Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
The cryptocurrency industry lures millions of customers and thousands of frauds. The unregulated Wild West of the modern financial sphere features insane volatility, round-the-clock trading, and anonymous transactions hidden from governments and regulators. Hackers are ever ready to steal millions of dollars in crypto by using both classic and innovative tools to fool novice token holders. From traditional phishing to clipboard hijacking, hackers apply various schemes to replace walletsâ addresses.
One of the modern approaches is related to manipulations with crypto bots and APIs. Fraudsters can compromise automated trading software on exchanges and place any orders, or get access to usersâ sensitive data. If you consider using bots, make sure to read more about their features, vulnerabilities, and safety measures.
A primer on crypto bots
Crypto trading bots are programs, which analyze markets and place orders automatically. Considering high volatility and constant changes of the crypto world, bots are convenient as they can monitor the market 24/7/365. Also, they are fast and can place buy/sell orders regularly to get more profits.
Sounds wonderful, doesnât it? However, trading bots arenât flawless. They are relatively complex systems, which strictly follow the user-defined preferences, so they require careful tuning. Additionally, advanced programs may come with monthly fees. It means that you can easily lose money if you donât know how to use bots properly.
Before ordering or creating a bot, itâs better to remember the general features of premium software:
â Reliability
â Transparency
â Profitability
â Ease of use
â Security
Probably, the last point is the most important as it closely relates to the safety of your money. Any bot is certainly a gold mine for hackers or phishers, so pay close attention to the protection of trading software, or a platform that you use. Before engaging in any sort of activity, check the security measures for every exchange pointed out on TheProblem.wtf.
Weaknesses of automated trading
Crypto bots execute orders by interacting with exchanges APIsâââapplication programming interfaces. As a result, we face the scenario of two machines working together without manual control.
The problem is in the centralized nature of trading bots and platforms. As hackers canât access blockchain-based systems because of their nearly perfect security, they focus on traditional central-server systems, which rely on personal data like passwords, e-wallet addresses or keys. And it becomes even easier to hack machines, which work independently.
Thus, bots and APIs have three major flaws that might result in:
â Making unprofitable deals. If hackers get access to the first layer of trading interface, they can only place orders. Certainly, they will make deals which are profitable for them, but not for you.
â Stealing money. The second layer gives options to withdraw money. Obviously, hackers will do it after placing some orders and getting enough profit.
â Getting access to sensitive data. Along with making buy/sell deals, fraudsters can access personal info like keys to crypto wallets that are linked with the bot.
Hackers and their tools
Hackers can break into the system and modify codes to set new algorithms for bots. Sometimes, the owners can even miss these changes and continue using their trading software. Without diving into technical details, there are some other ways to hack bots, trading programs or APIs.
Further on, you can check the examples of crypto bots based on different technical frameworks.
APIs
As weâve mentioned before, bots interact with exchangesâ APIsâââspecific interfaces, which allow placing orders automatically. Usually, these systems are based on a few permission levels protected with unique keys. Utilizing phishing schemes, hackers can access these keys and break into the system.
One of the brightest examples of fraudulent API usage is the Binance case. This exchange has three permissions in its API: reading, trading, and withdrawing. In July 2018, hackers got access to the first two levels, pumped the price of SYS coin, and transferred huge amounts to the accounts with withdrawing permissions that they had controlled earlier. As a result, Binance prompted temporary shutdown, reset all API keys, and tested the whole security system.
Whatâs the problem? Binance is a highly secure platform but itâs also centralized. Professional hackers can steal keys and get control over trading bots or APIs easily.
Apps
This example is simple and, partially, refers to the previous one. You know trading applications for desktops or mobiles, which allow placing orders in a smooth and convenient way. These programs arenât bots as they require manual control, but they also are based on APIs, which have some weaknesses.
For instance, remember the fake Poloniex apps created by fraudsters for Android systems. They were freely available in Google Play, so users simply provided their personal info and account credentials to hackers. Fake exchange applications are a kind of phishing scams that are utilized by criminals to access user wallets or accounts, so be careful and use 2FAÂ always.
Extensions
Some trading bots may come as add-ons for browsers. They look highly convenient as you can trade faster and always control the process. However, we suggest avoiding such extension options by all means, because they are fraudulent usually. Browser plugins and add-ons may compromise your hardware or simply copy everything you type in including keys and passwords.
Slack bots
Various Slack programs and channels are used by crypto scammers for fraudulent activity. In 2017, it was reported that a number of blockchain development teams were attacked by cyber criminals via a Slackbot. Hackers utilize phishing schemes by alerting users about a potentially profitable deal and providing a link to a scam website, which will ask you to enter sensitive data or log in to your wallet.
Protecting yourself from hacks
Summarizing it, we want to provide some info on safety measures which you should take while interacting with any crypto trading program, application, or interface. Here are the most valuable tips:
â Keep API keys secret. Donât share your personal data like keys for bots, private addresses of crypto wallets, and passwords.
â Turn off automated withdrawals. Better, spend some time and do it manually. In this case, hackers will potentially be able to make unprofitable deals but they will not steal your money.
â Do a lot of research. Bots are pretty complicated tools, so take your time and read about trading strategies, preferences, and protection measures.
Generally, rely on trusted software only, and donât forget about âInternet hygieneâ. Bots may be useful and profitable, but they are machines and they may be hacked like any other computing devices.
Can Crypto Bots Be Hacked on Exchanges? was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.