Friday, June 6, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Articles

Block Chain technology’s susceptibility to social engineering attacks

Govind NelikabyGovind Nelika
November 28, 2022
in Articles, CLAWS Focus
A A
0
Post Views: 39

Abstract

Blockchain Technology as we know it today is no longer exclusive to cryptocurrency modules; any individual/party who knows cryptocurrency/bitcoin knows blockchain technology’s existence. Blockchain technology in its decentralized model was developed by an Individual or a group of people under the pseudonym Satoshi Nakamoto; the working theory and functionality of Bitcoin and Blockchain tech as we know it today was made public in the bitcoin whitepaper titled “Bitcoin: A Peer-to-Peer Electronic Cash System.” This minor paper will discuss Blockchain technology’s functionality and its apparent weakness against social engineering methods. (Nakamoto)

Introduction

            Firstly, one must understand what makes blockchain technology unique, essentially an ever-growing interconnected digital registry. The Blockchain is a distributed ledger that is open and public. The open nature of the Blockchain makes it impossible to delete any data once it has been entered into the System. How does the blockchain work? Each block (data structure) in the chain consists of the data, the hash to that particular data and the previous hash makes it a continuous chain. The data recorded in the Blockchain depends on the type of Blockchain used; if it’s related to bitcoins, it will record information about transactions, the sender and receiver addresses, their transaction details, and the number of bitcoins present in all present blocks. Each new block is added to a chain by having its hash value that can be compared with existing hashes in other blocks; if two nearby hashes match precisely, then we know they come from the same block; otherwise, they’re not part of the same collection of transactions.

This System virtually ensures that any data fed into the blocks themselves are secure, further application of several measures such as  “PoW, Proof of Work”, where each node is selected to create a new partnership in each round of consensus by computational algorithm, the participating nodes have to solve a cryptographic puzzle, the node which first addresses the block, as such even if one block would be compromised the computational power required to take control of the every corresponding node would be improbable since each additional node increases the difficulty of breaching the Blockchain.

Figure 0.1 (Shijie Zhang, 2020)

The problem with security measures is that the thumb rule applies even to Blockchain technology; a chain is only as strong as its weakest link.

Social Engineering

Even though Blockchain is hailed as a robust model, it is not immune to social engineering because tactics employed in Social Engineering do not target the System itself but rather the human counterpart, which is more likely to make errors.

A definition of social engineering by Kaspersky Labs is as under:

“Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems. Attacks can happen online, in-person, and via other interactions.”

As aptly put, Social engineering targets the individual rather than the System; in today’s social media platform, personal information is more public than it used to be, and even open-source penetration testing software like Kali Linux has widely accessible tools which make such tactics probable even by teens, packages like the Social-Engineer Toolkit (SET) hold inbuilt package which can conduct detailed attacks and even gather information on any intended target, for example, OSINT tools available in Kali Linux help one gather personal information of any intended target and if even a layman were to us packages like John The Ripper (Openwall, n.d.). It is in theory possible to crack many kinds of passwords, the package allows password decryption using dictionaries, brute force or a combination of the two paths; essentially, three modes can be used in this package single crack mode, wordlist mode, and incremental. The community version is free but lacks certain features. A paid version offers those extra features but requires a license to run. It’s possible to crack many kinds of passwords with john the ripper, including lower-case and upper-case variants; leet speaks slang terms, as well as some combinations thereof (for example: “sabre” + “mickey”). John will take a wordlist or dictionary file and try each password to crack the given file. In single-crack mode, john will take a wordlist file and try each password in it one by one until it finds the correct one for that particular file type (such as binary). In wordlist mode, john will take an encrypted file and try each word in its dictionary for passwords of that type before attempting encryption again with another hash algorithm or cracking method.

Now using social engineering tools, one can not only gather basic critical phrases of what an individual likes, such as their favourite animal, maiden name, and name of parents, but as such even more so they can infect an individual’s PC and steal passwords stored within the System itself. If blockchain technology were ever to be adopted in the Armed forces, it still bears the same weakness as Social Engineering tactics, even if a high-level official takes every precaution, just one member of their family failing to follow protocol can end up in a data breach, even with the advantage of the Blockchain system, if a black hat employs such tactics and gathers data of each corresponding node, the system would be down, in one swift swoop.

Conclusion

Since Blockchain is an upcoming technology and is being considered to be adopted in several fields and even armed forces as a whole, unless fully prepared to instil security protocols, the model may be more susceptible to be breached since Blockchain has received much hype in these past years, black hats will undoubtedly target the system, if security forces were to use it. The only way forward is to understand that social engineering is a legitimate threat to the blockchain system and learn how to reduce risk. While keeping in mind the probability of eliminating all risk associated is null.

Since the advent of IoT, information about developing and cracking is publicly available, and the present generation Z is more adept in learning tech; unless all precautions are in place, adopting blockchain technology may end in disaster.

The system is weak towards brute force attacks, in an instance where black hat tries all possible combinations of passwords until one is found that works on your target system. This is not good for anyone since it visibly takes up a long time and uses up resources, but it can be used in combination with social engineering attacks to quickly break into a company’s systems. The technology behind Blockchain requires the individual participants to share their private keys before they can complete the transaction. This makes the Blockchain vulnerable to brute force attacks where hackers try all possible combinations of private keys until they find one that works. The problem with Blockchain is that there are only so many combinations of private keys that a hacker can generate, but there are an almost infinite number of possible combinations for social engineering hacks. This means that hackers will always find a way into your system if you have not thought through your security measures properly — even if you have implemented multifactor authentication (MFA) or two-step verification (2SV), if a hacker has already accessed your systems via social engineering tactics it becomes visibly useless.

The only way forward is to step with great caution at every turn.

References

Fran Casino, T. K. (2019). A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics and Informatics, 36, 55-81. doi:https://doi.org/10.1016/j.tele.2018.11.006.

Nakamoto, S. (n.d.). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved November 16, 2022, from https://bitcoin.org: https://bitcoin.org/bitcoin.pdf

Openwall. (n.d.). John the Ripper password cracker. Retrieved November 21, 2022, from https://www.openwall.com: https://www.openwall.com/john/

Shiho Kim, G. C. (Ed.). (2020). Advanced Applications of BlockChain Technology. Springe Link. doi:https://doi.org/10.1007/978-981-13-8775-3

Shijie Zhang, J.-H. L. (2020). Analysis of the main consensus protocols of blockchain. ICT Express, 6(2), 93-97.

 

 

Tags: Block ChainChinese Space ThreatCyberCyber VerticalGovind NelikaMulti Domain Studiessocial engineeringsusceptibilityweakness
Previous Post

Modern Wars and the Curtain Call of the Main Battle Tank

Next Post

Let’s Go and Fight: Emergence of Mercenaries in Future Battle Fields

Govind Nelika

Govind Nelika

Govind Nelika is the Researcher / Web Manager/ Outreach Coordinator at the Centre for Land Warfare Studies (CLAWS). He is an alumnus of Pondicherry Central University with a degree in Political Science complemented by a certification in Data Sciences from IBM. His research approach is multidisciplinary in nature, and his focus area at CLAWS is on emerging challenges and trends in the fields of Cybersecurity, OSINT, and the evolving landscape of Strategic Technology, synergized with Generative AI and LLM. In recognition of his contributions, he was awarded the Chief of Army Staff (COAS) Commendation Card on Army Day 2025 for his work with CLAWS. He can be reached at [email protected]

Next Post

Let’s Go and Fight: Emergence of Mercenaries in Future Battle Fields

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support Us Donate Now

Web Updates

List of Shortlisted Officers / Candidates: PhD Batch – 7

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest

Summer Internship Capsule 2025

April 8, 2025
Pahalgam Response: Why India Must Fight Smart?

Pahalgam Response: Why India Must Fight Smart?

May 2, 2025
Results | Field Marshal Manekshaw Essay Competition – 2024

Results | Field Marshal Manekshaw Essay Competition – 2024

April 2, 2025
Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

May 21, 2025

Front Organisations: The Valley’s Homegrown ‘Resistance’ or Pakistan’s Evolving Terrorism Tactics?

2
RISING TENSIONS IN KATHUA

RISING TENSIONS IN KATHUA

1
The Art of Negotitations Three Day Capsule Course | 07th – 09th May

The Art of Negotitations Three Day Capsule Course | 07th – 09th May

1
Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

1
Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Echoes Across the Line: PoJK post Op Sindoor

Echoes Across the Line: PoJK post Op Sindoor

June 2, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

May 31, 2025

Popular Stories

  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Pahalgam Response: Why India Must Fight Smart?

    0 shares
    Share 0 Tweet 0
  • Results | Field Marshal Manekshaw Essay Competition – 2024

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0
  • Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Echoes Across the Line: PoJK post Op Sindoor

Echoes Across the Line: PoJK post Op Sindoor

June 2, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).