About Us

Digital Asset Exchange BlockQuake™ Collaborates with Prominent Cybersecurity Firm Friedman CyZen

BlockQuake™, a regulatory-driven digital asset exchange announced collaboration with Friedman CyZen (“CyZen”), a prominent cybersecurity company with decades of experience in technological compliance with multiple regulatory frameworks. CyZen, a subsidiary of Friedman LLC, offers services such as continuous security log auditing, penetration testing, cybersecurity control, processing audits, and compliance consultation. BlockQuake™ will use CyZen for a number of these services, boosting investor security and privacy while also allowing for a higher level of self-regulation. BlockQuake™ just completed a penetration test conducted by CyZen that found no serious vulnerabilities or other cybersecurity flaws that may be exploited. 

“We are proud to partner with CyZen, which will support us in maintaining the highest standards of security on the BlockQuake™ Exchange. With the prevalence of large-scale security breaches and crypto scams, cryptocurrency traders, especially new investors, are rightly concerned about how to choose an exchange that is legitimate and safe. This partnership should bring confidence to our investors, who know they are trading on an exchange that prioritizes their safety and security,” said Antonio Brasse, CEO, and Co-founder of BlockQuake™.

Cyberattacks are a threat to all businesses, including cryptocurrencies. Several cryptocurrency exchanges have had huge security breaches in the last year, with hackers compromising investor data and stealing millions of dollars.

BlockQuake™ has added CyZen with BSA-compliant Custodian Prime Trust, Chainalysis, and Fireblocks as another regulatory-forward partner ahead of its impending launch. These significant vendor collaborations will aid BlockQuake™ in mitigating potentially disastrous security risks, as well as contributing to the resolution of key security concerns raised by traders in the cryptocurrency space.

“Hackers do not just go after multi-million dollar institutions. Cryptocurrency exchanges are becoming more frequent targets of ransomware and other cyberattacks. With CyZen’s vast experience in cybersecurity, we bring peace of mind to BlockQuake™ and its investors that their funds are always protected. We also provide the multifaceted services they need to navigate evolving cyber threats,” said William Mendez, Managing Director of Operations for CyZen.

Ransomware – Everything You Need Know

Ransomware is a cryptographic malware that threatens to release or permanently block access to the victim’s data until a ransom is paid. Ransomware encrypts information and documents on any device, including servers, from a single computer to an entire organization’s network. Ransomwares are part of cryptovirology. Cryptovirology is the study of the creation of effective harmful malware using encryption. 

Ransomwares encrypt the victim’s files making them unusable and demand a ransom to unlock them. Recovery of documents without the decryption key is an unsolvable problem in a properly executed cryptoviral extortion attack. The payment of ransoms is demanded in Bitcoin or other cryptocurrencies, making it impossible to track down and prosecute the culprits. 

Recent Ransomware attacks  

The WannaCry ransomware attack swept across the Internet in May 2017, employing the EternalBlue vulnerability vector. The ransomware attack, which was unparalleled in scope, infected over 230,000 devices in over 150 countries and demanded money from customers using the Bitcoin cryptocurrency in 20 different languages. At least 16 hospitals in the United Kingdom’s National Health Service (NHS) had to turn away patients or cancel scheduled surgeries. The US Colonial Pipeline was the target of a cyberattack on May 7, 2021. DarkSide was recognised by the Federal Bureau of Investigation as the culprit of the Colonial Pipeline ransomware assault, which resulted in the voluntary shutdown of the primary pipeline carrying 45 percent of petroleum to the US East Coast. 

How Attackers Attack? 
  • Ransomware comes as an email attachment – Invoice, attached document, etc. It may include a real vendor’s name or even your organization’s name. 
  • Employees’ computers are usually connected to the company’s network, shared cloud services, and so on. Without any human involvement or indication, ransomware begins encrypting all of the files it can as soon as it is launched. 
  • It then notifies the user and gives payment instructions. 
  • Some other ways are – Compromised webpages, infected removable drives, malicious software bundles.
  • Payment is mostly in Bitcoins 
 Key choices: 

– Pay the ransom and get data 

– Restore from backup 

– Lose Data 

Paying the Ransom increases Risk of Future Attacks 

The majority of cybersecurity experts don’t recommend paying a ransom in the event of a ransomware attack. Paying won’t guarantee that a company will get their data and it will encourage hackers behind ransomware attacks to keep doing what they’re doing, maintaining the illegal industry. The targets of a ransomware attacks are mostly given a time limit with the threat of deleting a particular amount of data every hour until the ransom is paid. This can be extremely stressful and unpleasant for the key management people in an organization, leading them to believe that they have no other option except to pay. The best suggestion is to be properly prepared for an attack so that enterprise firms can defend themselves. 

Ransomware and Cryptocurrency  

Bitcoins are a type of cryptocurrency, which means they don’t have a physical form. They are kept in anonymous digital wallets. They can be sent to any location. They can be paid with complete anonymity from anywhere to anywhere. Aside from the advantages, they are an excellent method of payment for illegal operations. One may claim that cryptocurrency is one of the ransomware’s enablers. After all, the software would be worthless if the hackers couldn’t safely take cash. The emergence of Bitcoin has coincided with an increase in ransomware attacks.

Security Awareness Training  

It is advised that effective security awareness training is required. Employees do not come to work with the goal of clicking on phishing emails and infecting their machines. As many IT professionals can confirm, knowing what red flags or threat is, can make all the difference in an employee’s ability to distinguish malicious links/software from legitimate traffic. 

Protection  

Investing in a renowned security solution and putting in a strong firewall is a terrific approach to protect an organization’s network. There are various security solutions like Zero-Trust Security, Web Application Firewall and Cloud Security. Keeping the security system up to date will assist security teams in detecting a ransomware infection in the early phase. 

Backup of Data 

The most important piece of advice given by anti-ransomware experts is to back up all data outside of your organization’s network. Create an isolated network or buy a service to keep the company’s backup safe from infection. It’s necessary for an enterprise firm to restore the whole system. 

Ransomwares have grown into malware that disables entire infrastructure. It won’t be surprising if ransomwares evolve in the next few years. Hence, necessary steps to secure an organization should be taken into consideration. 

Cryptocurrency and Money Laundering

Cryptocurrency and Money Laundering

We all have been hearing since last year about cryptocurrency and the lucrative profits it offers which is attracting all the money-launders, terrorism financing, and other financial fraudulent activities. A lot of news of crypto scandals is floating in the market. Due to emerging trends of cryptocurrency and the fraud activities involvement, the government authorities and regulators have increased their focus on all the institutions dealing with cryptocurrency in making them compliant and ensuring them to follow the regulations.

How fraudsters use Crypto to launder illegal money?

Fraudsters and criminal use crypto money laundering to conceal all their illicit funds in a lot of ways. The most dignified form of money laundering is bitcoin money laundering. There are three main stages in money laundering, and these same stages are applied to crypto money laundering as well.

Let’s understand what is Money Laundering first –

Money laundering is a process where a large amount of proceeds is generated by criminal activities and terrorist funding such as drug trafficking, arms trafficking, gambling, tax evasion etc.

Three stages of Crypto Money Laundering or Money Laundering

1. Placement – The first stage is introducing illegal proceeds into purchasing cryptocurrency, creating a digital wallet to do financial transactions just like a bank account. Cryptocurrencies or can be acquired with cash or other types of crypto, online cryptocurrency trading exchanges, or through licensed exchangers which may or may not require customer identification. Legal transactions follow the regulatory process for identity verification and are AML compliant.

2. Layering – The second stage is where the illicit money is separated from its source and where the funds are concealed through various ways such as transferring funds to different wallets or shifting services to hide the fund source.

3. Integration – The final stage is the funds that were laundered money goes back to the owner who uses the money to make purchases or invest in new business. Cryptocurrencies could be switched to fiat currencies through the exchange process. This exchange process mostly follows a stringent identification process and supports popular coins such as Bitcoins etc. Offshore fiat currency bank account sometimes can be used to launder dirty money through an online company that is accepting bitcoin payments and can be created to allow income and switch dirty cryptocurrency into white/legal bitcoins. Cryptocurrency can be used to purchase goods also digital wallets can be stored on phones, online devices making it possible to sell crypto coins for physical cash/money.