Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

May 14, 2026

UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

May 14, 2026

Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

May 14, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    70% of long-term holders are in profit as the bitcoin floor hardens

    May 13, 2026

    What’s Really At Stake In The Market Structure Debate: The BRCA

    May 13, 2026

    Strategy adds 535 BTC – Still ‘buying the dip’ or something else entirely?

    May 13, 2026

    Bitcoin, Ethereum and XRP Price Analysis: What’s Coming Next?

    May 13, 2026

    Wells Fargo Boosts Ethereum ETF Holdings in Q1

    May 13, 2026

    Why Market Experts Are Still Predicting A Rise Above $10,000

    May 13, 2026

    Bitmine ETH Holdings Cross 5.2 Million—CEO Announces New Phase For Crypto Markets

    May 12, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026

    XRP Ledger Hits Record High In 10K+ Wallets: Santiment

    May 13, 2026

    Mysterious Bitcoin Whale Transfers $40B After Years Of Silence

    May 13, 2026

    First Hyperliquid ETF Launch: Day One Volume Hits $1.8M–Key Details

    May 13, 2026

    Meme Coin Market Faces Imbalance as Supply Rises, Demand Falls

    April 4, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    UXLINK And Origins Network Partner To Power Scalable AI-Driven Web3 Applications Using Decentralized Computing

    May 13, 2026

    WheelX.fi Expands Cross-Chain Liquidity Access Through KiteAI Integration

    May 13, 2026

    TopNod Integrates Hyperliquid – The Future of Seamless On-Chain Perpetual Trading

    May 13, 2026

    Ripple Shares DPRK Threat Data on Fraud Domains, Wallets, Campaigns

    May 5, 2026

    Digital Asset Security Moves Beyond Keys as Bitgo Adds 5-Layer Checks

    May 1, 2026

    Defillama Confirms April 2026 as Crypto’s Most-Hacked Month With 30 Incidents

    May 1, 2026

    Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto W

    April 29, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Web 3
    1. Gaming
    2. View All

    NUMINE Joins Outer Ring MMO for the Expansion of Web3 Gaming Experiences

    May 13, 2026

    GMatrixs And MiniverseCore Join Forces To Unlock Web3 Gaming Experience With Cross-Chain DApp, DeFi Applications

    May 11, 2026

    The Identity Crisis of 2026: NFTs, AI Agents and Trust on the Agentic Web

    May 11, 2026

    DTCC’s May 2026 Tokenization Announcement Explained: What It Means for U.S. Securities and Real-World Assets

    May 11, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    Three men charged in US over crypto wrench attack spree

    May 13, 2026

    CLARITY Act faces 100+ amendments as bankers send 8,000 demand letters against stablecoin rewards

    May 13, 2026

    Bhutan’s GMC offers quick licenses, bank accounts to lure crypto firms

    May 13, 2026

    Tether launches decentralized local AI using Isaac Asimov’s Psychohistory straight out of Foundation

    May 11, 2026

    Has Donald Trump been a net positive for Bitcoin or created an unbreakable partisan divide?

    May 10, 2026

    BlackRock looks to sidestep Clarity yield issues, filing for two new tokenized money market funds

    May 10, 2026

    Cardano’s Charles Hoskinson says the future of crypto wallets will be inside iPhones and Androids

    May 8, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Analysis

    Wall Street is buying XRP while Binance traders keep betting against it

    May 13, 2026

    Is a Drop Below $1 Coming Next?

    May 13, 2026

    UB Price Breakout Enters Discovery Phase

    May 13, 2026

    Injective (INJ) Price Explodes 13% After Bullish Breakout—Is a Rally to $6 Next?

    May 13, 2026

    Bitcoin (BTC) Price Holds Strong Above $80K Despite Hot CPI Data—Is Retail Accumulation Returning?

    May 13, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What’s on the Ethereum Roadmap: Glamsterdam, Hegota and Beyond

    March 30, 2026

    What Is Bluesky? The Decentralized Social Media Rival to Elon Musk’s X

    March 27, 2026

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    Coinbase went down for over 5 hours after missing earnings. Bulls still see a path to $300 billion by 2030

    May 8, 2026

    Coinbase cuts 14% of staff as Armstrong ties cost reset to AI and market volatility

    May 6, 2026

    Bitcoin is still in charge

    May 3, 2026

    CLARITY Act stablecoin fight shifts from yield to who captures digital-dollar economics

    April 29, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»Let’s Steal a Coin – Infosecurity Magazine
Let’s Steal a Coin - Infosecurity Magazine
Security and Privacy

Let’s Steal a Coin – Infosecurity Magazine

November 17, 2025No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Did you ever regret hesitating in investing in cryptocurrency? I surely do, but is it secure and safe to invest in cryptocurrency? What is cryptocurrency? These questions are consistently trending in the IT communities. 

Cryptocurrency is a digital currency, which uses encryption to enforce regulation, create a monetary unit (identified as a fund or a coin), verify their transference, and ensure their authenticity. Cryptocurrency represents a standard of value accepted by all parties.

Cryptocurrency owes its existence to the Blockchain technology. A Blockchain technology is a decentralized ledger, which is essentially a list of all transactions across a peer-to-peer network.

This can be applied in various domains such as identity, digital assists, digital currencies, and smart contracts. In addition, Blockchain can mitigate digital forgery cases and verify identification in passports, immigrations, and medical record’s fields.

In addition, it can remove intermediaries in exchanging digital assets such as settlements in the stock exchange and building traceability system for materials and products in provenance trading businesses.

That’s been said, how can a hacker steal a cryptocurrency coin? To answer this question, certain types of Blockchain developer must be identified. There are two types of Blockchain developers: the core Blockchain developer, and Blockchain developer.

The core Blockchain developer focuses on the core technology and protocols . The core technology is a platform which allows financial assets to be managed and transported with or without permissions. Financial firms are the main beneficiary of the core Blockchain with permissions, and core Blockchain can be developed with open source resources and minimal coding skills.

There are public, federated, and private Blockchains. Examples of public Blockchain are Bitcoin, Litecoin, Monero, Dash, and Ethereum, where these protocols are not permissioned and anyone can participate in downloading the code and running a public node on their local device. In addition, anyone can validate a transaction in the network with public Blockchain protocols.

See also  Estonian Duo Arrested for Part in $575m Ponzi Scheme

A private Blockchain is made specifically for certain organization with limited access and permissions to overcome a deficiency, lack of security, and fraud issues.

Federated Blockchain is a domain where protocols are operated under a leadership of a group. In federated Blockchain, the leadership does not allow anyone to participate in the process of verifying a transaction. Core Blockchain developers can be protocol (such as Bitcoin) code developers or developers focused on a crypto project.

The Blockchain developer focuses on the implementation and enhancement of decentralized application programming. An example of this type of developer is one who focuses on building Ethereum Dapp (Decentralized Application Development).

The main purpose of Dapp is to connect users and providers without a third party involvement. The Blockchain developer must be familiar with applications protocols such as HTTP/S, SSH, L2TP, TLS, and SOAP, and have web developing skills such as using JavaScript. In addition, Blockchain developers must have the ability to code on contract-oriented programming language such as Solidity or Viper. Many international companies that are specialized in Blockchain development have a long experience with LeewayHerts, Bacancy, VironIT and more.

An exploit for the core technology affects the coins’ infrastructure and communication channels, but an exploit for the implementation of Blockchain affects applications and websites. The majority of the Blockchain developers’ tasks are the same as a web developers’ tasks. This means the hacker uses web vulnerabilities to steal coins.

An example of a threat scenario against the web vulnerabilities is where hackers target and compromise the hot wallet: a hot wallet is on a server and accessible through the internet through an application. This means the hacker can utilize the website weaknesses (cross-site script, SQL injection, etc…) to reach the wallet data. Then, the hacker can perform interception, interruption, modification, and/or fabrication.

See also  Next week could decide whether SEC lets your Apple shares live on-chain — with the same protections

Don’t get me wrong and underestimate cryptocurrency hackers, they are most likely advanced and zero-day vulnerability hunters. However, they are following the same threat framework that is known in the IT industry.

Hackers go through the planning and reconnaissance phase to identify the cryptocurrency technology and platform nature. Then, they deep-dive into the technology to identify vulnerabilities. They exploit the vulnerability on various layers and gain their coins.

A great supplementary can be added to this framework by accessing from an anonymous channel that makes it harder to be tracked.         

This article is not about stealing coins. In fact, it is about identifying the sources of losing your coins to a hacker and providing you with an overview of ways to protect your coins. As a cryptocurrency trader or user, you need to verify the cryptocurrency security by verifying the security of the core technology of the cryptocurrency.

For example, Bitcoin runs on C , which means Bitcoin might have a potential for C vulnerabilities. Another cryptocurrency such as Dragonchain supports various languages such as Java, Python, NodeJS, and C#. This raises a question regarding the limit of attack surface against such a cryptocurrency.

A trader can raise the security level of storing his coins by using an offline hardware wallet (cold wallet) instead of the hot wallet. In addition, a trader must ensure a higher security access measures to the wallet by emphasizing the utilization of two-factor authentication.


Nawwaf Alabdulhadi is an IT security expert, where Nawwaf’s experience in IT field involved more than 7 years in executing IT security projects, providing consultation, and assessment in various countries, roles, and companies. Nawwaf has Computer Science Bachelor degree from Northumbria University, UK, Master Degree in Information Security Policy and Management from Carnegie Mellon University, US, and leading industry certificates such as CISSP from ISC2 and CPT from IACRB. Nawwaf currently works as a senior IT Security specialist in a leading enterprise (Saudi Aramco).


Coin Infosecurity Lets Magazine steal
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Zcash just exploded 40% – and the privacy coin rally is no longer just a crypto-native trade

May 7, 2026

Ripple Shares DPRK Threat Data on Fraud Domains, Wallets, Campaigns

May 5, 2026

Clarity Act text lets crypto firms offer stablecoin rewards while shielding bank yield

May 2, 2026

Digital Asset Security Moves Beyond Keys as Bitgo Adds 5-Layer Checks

May 1, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Crypto Crime Down 62% but Ransomware Activity Surges

October 2, 2025

What XRP Holders Must Know About 1099-DA Reporting

February 16, 2026

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

May 14, 2026

UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

May 14, 2026

Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

May 14, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.