulemaking. However, they also added that the procedure should involve the public’s input rather than behind closed doors. Will we be seeing Coinbase making a comeback or are they just delaying the inevitable?

    Binance Unveils Scholarship Program! Future of Crypto Looking Good?

    Binance is sponsoring a scholarship program that focuses on improving education that will empower the next generation of blockchain experts. Scholarships will be available for vocational education (currently for 1,000 Ukrainian students), for undergraduate studies and for master’s degrees, providing opportunities for scholars to acquire experience in the blockchain ecosystem.

    This is a huge step forward as education in blockchain and cryptocurrency is still limited and inaccessible to most people, not to mention a growing pandemic of student loan debts worldwide. Fostering an environment for new talent means faster development in the space, especially when the future of crypto is at stake.