Exploit in the cryptocurrency mining code that used a dangerous Log4j vulnerability CVE-2021-44228

Background on Log4j Alibaba Cloud Security Team publicly disclosed a critical vulnerability (CVE-2021-44228) enabling unauthenticated remote code execution against multiple versions of Apache Log4j2 (Log4Shell). Vulnerable servers can be exploited by attackers connecting via any protocol such as HTTPS and sending a specially crafted string. Log4j crypto-mining campaign Darktrace detected crypto-mining on multiple customer deployments which occurred…

Twist Attack example №1 perform a series of ECC operations to get the value of Private Key to the Bitcoin Wallet

Not so long ago, the elliptic (6.5.4) package for standard elliptic curves was vulnerable to various attacks , one of which is the Twist Attack . The cryptographic problem was in the implementation of secp256k1. We know that the Bitcoin cryptocurrency uses secp256k1 and this attack did not bypass Bitcoin, according to the CVE-2020-28498 vulnerability, the confirming parties of the ECDSA algorithm transaction through certain points on the secp256k1…

Cold Wallets and Hot Wallets how to find vulnerabilities and eliminate various attacks on the Blockchain

In the last article: “Blockchain Attack Vectors & Vulnerabilities to Smart Contracts” we reviewed all known attacks on the blockchain, in this article we will talk about crypto threats again and we will talk about identifying vulnerabilities for Cold wallets, as well as for Hot wallets. Blockchain is the underlying tech layer made up of a decentralized…

Blockchain Attack Vectors & Vulnerabilities to Smart Contracts

</p> In this article, we will talk about all known attacks on the blockchain, as well as smart contract vulnerabilities. Blockchain isn't really as secure as we tend to think. Though security is integrated throughout all blockchain technology, even the strongest blockchains come under attack by modern cybercriminals. Blockchains can resist traditional cyber attacks quite well, but…

Useful tools and services for finding vulnerabilities in a transaction to assess the risk of blockchain and various cryptocurrencies

In this article, we have compiled a list of useful tools and services for tracking illegal activities, crypto threats, and finding vulnerabilities in blockchain transactions. Most of the services include a comprehensive hack monitoring platform and process algorithm for the security of crypto wallets. In cryptanalysis, the control and analysis of transactions is always important to us. These services are…

DeFi Attacks & Exploits all the biggest cryptocurrency thefts from 2021 to 2022

In this article, we will tell you about the most daring and biggest thefts of cryptocurrencies associated with платформой DeFi. Hackers had a big year in 2021 when they stole $3.2 billion worth of cryptocurrencies. But in 2022, the amount of theft of cryptocurrencies reached a historical maximum. In the first three months of this year, hackers have stolen $1.3 billion from…

Cross-Chain Bridges as the value of the Blockchain becomes attractive for various attacks

This article will focus on a vulnerability in inter-network bridge protocols, which is a big security threat to smart contracts between different blockchains. Cross bridges are an attractive target for hackers because they often represent a central storage point for the funds that support the "bridge" assets on the receiving blockchain. What are Internet Bridge Protocols? Bridges…

We implement WhiteBox Attack on Bitcoin with differential errors according to the research scheme of Eli Biham and Adi Shamir to extract the secret key

In this article, we will again touch on the topic of a signature failure in a blockchain transaction and apply a completely new attack: “WhiteBox Attack on Bitcoin” .Differential fault analysis (DFA)was briefly described in the literature in 1996 when an Israeli cryptographer and cryptanalyst Eli Biham and an Israeli scientist Adi Shamir showed that they could use error injection to extract the secret key and recover the private…