Blockchain

Avalanche Bolsters Wallet Security with Blockaid Integration

Avalanche and Blockaid have announced a collaboration to include security measures in Avalanche’s Core wallet, the main wallet of the blockchain network.

The security integration checks for increasingly complex phishing scams and exploits that affect Web3 users using Blockaid’s threats database.

The security update prescreens transactions against Blockaid’s database of known malicious threats. It notifies the user of the danger before the transaction is signed and posted to thwart the increasingly sophisticated phishing scams and hacks that plague decentralized finance. Transaction simulation is the name given to this kind of security feature.

Blockaid states that its security system is being utilized to protect products from OpenSea, MetaMask, Zerion, Coinbase, and Rainbow and has assisted in thwarting 1.3 million attacks.

An example of a Blockaid suspicious transaction alert. Source: Bernhard Mueller Medium

Following the partnership, Ava Labs’ head of consumer products, Akash Gupta, stated:

“This collaboration between Avalanche and Blockaid signifies a significant step forward in providing users security and control without compromising speed and ease of use. By integrating advanced security solutions across the Core suite, we ensure users can explore the Avalanche ecosystem and beyond with peace of mind.”

Critics of Blockaid counter that this is a feature rather than a defect of their security software, arguing that the security screening capabilities cause an excessive number of false positives.

The security company’s spokespeople clarified that an excessive number of false positives is preferable to lowering screening standards and giving bad actors more opportunities to exploit vulnerabilities to further their illegal activity.

In the cat-and-mouse game of cybersecurity, there is also a dynamic threat landscape that can keep one step ahead of transaction simulators.

Cybersecurity expert Bernhard Mueller claims that transaction simulators like Blockaid, WalletGuard, and Pocket Universe may be vulnerable to malware like the notorious “Angel Drainer.”

Mueller clarified that although the effectiveness of these strategies was not assured or failsafe, Angel Drainer might be able to elude transaction simulators by generating dynamic, “unmarked” contract addresses and trying to steal money via those addresses.

The white hat hacker acknowledged that despite his experiments employing the dynamic, unmarked technique, Blockaid could still flag the transaction as suspicious and issue a warning.

Ruth Okarter

Ruth is a seasoned news reporter and editor who brings her sharp eye and passion for storytelling to Protechbro.com. With a background in English and literary studies, Ruth crafts compelling narratives that unpack the complexities of the ever-evolving tech landscape.

Share
Published by
Ruth Okarter

Recent Posts

Vitalik Buterin Backs Faster Ethereum, EIP-7732 Offers Hope

Ethereum engineers introduced EIP-7732 to speed up the network and enhance block validation The proposal…

2 mins ago

Nigeria to Open AI, Blockchain Research Centers Nationwide

The National Information Technology Development Agency (NITDA) of Nigeria plans to establish research centers on…

11 mins ago

Fisker Seeks Judge’s OK to Sell Ocean EVs at $14K Each

Fisker has urged a Chapter 11 bankruptcy judge to accept the sale of more than…

22 mins ago

OpenText to Layoff 1,200 Workers

As part of its new business optimization strategy, OpenText Corp announced on Wednesday that it…

31 mins ago

Bezos to Sell $5B in Amazon Stock After Record High

According to a regulatory filing, Jeff Bezos, the founder and executive chairman of Amazon, intends…

39 mins ago

AI Boom Likely Raised Samsung Q2 Profit 13-Fold

As memory chip prices rise due to artificial intelligence demand, Samsung Electronics' second-quarter profit is…

49 mins ago