The dark side of the metaverse

Photo: Adobe Stock

There is a lot of excitement surrounding the Metaverse. Optimism is everywhere, mainly due to the prospect that the economy in this new virtual world has significant prospects of becoming much larger than that of the physical world. And the numbers really excite everyone. In the Metaverse, the value of e-commerce could reach, according to McKinsey, a staggering $2 to $2.6 trillion by 2030.

However, the fascination that follows the Metaverse goes hand in hand with serious concerns. The new digital economy, which encourages creativity and business opportunities, also opens loopholes for those who consider manipulating the market, laundering money and designing pump and dump schemes (a form of fraud to artificially inflate prices through rumors or news). false). And all this will be difficult to investigate and process.

Just as the Internet spawned the Dark Web, the Metaverse will also have its own illegal marketplaces for cybercriminals to communicate and engage in malicious activities. The threats are numerous, and some are unprecedented. Because, by its very nature, the Metaverse represents an unprecedented digital and physical attack surface.

The amount of data is astronomical

The amount of data this environment can handle is incredible, ranging from travel history, gaming and shopping preferences, to credit card numbers, social security numbers, phone numbers, transactions, dates of birth and passwords. Platforms will collect data at high speed, with the goal of monetizing through personalized advertising.

And arguing against such overexposure will not be easy. After all, if body tracking allowed the creation of a user avatar, for example, how do you combat other broad forms of data collection? With all this data recorded and potentially available to attackers, new forms of attacks, such as deepfakes, are entering the agenda and making it difficult to know who to trust.

More risk than you can imagine

The list of risks does not end there. Access to the Metaverse requires the user to acquire a set of plugins and specialized hardware to establish connections between the real and virtual worlds.

These new accessories may contain a number of sensors capable of storing user data, without providing the necessary security to ensure that this data is not misused. If we think about hardware risks, perhaps the biggest ones are VR headsets, devices that are expected to become as essential to people’s lives as smartphones are today.

VR headsets are vulnerable to hackers, as it is already known that they can be used to record subtle facial dynamics associated with speech and thereby steal confidential information communicated by voice command.

There are other sources of concern. Like NFTs, there are threats from identity theft, kidnapping for ransom, fraud, and attacks that involve the creation of multiple identities, allowing an attacker to take control of verifying a transaction.

Additionally, the Metaverse favors criminal recruitment. The web has been the foundation of this type of recruitment for all forms of modern extremism in recent years, and the Metaverse is likely to make the problem worse. Because it is even easier to make appointments with him.

Technology for good and evil

So far we haven’t invented technology that doesn’t have the potential for good and evil. Metaverse will certainly not be an exception. However, none of these risks should be a reason to run away from there. What is needed? Continue to develop the level of cybersecurity maturity and expand the use of traditional protection tools for technologies that are somehow related to the Metaverse.

We are probably still a few years away from these threats becoming a serious problem for society. On the other hand, it also means that we have a few years to lay the foundations and ensure that the platform does not become a force for criminals. The work must start immediately.

Allan Costa is the vice president of ISH Tecnologia.+

The best content in your email for free. Choose your favorite Terra Newsletter. Click here!

Leave a Reply

Your email address will not be published. Required fields are marked *