We have seen this a number of times. An unknown party finds his way inside the premise dressed up in a worker’s attire and has his eyes roaming around making sure no camera gets hold of his full face. He spots a camera on his way to his target, runs a Tech Cam App that turns it off. This means that it’s an inside job or a hacker at best. The guards on the CCTV find it suspicious and get authorization from the superior. The intruder enters a pass code to access the location of interest, finds the device he is to steal, hides it on himself where nobody would notice. And since he suspects there is already an alarm based on the camera that went offline, he goes into play. By the time the authority arrives, he makes a lie that he came to do a sweep of the camera system and found this one camera was offline. After security inspection, he is released and you guessed it, damage is done!
In relation to our scene, a node(camera) in the Blockchain is crippled in such a way that it can't talk to other nodes in the network. The node is isolated from the real network activity and access to the current ledger state. The malicious actor hijacks the connections, accesses the IP address, waits for the victim node to reconnect and takes the chance to control the victim’s connections. In Blockchain, this is called Eclipse Attack.
Thank you, my dear reader,
For taking the time to visit my digital hub where we dive into the Mobile and Blockchain spheres. Join me as we explore different encounters with technology.
Love & Light💚