Lost or stolen crypto?
Contact our Investigations team
May 18, 2022

Day

Crypto Attacks
Table of ContentsCyber-Attack Strategies in the Blockchain Era – A Framework for Categorizing the Emerging Threats to the Crypto EconomyMarket attacksPump-and-dumpExit scamRug-pullInvestment scamFront runningEconomic attacksPhishingSpear phishingExtortionRansomwareChurningCelebrity-based scamsConsensus attacksFinney attackRace attackVector7651% majority attackNothing-at-stakeWeak subjectivityLiveness denialCensorshipPrecomputation attackSelfish miningBribery attacksLong-range PoS attacksSimplePosterior CorruptionStake BleedingNetwork-level attacksRouting attacksSybil attacksDDoS (Distributed Denial of Service)Eclipse attacksTransaction MalleabilityTimejackingWallet attacksSeizure of Private Keys (Hot...