Full list of cryptocurrency exchange hacks [ 2011 – 2022 ]

In this article, we will compile a complete list of cryptocurrency exchange hacks, starting with the most recent major hack of the Binance exchange , where hackers stole tokens BNBtotaling $ 570 million, and ending with the Mt. Gox, which during the period from 2010 по февраль 2014 годовwas the world's largest cryptocurrency exchange Bitcoinand serviced 80%transactions. This whole cyclic process of hacks is due to user data leaks . Cryptocurrency…

How to Get a Private Key to a Bitcoin Wallet Using a Signature Fault (Rowhammer Attack on Bitcoin)

The biggest cryptographic strength of the Bitcoin cryptocurrency is a computational method in discrete mathematics that takes the problem of factorization of large integers and the problem of hidden numbers (HNP)in the Bitcoin signature transaction as a basis ECDSA.In this article, we will apply Signature Fault Differential Analysis ECDSAand derive a private key from a transaction for five different Bitcoin Wallets.Rowhammer Attack…

Historical background regarding Bitcoin Wallet Hacks

On the web, you can find a lot of controversy regarding the hacking of Bitcoin Wallets. The result of the discussion is the selection of two main ways: by gaining access to the PC of cryptocurrency owners and through the selection of private keys (с помощью личных данных пользователя). Bitcoin and other cryptocurrencies traditionally attract increased attention хакеров of various calibers,…

Implement Frey-Rück Attack to get the secret key “K” (NONCE)

In this article, we implement an efficient Frey-Rück Attack algorithm for signing ECDSAa transaction on the Bitcoin blockchain. In our earlier posts, we touched on the topic of signature vulnerability several times ECDSA. With a critical vulnerability in the Bitcoin blockchain transaction, we can solve the rather difficult discrete logarithm problem to extract the ECDSA secret key"K" (NONCE) from the vulnerable signature in order to ultimately…

Tesla BrainWallet traps from Bitcoin wallets beware of phishing and popular passphrases

There are many forms to create a Bitcoin wallet. One of the first methods to create a Bitcoin wallet was known as  BrainWallet .BrainWallet convenient in the sense that it allows you to store in memory or in a notebook  " passphrase " . The passphrase is hashed using an algorithm  SHA-256, and is used as the seed to generate the  private key . Due to their popularity and…

Coingecko & Agent Ftpupload create beautiful crypto wallet addresses, but keep the private key safe

Over the years, a whole cult has formed in the crypto community to create beautiful addresses for crypto wallets. Everyone can generate a "beautiful" address for themselves, which will not only be unique, but will also contain a certain combination of letters and numbers. This is a very exciting and interesting process, but the risk associated with involving a…

Cryptocurrency of Bitcoin against QIANSHI quantum computer from Chinese search engine giant Baidu Inc.

In pursuit of qubits,  Baidu Inc  , as the leader among Chinese search engines, does not lag behind its Western competitor  Alphabet Inc. In August 2022, Chinese search engine giant Baidu Inc developed its own quantum computer, soon dubbed "Qianshi". All super-powerful computers use quantum physics to solve complex problems that traditional devices cannot, using qubits, an evolution of the classic…

MrRobotQR scan QR codes from search engines in search of private keys of Bitcoin Wallets

We all know the phrase:  "Everything that gets on the Internet, remains in it forever and becomes publicly available." Down to hidden content. The  2021 году pandemic brought back popularity  QR-кодов. For  the first time QR-коды they were used in production in  1994 году a subsidiary  Toyota in Japan and introduced them at an assembly plant to control produced cars and parts for them. Unlike a barcode,  QR-код it contains more…

Bitcoin Wallet Recovery via ECDSA Short Signatures

We all know that the disclosure of the secret key in the ECDSA signature can lead to the complete recovery of the Bitcoin Wallet. In our earlier articles, we looked at weaknesses and vulnerabilities in blockchain transactions, but there are also ECDSA short signatures that also lead to the full recovery of a Bitcoin Wallet. Why are these ECDSA signatures…

Reducing the private key through scalar multiplication using the ECPy + Google Colab library

In this article, we will try to show how you can reduce the private key knowing only the leak from the "BLOCKCHAIN ​​FOLBIT LEAKS" list and the public key from "UTXO" . In the experimental part, we will use the 08ReducePrivateKey scripts and restore the Bitcoin Wallet. Elliptic curve scalar multiplication is the operation of adding a pointPto the curvektimes. Q=kP=P+P+P, k times Pis a…