2021
DOI: 10.1016/j.bcra.2021.100021
|View full text |Cite
|
Sign up to set email alerts
|

A great disturbance in the crypto: Understanding cryptocurrency returns under attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…Cryptocurrency and blockchain attacks refer to various forms of cyberattacks targeting cryptocurrency wallets, exchanges, and blockchain networks [37][38][39]. Phishing is one of the most common styles of cryptocurrency attacks.…”
Section: Cryptocurrency and Blockchain Attacksmentioning
confidence: 99%
“…Cryptocurrency and blockchain attacks refer to various forms of cyberattacks targeting cryptocurrency wallets, exchanges, and blockchain networks [37][38][39]. Phishing is one of the most common styles of cryptocurrency attacks.…”
Section: Cryptocurrency and Blockchain Attacksmentioning
confidence: 99%
“…In that case, they can steal everything or erase all money from the targeted system or account. Moreover, since it is a decentralized system, thus there is no way to recover stolen currency from anywhere (Ramos et al 2021 ; Zetzsche et al 2020 ; Casino et al 2019 ).…”
Section: Review Of Literaturementioning
confidence: 99%
“…Upgradation risk is the next to fall in this category. Many times, attacks or controversial situations (community conflict) may lead to the forking of a cryptocurrency (Ramos et al 2021 ). Forking is the split of the blockchain into two separate branches following a change in the rules of the system.…”
Section: Review Of Literaturementioning
confidence: 99%
“…This attack, if successful, can lead to fraudulent transactions in the blockchain. A forking attack is particularly hazardous for users of personal IoT devices because if the forking attack is a hard attack, it is not reversible [111]. Further security concerns of blockchain have been highlighted by the authors of [112] who identified that blockchain on a wireless network that shares database access with the network is prone to a range of security threats that can result in cybercriminals emulating a hidden node.…”
Section: Volume 4 2022mentioning
confidence: 99%