X
  • About
  • Advertise
  • Contact
  • Events
Subscribe to our Newsletter
  • News
    • Markets
    • Regulation
    • Super
    • M&A
    • Tech
    • Appointments
  • Podcast
  • Webcasts
  • Video
  • Analysis
  • Promoted Content
No Results
View All Results
  • News
    • Markets
    • Regulation
    • Super
    • M&A
    • Tech
    • Appointments
  • Podcast
  • Webcasts
  • Video
  • Analysis
  • Promoted Content
No Results
View All Results
No Results
View All Results
Home Analysis

Blockchain: The requirement for privilege controls in a distributed ledger

Blockchain technology has been heralded as the answer to many problems. There have been endless conversations about how it will grow to become a favoured method for how we conduct, secure, verify and record online transactions without a middle man – as we have already seen with the handling of bitcoin and other cryptocurrencies.

by Andrew Slavkovic
February 12, 2019
in Analysis
Reading Time: 3 mins read
Share on FacebookShare on Twitter

Recent research revealed that the size of the global blockchain technology market will reach US$7.59 billion by 2024 – that’s a 37.2 per cent compound annual growth rate during the forecast period. 

While countries like Estonia that are leading the way with an increasing number of government services opting to use blockchain to carry out transactions, the technology remains in comparative infancy in Australia.

X

Perhaps, the uncertainty around how to best secure blockchain explains why the Australian government’s Digital Transformation Agency recently declared that, while it finds the technology interesting, it has not yet identified how blockchain can deliver better value for government services. 

The benefits of blockchain have been publicly lauded. However, like any technology, it has its downfalls. 

The ubiquity of blockchain and cryptocurrencies has cultivated a new breed of malware known as crypto miner, which takes over a computer’s resources and uses compute power for illicit cryptocurrency mining. The server, application and ledger processes can be attacked, and cybercriminals can tamper with the blockchain. Successful exploits can result in identity theft, where attackers are able to impersonate an authenticated user to access sensitive data. 

Cryptocurrency exchange firm Coincheck revealed that it had fallen victim to a crypto miner attack earlier this year. The Japan-based company estimated it lost more than US$500 million worth of bitcoin. 

The Coincheck attack was widely reported because of its scale, but other cases have flown under the radar. Trend Micro reported that between January and July 2018, crypto mining attacks increased by nearly 1,000 per cent compared to the second half of 2017.

In most of these cases, cybercriminals have been rushing to exploit a new cryptocurrency, called Monero: an open source, peer-to-peer cryptocurrency known for its anonymous and decentralised features. It’s not the anonymity of Monero (A.K.A. “privacy coin”) that has attracted cybercriminals. The interest lies in the proof-of-work algorithm – CryptoNight – that secures its blockchain system, validates new transactions and propagates them through networks. 

With the rise in crypto mining, malware monetisation techniques such as ransomware have fallen by the wayside. The ability to easily convert electricity and access to computer hardware into money – in most cases without the user even realising – has become increasingly attractive for hackers worldwide. 

Now, it’s worth emphasising that blockchain itself is safe. The weakness of blockchain lies with the endpoints – where the technology interacts with unsafe, or less safe, environments. These environments often rely on standard IT infrastructure that use servers and databases, where better known IT risks are inherent. 

To stay protected against these vulnerabilities, companies need to rethink how they lock down their endpoints. Firewalls and antivirus software no longer suffice. Businesses need to authenticate and record individual access into the blockchain environment to avoid fraudulent activity, and secure against privileged attacks that can compromise or tamper with the ledger. 

By having better control and more effective oversight over the entire IT environment – including IT administration, privileges and monitoring – businesses will have a greater understanding of both legitimate and suspicious activity. 

Endpoint behavioural analytics is an emerging technology that allows businesses to analyse and identify unusual activity. This kind of analysis can help mitigate security risk, as businesses will be able to proactively lock down accounts with suspicious activity. 

Keeping endpoints flexible for the end-user without compromising security can be a fine balance. Containments and certain security policies can be added so that an application can still run if it’s accessed by a trusted user, but cannot be accessed by an attacker when suspicious activity is detected. 

Blockchain can offer great potential. But before businesses get caught up in taking advantage of its features, they need to ensure the endpoints the technology interacts with are secured to avoid any possible attacks.

Andrew Slavkovic, solutions engineering manager ANZ, CyberArk

Related Posts

Markets look to end the year with momentum

by Patrick Nicoll
December 8, 2025

After a year dominated by political noise, inflation surprises and shifting central bank signals, global markets are closing out 2025...

From artificial to sustainable intelligence: The global energy challenge

by Velika Talyarkhan
December 1, 2025

The promise of AI can only be realised if the world learns to expand this technology without exceeding the limits...

Why dividend growth investing has staying power

by Tom Huber
December 1, 2025

Popular US large‑cap core and growth indexes have become more top heavy and skewed toward high‑growth stocks. So have the...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

VIEW ALL
Promoted Content

Why U.S. middle market private credit is a powerful income solution for Australian institutional investors

In today’s investment landscape, middle market direct lending, a key segment of private credit, has emerged as an attractive option...

by Tim Warrick
December 2, 2025
Promoted Content

Is Your SMSF Missing Out on the Crypto Boom?

Digital assets are the fastest-growing investment in SMSFs. Swyftx's expert team helps you securely and compliantly add crypto to your...

by Swyftx
December 2, 2025
Promoted Content

Global dividends reach US$519 billion, what’s behind the rise?

Global dividends surged to a record US$518.7 billion in Q3 2025, up 6.2% year-on-year, with financials leading the way. The...

by Capital Group
November 18, 2025
Promoted Content

Why smaller can be smarter in private credit

Over the past 15 years, middle market direct lending has grown into one of the most dynamic areas of alternative...

by Tim Warrick, Managing Director of Principal Alternative Credit, Principal Asset Management
November 14, 2025

Join our newsletter

View our privacy policy, collection notice and terms and conditions to understand how we use your personal information.

Latest Podcast

Podcast

Relative Return Insider: RBA holds, Fed cuts and Santa’s set to rally

by Staff Writer
December 11, 2025
After more than two decades, InvestorDaily continues to be an institution that connects and influences Australia’s financial services sector. This influential and integrated media brand connects with leading financial services professionals within superannuation, funds management, financial planning and intermediary distribution through a range of channels, including digital, social, research, broadcast, webcast and events.

Subscribe to our newsletter

View our privacy policy, collection notice and terms and conditions to understand how we use your personal information.

About Us

  • About
  • Advertise
  • Contact
  • Terms & Conditions
  • Privacy Collection Notice
  • Privacy Policy

Popular Topics

  • Markets
  • Appointments
  • Regulation
  • Super
  • Mergers & Acquisitions
  • Tech
  • Promoted Content
  • Analysis

© 2025 All Rights Reserved. All content published on this site is the property of Prime Creative Media. Unauthorised reproduction is prohibited

No Results
View All Results
NEWSLETTER
  • News
  • Markets
  • Regulation
  • Super
  • M&A
  • Tech
  • Appointments
  • Podcast
  • Webcasts
  • Promoted Content
  • Events
  • About
  • Advertise
  • Contact Us

© 2025 All Rights Reserved. All content published on this site is the property of Prime Creative Media. Unauthorised reproduction is prohibited