X
  • About
  • Advertise
  • Contact
  • Events
Subscribe to our Newsletter
  • News
    • Markets
    • Regulation
    • Super
    • M&A
    • Tech
    • Appointments
  • Podcast
  • Webcasts
  • Video
  • Analysis
  • Promoted Content
No Results
View All Results
  • News
    • Markets
    • Regulation
    • Super
    • M&A
    • Tech
    • Appointments
  • Podcast
  • Webcasts
  • Video
  • Analysis
  • Promoted Content
No Results
View All Results
No Results
View All Results
Home Analysis

Blockchain: The requirement for privilege controls in a distributed ledger

Blockchain technology has been heralded as the answer to many problems. There have been endless conversations about how it will grow to become a favoured method for how we conduct, secure, verify and record online transactions without a middle man – as we have already seen with the handling of bitcoin and other cryptocurrencies.

by Andrew Slavkovic
February 12, 2019
in Analysis
Reading Time: 3 mins read
Share on FacebookShare on Twitter

Recent research revealed that the size of the global blockchain technology market will reach US$7.59 billion by 2024 – that’s a 37.2 per cent compound annual growth rate during the forecast period. 

While countries like Estonia that are leading the way with an increasing number of government services opting to use blockchain to carry out transactions, the technology remains in comparative infancy in Australia.

X

Perhaps, the uncertainty around how to best secure blockchain explains why the Australian government’s Digital Transformation Agency recently declared that, while it finds the technology interesting, it has not yet identified how blockchain can deliver better value for government services. 

The benefits of blockchain have been publicly lauded. However, like any technology, it has its downfalls. 

The ubiquity of blockchain and cryptocurrencies has cultivated a new breed of malware known as crypto miner, which takes over a computer’s resources and uses compute power for illicit cryptocurrency mining. The server, application and ledger processes can be attacked, and cybercriminals can tamper with the blockchain. Successful exploits can result in identity theft, where attackers are able to impersonate an authenticated user to access sensitive data. 

Cryptocurrency exchange firm Coincheck revealed that it had fallen victim to a crypto miner attack earlier this year. The Japan-based company estimated it lost more than US$500 million worth of bitcoin. 

The Coincheck attack was widely reported because of its scale, but other cases have flown under the radar. Trend Micro reported that between January and July 2018, crypto mining attacks increased by nearly 1,000 per cent compared to the second half of 2017.

In most of these cases, cybercriminals have been rushing to exploit a new cryptocurrency, called Monero: an open source, peer-to-peer cryptocurrency known for its anonymous and decentralised features. It’s not the anonymity of Monero (A.K.A. “privacy coin”) that has attracted cybercriminals. The interest lies in the proof-of-work algorithm – CryptoNight – that secures its blockchain system, validates new transactions and propagates them through networks. 

With the rise in crypto mining, malware monetisation techniques such as ransomware have fallen by the wayside. The ability to easily convert electricity and access to computer hardware into money – in most cases without the user even realising – has become increasingly attractive for hackers worldwide. 

Now, it’s worth emphasising that blockchain itself is safe. The weakness of blockchain lies with the endpoints – where the technology interacts with unsafe, or less safe, environments. These environments often rely on standard IT infrastructure that use servers and databases, where better known IT risks are inherent. 

To stay protected against these vulnerabilities, companies need to rethink how they lock down their endpoints. Firewalls and antivirus software no longer suffice. Businesses need to authenticate and record individual access into the blockchain environment to avoid fraudulent activity, and secure against privileged attacks that can compromise or tamper with the ledger. 

By having better control and more effective oversight over the entire IT environment – including IT administration, privileges and monitoring – businesses will have a greater understanding of both legitimate and suspicious activity. 

Endpoint behavioural analytics is an emerging technology that allows businesses to analyse and identify unusual activity. This kind of analysis can help mitigate security risk, as businesses will be able to proactively lock down accounts with suspicious activity. 

Keeping endpoints flexible for the end-user without compromising security can be a fine balance. Containments and certain security policies can be added so that an application can still run if it’s accessed by a trusted user, but cannot be accessed by an attacker when suspicious activity is detected. 

Blockchain can offer great potential. But before businesses get caught up in taking advantage of its features, they need to ensure the endpoints the technology interacts with are secured to avoid any possible attacks.

Andrew Slavkovic, solutions engineering manager ANZ, CyberArk

Related Posts

The Role Reversal: Emerging Risks in the World’s Mature Economies

by Stefan Magnusson, Emerging Markets Portfolio Manager, Orbis
November 17, 2025

Stefan Magnusson discusses why investors – especially in Australia – may wish to rethink emerging market risk and seize overlooked...

Shifting Australian equity market leadership presents opportunities

by Cameron Gleeson, Betashares Senior Investment Strategist
November 14, 2025

After years of large caps driving the domestic sharemarket, leadership is shifting to the mid and small cap segment.

How does free float impact stock returns?

by Abhishek Gupta
November 11, 2025

Free float — the number of company shares outstanding — is a quiet but powerful lever in equity markets. The...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

VIEW ALL
Promoted Content

Global dividends hit a Q3 record, led by financials.

Global dividends surged to a record US$518.7 billion in Q3 2025, up 6.2% year-on-year, with financials leading the way. The...

by Capital Group
November 18, 2025
Promoted Content

Why smaller can be smarter in private credit

Over the past 15 years, middle market direct lending has grown into one of the most dynamic areas of alternative...

by Tim Warrick, Managing Director of Principal Alternative Credit, Principal Asset Management
November 14, 2025
Promoted Content

Members Want Super Funds to Step Up Security

For most Australians, superannuation is their largest financial asset outside the family home. So, when it comes to digital security,...

by MUFG Pension & Market Services
October 3, 2025
Promoted Content

Boring Can Be Brilliant: Why Steady Investing Builds Lasting Wealth

In financial markets, drama makes headlines. Share prices surge, tumble, and rebound — creating the stories that capture attention. But...

by Zagga
October 2, 2025

Join our newsletter

View our privacy policy, collection notice and terms and conditions to understand how we use your personal information.

Latest Podcast

Podcast

Relative Return Insider: Economic shifts, political crossroads, and the digital future

by InvestorDaily team
November 13, 2025
After more than two decades, InvestorDaily continues to be an institution that connects and influences Australia’s financial services sector. This influential and integrated media brand connects with leading financial services professionals within superannuation, funds management, financial planning and intermediary distribution through a range of channels, including digital, social, research, broadcast, webcast and events.

Subscribe to our newsletter

View our privacy policy, collection notice and terms and conditions to understand how we use your personal information.

About Us

  • About
  • Advertise
  • Contact
  • Terms & Conditions
  • Privacy Collection Notice
  • Privacy Policy

Popular Topics

  • Markets
  • Appointments
  • Regulation
  • Super
  • Mergers & Acquisitions
  • Tech
  • Promoted Content
  • Analysis

© 2025 All Rights Reserved. All content published on this site is the property of Prime Creative Media. Unauthorised reproduction is prohibited

No Results
View All Results
NEWSLETTER
  • News
  • Markets
  • Regulation
  • Super
  • M&A
  • Tech
  • Appointments
  • Podcast
  • Webcasts
  • Promoted Content
  • Events
  • About
  • Advertise
  • Contact Us

© 2025 All Rights Reserved. All content published on this site is the property of Prime Creative Media. Unauthorised reproduction is prohibited