Cryptanalysis

Milk Sad vulnerability in the Libbitcoin Explorer 3.x library, how the theft of $900,000 from Bitcoin Wallet (BTC) users was carried out

Slowmist researchers conduct regular research into the security of the Bitcoin blockchain . They disclosed a vulnerability in the Libbitcoin Explorer 3.x library , which allowed attackers to steal more $ 900 000 from Bitcoin Wallets ( BTC ) users. According to analysts, this vulnerability may also affect users  Ethereum, Ripple, Dogecoin, Solana, Litecoin, Bitcoin Cash и Zcash,who use it Libbitcoin to create accounts. Researchers gave the code name for this vulnerability " Milk Sad " Было…

How to find a private key in binary code from Bitcoin Lightning Wallet Vulnerability in Quasar Framework

In this article, we will focus on a smartphone application iOS and Android the popular Bitcoin Wallet that supports fast payments through (Lightning network) BLW: Bitcoin Lightning Wallet . Unfortunately, many autonomous nodes of the open source mobile application from LNbits Node Manager and Core Lightning are exposed to a HIGH RISK of losing all funds in various cryptocurrency coins. Developer David Shares from the Japanese company Bitcoin Portal has published many documents .…

ShellShock Attack vulnerability on “Bitcoin” & “Ethereum” server discovered in GNU Bash cryptocurrency exchange

In this article we will look at a series of web server software vulnerabilities discovered in the  GNU Bash program  . Many Internet services , including Bitcoin blockchain web servers, use Bash to process some requests, for example when executing  CGI scripts . The vulnerability allows an attacker to execute arbitrary commands by gaining unauthorized access to computer systems, which allows the attacker to extract private…

Phenomenon from Blockchain Cryptocurrency Solidity Vulnerable Honeypots

Following the article: “Solidity Forcibly Send Ether Vulnerability to a Smart Contract continuation of the list of general EcoSystem security from attacks”. In this article, we will continue this topic related to vulnerabilities and traps. In the process of cryptanalysis of various cryptocurrencies, we are increasingly getting loopholes and backdoors. Honeypots work by luring attackers with a balance stored…

Solidity Forcibly Send Ether Vulnerability to a Smart Contract continuation of the list of general EcoSystem security from attacks

Earlier we touched on the topic: "Improving the overall security of the ecosystem from attacks on smart contracts". In this article, we will continue to develop this painful topic of ecosystem security. Occasionally, it is unwanted for users to be able to send Ether to a smart contract. Unfortunately for these circumstances, it's possible to bypass a…

ChatGPT as artificial intelligence gives us great opportunities in the security and protection of the Bitcoin cryptocurrency from various attacks

Bitcoin is an example of a decentralized network. There are no people or organizations that control it. This is part of its architecture. For many, the creation of Bitcoin Cash under the pretext that blocks with more memory would be beneficial is seen by most of the community as an example of an attack on decentralization. dependency on the stakeholder network…

LATTICE ATTACK 249bits we solve the problem of hidden numbers using 79 signatures ECDSA

In our earliest work, we published an article on the topic “LATTICE ATTACK” as a complete solution to the HNP [Hidden Number Problem] , but with the recent emergence of a new attack “POLYNONCE ATTACK” , we decided to supplement the article using 79 signatures ECDSA. Based on the previous article, where we took the polynomial 128 bitsand with the actual increase in the number…

POLYNONCE ATTACK we use BITCOIN signatures as a Polynomial to an arbitrarily high power of 128 bits to get a Private Key

In this article, we will again touch on the topic: “Bitcoin’s Critical Vulnerability” and use the brand new attack of 2023 “POLYNONCE ATTACK” on all three examples . The very first mention of this attack is described in an article from “Kudelski Security” . https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/ As a practical basis, we will take materials from our earlier article “ Speed ​​up secp256k1 with endomorphism” where the values ​​​​on…

Install SageMath in Google Colab

In this article, we will do a fresh install SageMathin Google Colab. We previously published an article: “ Install SageMath for cryptanalysis on Fedora 64bit(10GB) Cloud Virtual Server ”, but in order to continue cryptanalysis of the Bitcoin blockchain, many of our readers prefer to use Debian and, Ubuntuin contrast to Fedora. As far as we know, Google Colab it has been updated to "Ubuntu 20.04.5 LTS". We…