Review Article

Cybersecurity Challenges in Blockchain Technology: A Scoping Review

Table 1

Classification of cybersecurity attacks in BCT.

Classification of cybersecurity challenges in BCTThemes identifiedLiterature references from sample research studies

Malleability attacksNetwork hacks[16, 11, 1719, 2555]
Server breaches
Cloud platform hacks
Illegal transactions
Tracking issues
Changing system parameters
Lacking computation efficiency
Censorship and criminal attacks
Proof of authority (POA attacks)
Wiretapping
Denial of service (DoS attacks)
Distributed denial of service (DDoS attacks)
Man in the middle (MitM) or Sybil attack
Double-spending attacksSelfish mining[4, 1719, 26, 39, 42, 46, 47, 49, 56, 57]
Stolen cryptocurrency
Race attacks
51% attacksControlling network’s mining hash rate[4, 1719, 26, 28, 35, 39, 4649, 55, 56, 5860]
Goldfinger
Wallet security attacksHacking user passwords and software bugs[2, 4, 18, 19, 26, 27, 32, 34, 35, 40, 43, 46, 51, 52, 56, 61, 62]
Phishing
Private key security attacks
Information stealing, date breaches, and losses
Information manipulation and authentication issues
Smart contract loophole attacksPoor access management on smart contract[2, 4, 18, 19, 2931, 39, 40, 42, 47, 48, 51, 54, 57, 63]
Smart contract code error/application vulnerability
Smart contract manipulation and flaws
Code-based attacks
System error attacksLack of integration and maintenance systems[1, 5, 6, 2628, 37, 43, 60, 6365]
Interoperability issues
Delays in time-sensitive transactions