Home The Assault From The Man-in-the-Middle

The Assault From The Man-in-the-Middle

Share
Share

The Assault From The Man-in-the-Middle

By Sandeep Kasalkar

In a photograph, the man in the middle might always be important, but in this case, it is not just that, it is dangerous, too! A Man-in-the-middle (MITM) refers to a flaw in the popular Ledger hardware crypto wallet programme that researchers discovered way back in 2018. This flaw allowed hackers to change the destination address of bitcoin transactions and divert the victims’ cash to their own wallets. Users who thought hardware wallets like Ledger were the most secure way to hold their digital assets were disappointed by this revelation. 

But as the most recent revelation showed, any system that depends on key-agreement protocols and the storing and exchange of secrets is susceptible to man-in-the-middle assaults in some form. The best defence against MITM attacks is to utilise authentication mechanisms that do not require secrets.

How are MITM attacks conducted?

Cryptocurrencies like bitcoin use the blockchain, a distributed ledger of transactions, to transmit and hold funds. Every bitcoin transaction is delivered to a blockchain address that is secured by a set of encryption keys. Any party can send money to an address using a public key that is accessible to everyone, and the address owner can transfer money to other parties using a secret private key.

A malicious actor penetrates two parties’ communication and steals or tampers with the information they communicate in an MITM attack. In the case of the Ledger wallet, malware deployed on the target computer modifies bitcoin transaction destination addresses to include the attacker’s wallet address instead. Users must manually match the address presented on their computer with the one that displays on the Ledger’s display in order to detect and halt the attack.

Passwords, encryption keys, code signing keys, and other sensitive information that we use to identify and authenticate ourselves online have all been stolen by hackers using MITM attacks. Because they give hackers the ability to pass as authorised individuals and carry out extremely harmful deeds like inserting malware into the web pages, data, and programmes that we access and exchange online, MITM attacks are particularly risky. 

Role of multi-channel tech to prevent MITM attacks

Man-in-the-middle attackers are aware that we depend on secrets to protect the authenticity of our identities and the confidentiality of our conversations. They will be able to act maliciously on our behalf if they are able to mimic us and obtain access to those secrets.

Hackers would have a more difficult time setting up man-in-the-middle attacks if there were a means to verify yourself, interact, and share information without having to divulge secrets.

Different parties can validate each other’s identities using different platforms which are available in the Market. zero-knowledge authentication without exchanging keys or disclosing sensitive information. Passwords and keys are not stored in the platforms or their apps. Hackers are unable to execute man in the middle attacks without one single point of failure.

Platforms use a multichannel secret sharing technique that authenticates users piecemeal over many channels, such as SSL, Push notification, and encrypted mobile memory, to further protect sensitive processes. This makes it impossible for potential attackers to impersonate the user because they would need to separately compromise each channel.

Many Platforms offer a user-friendly layout that is simple to navigate. The highest level of authentication assurance is maintained without requiring users to recall passwords or go through laborious steps in order to authenticate and authorise operations.

Share

Latest News

$3 Trillion Stablecoin Market Could Lower Interest Rates | 3.0 TV

$3 Trillion Stablecoin Market Could Lower Interest Rates

“As stablecoins climb, rates may fall — a trillion-dollar shakeup is calling all!” Stephen Miran, the governor of the Fed, cautions that...

Zcash ($ZEC) Reaches $600 Mark as Privacy Coin Rally Gains Momentum

Zcash ($ZEC) Reaches $600 Mark as Privacy Coin Rally Gains Momentum

Will Zcash (ZEC) headline the next privacy coin boom? As Zcash rises above $630 and hits its highest price since 2018, it...

Ripple’s XRP Gains ETF Boost: Bitwise, 21Shares and Franklin Templeton Listed on DTCC

Ripple’s XRP Gains ETF Boost: Bitwise, 21Shares and Franklin Templeton Listed on DTCC

Is the Wall Street launch of Ripple’s XRP coming soon? Major firms including Bitwise, 21Shares, Franklin Templeton, CoinShares, and Canary Capital, have...

Stablecoins Revolutionizing Currency, Says Finance Minister Nirmala Sitharaman

“Money evolves, the future calls, Stablecoins rise, breaking old walls.” How are innovations such as stablecoins changing the world financial scene, according...

Latest Blogs

Crypto Security & Best Practices: How To Keep Your Crypto Safe: Everything You Should Know

Crypto Security and Its Importance Digital transformation has created financial opportunities through cryptocurrencies, yet these digital assets present significant security risks to...

AI + Crypto Agents — The Next Multi-Trillion Market?

Artificial Intelligence and crypto are converging, and the world isn’t ready for what’s to come next. Twitter, YouTube, and virtually everyone on...

Crypto SIPs: A Guide to Crypto Investment

What is a Crypto SIP? Systematic Investment Plans (SIPs) in Cryptocurrency The investment environment with its extreme volatility has led to changes...

What is a Crypto Airdrop?

What Does Airdrop in Crypto Mean? Definition and Purpose of Crypto Airdrops Within the quickly changing cryptocurrency arena, novel approaches have surfaced,...

Related Articles

Crypto Security & Best Practices: How To Keep Your Crypto Safe: Everything You Should Know

Crypto Security and Its Importance Digital transformation has created financial opportunities through...

AI + Crypto Agents — The Next Multi-Trillion Market?

Artificial Intelligence and crypto are converging, and the world isn’t ready for...

Crypto SIPs: A Guide to Crypto Investment

What is a Crypto SIP? Systematic Investment Plans (SIPs) in Cryptocurrency The...

What is a Crypto Airdrop?

What Does Airdrop in Crypto Mean? Definition and Purpose of Crypto Airdrops...