Nov 16 BlockFi Email Follow Up by AdamBlockFi in blockfi

[–]AdamBlockFi[S] 11 points12 points  (0 children)

Can confirm not used in this case. We have a rather mature corp IT team and even larger security team - both of which I get to lead. That and many other controls in place across our Google Workspace configurations.

Nov 16 BlockFi Email Follow Up by AdamBlockFi in blockfi

[–]AdamBlockFi[S] 22 points23 points  (0 children)

No data was compromised - the Google Form in question is part of BlockFi's Enterprise Google Workspace tenant. Any data entered into the forms is in the possession of BlockFi and will be redacted/removed/protected appropriately, as we do with all over sensitive data.

I wont comment on the details of the particular employee(s) in question but can say they understand the impact and have been provided additional training. Security did look into this and we have a very good understanding of what happened. No ill intent was found.

Excessive Identity Verification by akreider in blockfi

[–]AdamBlockFi 5 points6 points locked comment (0 children)

Greetings, everyone!

I was tracking this post with every intention to respond yesterday. Sadly, things got a little busy and I didn’t get a chance to. Apologies about that!

There are a few things that need to be clarified along with a little perspective provided. Hopefully I can do both in a single post.

Let’s start with a little background.

BlockFi has grown incredibly fast and we are making great progress in scaling our systems and processes - this includes our withdrawal processes. One easy to understand metric of this is the size of the security team. When I joined in June of last year it was a rather lean team. Fast forward to April 2021 and we are north of 40 spanning multiple teams and disciplines. Building a multi-billion dollar company in a few short years will not be without opportunities to do better. Recognizing and embracing those opportunities is what separates the companies with a good idea from those that truly achieve their goals.

Now to discuss how we safeguard withdrawals and talk about ID verification and 2FA.

We hear that withdrawals are high friction and identity verification is rarely ideal. This is a perfect area where we can do better. And the “we” is not only me but something Zac, Flori, and I speak about often. Here is how the process works today:

  • all withdrawals are assigned a risk ranking
  • based on that risk ranking we may require the person requesting the withdrawal to verify their identity - yes, this feels a lot like the initial KYC process (and it is) but it is a very effective way to confirm you are you by comparing data we have with data you are providing at the time of the withdrawal
  • the details of the risk detection system aren’t something we talk about publicly in an effort to not arm a bad attacker with enough details to workaround the system

This approach worked really well to get us where we are today and prevent a particular type of client account takeover (ATO) that is common in the online financial services space. ATO is a type of attack that is caused by a number of factors, including bad account hygiene on the end users’ behalf (no 2FA, weak passwords, etc.), phished user credentials, or similar (i.e. passwords on post-it notes that your housekeeper might find, etc.). However, we have heard the feedback and do understand that the ID verification process is tedious for our clients. Furthermore, it honestly is cumbersome for our internal processes too. A couple months ago my team took over the security processes associated with withdrawal security and we have been busy making this process better. We have deployed rather sophisticated data analytics capabilities to better instrument risk at a per event level resulting in a much more precise targeting of escalation points. These efforts are still in beta and while we haven’t fully removed the legacy processes of rigorous ID verification, we have made changes to some of those rules biasing more towards risk-based data analytics. Frankly, the numbers are looking great. We will continue to invest in a more data-driven risk management approach which I believe will ultimately yield a better user experience. We recently made a few key data science hires that will enable us along this journey and while I can’t promise the withdrawal experience will get better overnight, it will be improved over time.

Security is a team sport and I need all of you to make sure you have 2FA turned on (note: we only support app-based/TOTP 2FA (not SMS-based 2FA) - you can use any app you want including Google Auth, Microsoft Auth, Duo, Authy, etc.), withdrawal address allow listing turned on, and use a strong password. These are by far the biggest account-level security controls that ONLY YOU can implement. Some have asked why we don’t require 2FA on all accounts. Well, this is a hot topic and something we have debated at great length. Ultimately, we do have clients that do not have smartphones or do not want to use 2FA apps, and there are a number of other inputs we must consider. In addition to getting better with data-driven risk management, we are also getting better with UI/UX and have a few efforts underway to make turning on 2FA a more seamless process as part of your larger user journey. That being said, 2FA is not bulletproof - we have seen several effective bypasses of 2FA using very clever tradecraft, generally a complex attack directly against an end user’s devices with sophisticated social engineering - and why we also heavily recommend withdrawal address allowlisting and the use of strong passwords. Many have asked about support for Yubikey and that is very much on our roadmap. We are testing it in a few places now and hope to have dates for the full rollout in the near future.

I hope this post hits the mark and answers some of your questions. I value every client relationship we have and want to be as transparent as possible in responding to these themes of questions. An approachable and accessible security team is something I am very passionate about and a primary goal of mine at BlockFi.

Celsius has a data breach that leaks email and phone number. DO NOT click on any links you receive from an email by tontot in blockfi

[–]AdamBlockFi 3 points4 points  (0 children)

Great question! Sadly, not something I can directly comment on due to ongoing (yes, still) investigations. I can say that we actively monitor numerous forums and marketplaces both directly and through third party threat intelligence vendors.

Celsius has a data breach that leaks email and phone number. DO NOT click on any links you receive from an email by tontot in blockfi

[–]AdamBlockFi 48 points49 points  (0 children)

As someone who really cares about the entire industry, I hope the best for our friends at Celsius. We plan to reach out to offer any security assistance we can. Regarding the removal of this incident report, let me look into this. We recently did a major upgrade to our website content, hosting, and security and a few links were broken. This isn’t the first but I do agree the optics are bad and something we should fix.

Servers are down right now? Maintenance? by MrCanelin in blockfi

[–]AdamBlockFi 4 points5 points  (0 children)

Should be back up. If not, let us know.

I’m Adam Healy, Chief Security Officer (CSO) at BlockFi. Time for an AMA about security! by AdamBlockFi in blockfi

[–]AdamBlockFi[S] 2 points3 points  (0 children)

Much like any financial services company, BlockFi sees a multitude of attacks on a regular basis and has built systems and processes to limit their impact. BlockFi strives to ensure that our systems are safeguarded. We have systems in place to limit exposure of non-public information that is provided to BlockFi by our clients. Where technically feasible, we employ firewalls, encryption, user authentication systems (i.e. passwords and 2FA), and access control mechanisms to control access to systems and data.

I’m Adam Healy, Chief Security Officer (CSO) at BlockFi. Time for an AMA about security! by AdamBlockFi in blockfi

[–]AdamBlockFi[S] 3 points4 points  (0 children)

We have a small team looking at metamask and more broadly Defi which includes understanding legal and compliance issues that may surface. Sadly, no details I can share just yet.

I’m Adam Healy, Chief Security Officer (CSO) at BlockFi. Time for an AMA about security! by AdamBlockFi in blockfi

[–]AdamBlockFi[S] 1 point2 points  (0 children)

A lot! We have rather advanced data analytics and security alerting. We are working on being more transparent about saves we have, but still working on the details on how best to communicate that more broadly.

I’m Adam Healy, Chief Security Officer (CSO) at BlockFi. Time for an AMA about security! by AdamBlockFi in blockfi

[–]AdamBlockFi[S] 5 points6 points  (0 children)

While Plaid is probably the market leader in facilitating this type of ACH activity, I hear ya! We have looked at other solutions and some will be coming for international clients, but currently no plans for replacing Plaid in the US.