© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Industry News / Blockchain Vulnerabilities Have Cost More Than A Billion

Blockchain Vulnerabilities Have Cost More Than A Billion

  • Author
    Nok Nok News
  • Published
    4 Oct 2022
  • 0 comments
    Join Conversation
Industry News

2022 has been a tough year for crypto investors as blockchain platforms have been targeted by cyber attackers left and right. A total of $1.4 billion has been lost due to these attacks. Ronin, a bridge that supports Axie Infinity, has lost $615 million; Wormhole, a bridge backed by Jump Trading, lost $320 million; Horizon, a bridge by Harmony, lost $100 million; and around $200 million was stolen from Nomad.

How Were Blockchain Networks Hacked?

Cyberattackers exploit vulnerabilities in blockchain technology, specifically blockchain bridges and humans. Blockchain bridges are a type of software through which people send out tokens from one blockchain network to another. Bridges, being the piece of code that enables smart contracts to execute without human intervention, typically hold large values being transferred from one network to another. Without adequate security, these bridges are easy targets.

Although transactions must first be approved by validators to become successful, hackers are able to manipulate validators into handing over their private keys or compromise only a few accounts to withdraw funds. Bridges are central to blockchain technology, which is why their increased vulnerability is a major cause for concern.

Another way hackers steal funds is through human vulnerability. Some rely on social engineering tricks to convince a victim to send funds to them. Another method is by simply stealing cryptographic keys or private digital signatures, the access for which they gain  through apps, wallets, and other third-party vendors that authenticate users to their digital services via legacy authentication. In other words, password-based authentication.

Eliminating The Human Risk Factor With Passwordless Authentication

Cryptocurrencies are continuously expanding, and blockchain technology grows with it. Despite the advanced technology with which blockchain technologies operate, cybercriminals are still able to find ways in through something as basic as a password login.

Passwords have long been a favorite vulnerability of cyber attackers. Both methods used by cyberattackers of blockchain networks succeeded through compromised phishing and man-in-the-middle attacks resulting in stolen passwords. With the increased interconnectedness of systems nowadays, even a technology as sophisticated and secure as decentralized blockchain requires strong, passwordless authentication,  because of its distributed access.

Unphishable, key-based passwordless authentication is one way to elevate the security for blockchain networks across all platforms, especially third party applications. Nok Nok Inc, along with the global industry group (FIDO Alliance) they founded are on a mission to reduce people’s reliance on extremely vulnerable legacy password and knowledge-based system access.

Passwordless authentication is a possession-based and biometric authentication technique that relies on public-private cryptography. It generates a public-private key pair—the public key is shared with a service while the private key remains safe in the user’s device, protected by a PIN or biometrics. This system is incredibly convenient for end-users, as well as safe.

You can strengthen your cybersecurity with Nok Nok’s passwordless authentication system. To learn more about Nok Nok Inc’s industry-leading FIDO platform, contact us here.

Nok Nok News

Related Posts

The US Government Now Wants Phishing Resistant MFA
Industry News

The US Government Now Wants Phishing Resistant MFA

The Government Is Now Turning To The Private Sector For Better Cybersecurity
Industry News

The Government Is Now Turning To The Private Sector For Better Cybersecurity

The US Government Is Ramping Up Cybersecurity Precautions
Industry News

The US Government Is Ramping Up Cybersecurity Precautions

Intuit Announce New Advances In Digital Financial Management
Industry News

Intuit Announce New Advances In Digital Financial Management

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語