{"id":3518,"date":"2014-01-20T14:30:51","date_gmt":"2014-01-20T19:30:51","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=3518"},"modified":"2020-02-26T18:38:19","modified_gmt":"2020-02-26T16:38:19","slug":"everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/3518\/","title":{"rendered":"What is Bitcoin, and how does it work"},"content":{"rendered":"<p>Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile \u2014 and occasionally very high \u2014 price. Its potential for investors has made it a tempting option for many users and cybercriminals alike. Malware and crime, in general, follows the money trail, and cryptocurrencies are a perennially hot topic in cybertown.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/01\/06044825\/bitcoin1.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3523\" alt=\"bitcoin\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/01\/06044825\/bitcoin1.jpeg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>By not being controlled by a central authority but rather by its contributors it has made some governments rather nervous, creating a heated debate about whether it should be regulated or not. However, this is not something entirely feasible given the initial design of the Bitcoin currency and network by its creator <a href=\"https:\/\/en.bitcoin.it\/wiki\/Satoshi_Nakamoto\" target=\"_blank\" rel=\"noopener nofollow\">Satoshi Nakamoto<\/a>. After 2010 he disappeared from the project without leaving a trace behind, creating many stories around his mysterious invention and identity. What we know for sure is that after many years Bitcoin is as strong as ever and continuing to grow every day.<\/p>\n<p>In addition, the nature of digital currencies has many advantages when we compare them to their real life counterparts. It\u2019s fast, taking around only ten minutes to verify a transaction and cheap, liberating you from the need to maintain or pay for processing fees to a credit card company.\u00a0 If we add the benefits decentralization, privacy and ubiquity we can begin to understand the temptation to invest our time and money in Bitcoins.<\/p>\n<p><i>\u201cThe most fertile ground for Bitcoin is in places like Cyprus, Argentina, Iceland, China and other countries which have experienced significant financial disruptions and\/or maintain strict financial controls.\u201d<\/i> \u2013 <b>Garrick Hileman<\/b>, economic historian at the London School of Economics<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/01\/06044827\/bitcoinvalue.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3522\" alt=\"bitcoinvalue\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/01\/06044827\/bitcoinvalue.png\" width=\"917\" height=\"399\"><\/a><\/b><\/p>\n<p>In the beginning the most common way to obtain a Bitcoin was through a process called mining in which the user would exchange CPU or GPU power for fractions of a Bitcoin (depending on several factors). Given that not many miners were present at the time it was a cost-effective solution and a simple way to invest in the new currency without too much hassle. Mining is a necessary part of the security scheme of Bitcoin since it verifies the transactions made on the network essentially preventing double-spending attacks (one person sending the same Bitcoins to multiple people).<\/p>\n<p>Moreover, after seeing some profit many early adopters started building \u201cmining rigs\u201d or computers completely dedicated to such activities. Since the miner who finds the solution to the network provided crypto problem the fastest is rewarded with Bitcoins a race for designing the best mining rig started. The cost of this tailor-made equipment would be quite pricey (usually including several high end gaming video cards running in parallel) but the return of investment at the time warranted such spending and a lot of people joined the Bitcoin wagon without further thought. After GPU mining was superseded by <a href=\"#https:\/\/en.bitcoin.it\/wiki\/Mining\" target=\"_blank\" rel=\"noopener\">ASICs<\/a> (Application-specific integrated circuits) some hobbyists and small companies began building their own mining farms basically leaving small players out the game.<\/p>\n<p><i>\u201cThe average total coins generated across the network per day stays the same.\u00a0 Faster machines just get a larger share than slower machines.\u00a0 If everyone bought faster machines, they wouldn\u2019t get more coins than before.<\/i><\/p>\n<p><i>We should have a gentleman\u2019s agreement to postpone the GPU arms race as long as we can for the good of the network.\u00a0 It\u2019s much easier to get new users up to speed if they don\u2019t have to worry about GPU drivers and compatibility.\u00a0 It\u2019s nice how anyone with just a CPU can compete fairly equally right now.\u201d \u2013 <b>Satoshi Nakamoto<\/b><\/i><\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/01\/06044829\/mining-rig.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3521\" alt=\"mining-rig\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/01\/06044829\/mining-rig.jpeg\" width=\"1920\" height=\"1080\"><\/a><\/b><\/p>\n<p>One of the most popular ways of obtaining a Bitcoin nowadays is via one of the many trading sites available online in which you can exchange your local currency for the crypto equivalent quickly and securely. Additionally many online merchants started accepting Bitcoins as a means to pay for goods validating the real world value of the currency. One of the most known (albeit illegal) sites that depended on Bitcoin was the infamous <a href=\"https:\/\/threatpost.com\/fbi-takes-down-billion-dollar-silk-road-online-drug-and-hacking-marketplace\/102499\" target=\"_blank\" rel=\"noopener nofollow\">Silk Road<\/a>, a place of the <a href=\"http:\/\/www.worldcrunch.com\/tech-science\/welcome-to-the-deep-web-the-internet-039-s-dark-and-scary-underbelly\/invisible-internet-tor-onion-network\/c4s10150\/\" target=\"_blank\" rel=\"noopener nofollow\">dark web<\/a> in which you could buy a wide array of forbidden drugs and services within the comfort of your own home. Even though Bitcoin as a currency is not completely anonymous it does provide a certain degree of <a href=\"https:\/\/threatpost.com\/bitcoins-web-exchanges-make-following-money-near-impossible\/102523\" target=\"_blank\" rel=\"noopener nofollow\">privacy<\/a> that you wouldn\u2019t get using other commonly available options making it the default alternative for cybercriminal activities.<\/p>\n<p>So, if everything is virtual, where do you keep your hard earned crypto-money? Well, as in real life a wallet is needed. Several online wallet services appeared as a response for the claims of numerous users wanting to safely store their Bitcoins. Unfortunately, such services provide no guarantee that your money will be securely held and the <a href=\"https:\/\/www.securelist.com\/en\/blog\/8140\/How_to_keep_your_Bitcoins_safe\" target=\"_blank\" rel=\"noopener nofollow\">latest robbery of a popular Bitcoin bank<\/a> left several users in the dark losing approximately 1.2 million dollars of their savings combined. You can certainly <a href=\"https:\/\/www.kaspersky.co.za\/blog\/bitcoin-safety-guide\/\" target=\"_blank\" rel=\"noopener\">keep your money offline<\/a> using free and widely available tools, just remember to back up your wallet so you don\u00b4t end up throwing out all your life savings to the nearest landfill site. That was the case <a href=\"http:\/\/www.theguardian.com\/technology\/2013\/nov\/27\/hard-drive-bitcoin-landfill-site\" target=\"_blank\" rel=\"noopener nofollow\">with James Howells<\/a> who discarded an old hard drive containing his wallet which had around 7,500 Bitcoins inside or the equivalent of today\u2019s 4 million British pounds.<\/p>\n<p>However, there\u2019s one perceived flaw with the usage of Bitcoins for modern day finances and that\u2019s due to the fact that transactions made with this currency are <a href=\"http:\/\/www.wired.com\/opinion\/2013\/11\/once-you-use-bitcoin-you-cant-go-back-and-that-irreversibility-is-its-fatal-flaw\/\" target=\"_blank\" rel=\"noopener nofollow\">irreversible<\/a>. This is considered an advantage by a small group of advocates but for Bitcoin to become a mature and stable choice it needs to guarantee the safety of its users by preventing online fraud and robbery. Besides, given the high <a href=\"http:\/\/www.nytimes.com\/2013\/11\/27\/opinion\/much-ado-about-bitcoin.html?smid=tw-share&amp;_r=1&amp;\" target=\"_blank\" rel=\"noopener nofollow\">volatility<\/a> of the cryptocurrency market one needs to spend the money rather quickly before it loses its value. Currently Bitcoin is not considered a wise alternative for saving your retirement money but rather to spend it in places that don\u2019t accept any other form of payment. Hopefully, the deployment of the new Canadian Bitcoin ATM nicknamed <a href=\"http:\/\/www.wired.com\/wiredenterprise\/2013\/10\/bitcoin_atm_gallery\/\" target=\"_blank\" rel=\"noopener nofollow\">\u201cRobocoin\u201d<\/a> will set a trend allowing the non-geek audience to try this form of currency for their everyday transactions.<\/p>\n<p>So far, we have made a general introduction about the Bitcoin cryptocurrency, the characteristics of its market, advantages, flaws and many other peculiar traits but what about the relation of this new currency with cyber-crime? With people becoming more and more desperate to get their hands on precious Bitcoins while they were climbing to the peak market value many scams began to appear online, for example fake <a href=\"https:\/\/www.net-security.org\/malware_news.php?id=2630\" target=\"_blank\" rel=\"noopener nofollow\">\u201cbitcoin generators\u201d<\/a> or legitimate applications including the installation of mining software without explicit user consent.\u00a0 A <a href=\"https:\/\/threatpost.com\/gaming-platform-settles-on-bitcoin-mining-malware-allegations\" target=\"_blank\" rel=\"noopener nofollow\">particular gaming company<\/a> was fined recently with a one million dollar amount because it had been stealthily including a mining application within their anti-cheat product. Even though this software was deployed across only 14,000 PCs it was more than enough to lose the trust of their hard earned customers ending the story with the <a href=\"http:\/\/www.wired.co.uk\/news\/archive\/2013-07\/10\/esea-bitcoin-mining-lawsuit\" target=\"_blank\" rel=\"noopener nofollow\">firing of an accused employee<\/a> which was suspected of converting the before mentioned application into a money making Trojan.<\/p>\n<p>In addition, some peculiar scenarios started to emerge with Bitcoin in the spotlight. The Massachusetts police department had to resort to some emergency cryptocurrency buying since the infamous ransomware named <a href=\"https:\/\/www.kaspersky.co.za\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener\">\u201cCryptolocker\u201d<\/a> demanded the payment of two Bitcoins for releasing the department\u2019s encrypted files. Interestingly, as the price for a single Bitcoin unit increased most malware started to adjust the ransom price in order for the victim to pay up without too much thought about the whole operation. After all, if the currency is based on the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Subjective_theory_of_value\" target=\"_blank\" rel=\"noopener nofollow\">subjective theory of value<\/a> why not apply it also to the goods that can be purchased with it? How much would you pay to recover your files?<\/p>\n<p>Even popular Crimeware Kits such as Atrax started offering \u201cwallet stealing\u201d plugins for a convenient amount of money which in addition could also log the password users\u2019 might have implemented to protect their wallets. Moreover, for the Bitcoin criminal enthusiast the malware creators offered a \u201ccoin mining\u201d tool to put to good use those stolen CPU and GPU cycles. As we have mentioned many times before, malware follows the money trail and Bitcoin is big news at the moment. It\u2019s noteworthy that Atrax, along with <a href=\"http:\/\/www.securelist.com\/en\/blog\/208214185\/ChewBacca_a_new_episode_of_Tor_based_Malware\" target=\"_blank\" rel=\"noopener nofollow\">ChewBacca<\/a> became well known because of its use of the TOR network to reach the command and control servers. When we add bitcoin mining and wallet stealing to that equation it\u2019s evident that every day we are dealing with a more complex and evolved type of malware, one that is offering product updates and modules based on user request and popularity.<\/p>\n<p>The Bitcoin malware samples seen in the wild grow day by day and it\u2019s not uncommon to find <a href=\"https:\/\/www.kaspersky.co.za\/blog\/skype-trojan-steals-cpu-power\/\" target=\"_blank\" rel=\"noopener\">Trojans distributed via Skype<\/a>, <a href=\"http:\/\/www.securelist.com\/en\/blog\/208193084\/The_Miner_Botnet_Bitcoin_Mining_Goes_Peer_To_Peer\" target=\"_blank\" rel=\"noopener nofollow\">mining botnets<\/a> and <a href=\"http:\/\/www.securelist.com\/en\/blog\/559\/TDSS_Bitcoin\" target=\"_blank\" rel=\"noopener nofollow\">highly sophisticated threats<\/a> now including mining capabilities. But cybercriminal activity now goes beyond malware, offering illegal services and products on the deep web. Payment is mostly done through Bitcoin since it allows both ends to preserve their privacy while engaging in this type of <a href=\"http:\/\/www.ibtimes.co.uk\/bitcoin-virtual-currency-facilitating-cybercrime-hitman-network-513742\" target=\"_blank\" rel=\"noopener nofollow\">illegal activities<\/a>. Silk Road might be down but with so many sites appearing each day the cryptocurrency is going to stay in high demand for criminals and consumers alike.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/01\/06044831\/silkroad.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3520\" alt=\"silkroad\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/01\/06044831\/silkroad.png\" width=\"1256\" height=\"576\"><\/a><\/b><\/p>\n<p>After this brief overall view on the current Bitcoin currency and targeted malware state we can only infer that other cryptocurrencies such as Litecoin will follow <a href=\"https:\/\/medium.com\/bitcoin-bits-1\/30382f84fbdd\" target=\"_blank\" rel=\"noopener nofollow\">the trend<\/a> in the near future. With <a href=\"http:\/\/www.businessinsider.com\/satoshi-nakamoto-person-of-the-year-2013-12\" target=\"_blank\" rel=\"noopener nofollow\">Satoshi Nakamoto named the most impressive person of 2013<\/a> we can begin to gauge the importance of the cryptocurrency frenzy that has recently taken the Internet by surprise. If you want to take part of this world always remember to follow the <a href=\"https:\/\/www.kaspersky.co.za\/blog\/bitcoin-safety-guide\/\" target=\"_blank\" rel=\"noopener\">Bitcoin Safety Guide<\/a> and apply the same security principles as you would with any online transaction. Be smart. Be safe. Have fun!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile \u2014 and occasionally very high \u2014 price. Its potential for investors has made it a tempting<\/p>\n","protected":false},"author":313,"featured_media":3519,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[374,321],"class_list":{"0":"post-3518","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-bitcoin","9":"tag-technology"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/3518\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/2818\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/2711\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/3049\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/2900\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/3518\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/2373\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/everything-you-wanted-to-know-about-bitcoin-but-were-afraid-to-ask\/3518\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/bitcoin\/","name":"bitcoin"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/313"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=3518"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3518\/revisions"}],"predecessor-version":[{"id":26029,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3518\/revisions\/26029"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/3519"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=3518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=3518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=3518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}