Cryptanalysis

Useful tools and services for finding vulnerabilities in a transaction to assess the risk of blockchain and various cryptocurrencies

In this article, we have compiled a list of useful tools and services for tracking illegal activities, crypto threats, and finding vulnerabilities in blockchain transactions. Most of the services include a comprehensive hack monitoring platform and process algorithm for the security of crypto wallets. In cryptanalysis, the control and analysis of transactions is always important to us. These services are…

DeFi Attacks & Exploits all the biggest cryptocurrency thefts from 2021 to 2022

In this article, we will tell you about the most daring and biggest thefts of cryptocurrencies associated with платформой DeFi. Hackers had a big year in 2021 when they stole $3.2 billion worth of cryptocurrencies. But in 2022, the amount of theft of cryptocurrencies reached a historical maximum. In the first three months of this year, hackers have stolen $1.3 billion from…

Cross-Chain Bridges as the value of the Blockchain becomes attractive for various attacks

This article will focus on a vulnerability in inter-network bridge protocols, which is a big security threat to smart contracts between different blockchains. Cross bridges are an attractive target for hackers because they often represent a central storage point for the funds that support the "bridge" assets on the receiving blockchain. What are Internet Bridge Protocols? Bridges…

All known physical attacks on Bitcoin and other cryptocurrencies from 2014 to 2022

This article will focus on the physical security of our cryptocurrencies. We have been engaged in cryptanalysis for a long time and decided to collect all known physical attacks on Bitcoin that occurred during the period from 2014 to 2022. DateVictimLocationDescriptionDecember 29, 2014Hal FinneySanta Barbara , CaliforniaBitcoin developer SWATted after months of harrassment & extortion January 3,…

We implement WhiteBox Attack on Bitcoin with differential errors according to the research scheme of Eli Biham and Adi Shamir to extract the secret key

In this article, we will again touch on the topic of a signature failure in a blockchain transaction and apply a completely new attack: “WhiteBox Attack on Bitcoin” .Differential fault analysis (DFA)was briefly described in the literature in 1996 when an Israeli cryptographer and cryptanalyst Eli Biham and an Israeli scientist Adi Shamir showed that they could use error injection to extract the secret key and recover the private…

Full list of cryptocurrency exchange hacks [ 2011 – 2022 ]

In this article, we will compile a complete list of cryptocurrency exchange hacks, starting with the most recent major hack of the Binance exchange , where hackers stole tokens BNBtotaling $ 570 million, and ending with the Mt. Gox, which during the period from 2010 по февраль 2014 годовwas the world's largest cryptocurrency exchange Bitcoinand serviced 80%transactions. This whole cyclic process of hacks is due to user data leaks . Cryptocurrency…

How to Get a Private Key to a Bitcoin Wallet Using a Signature Fault (Rowhammer Attack on Bitcoin)

The biggest cryptographic strength of the Bitcoin cryptocurrency is a computational method in discrete mathematics that takes the problem of factorization of large integers and the problem of hidden numbers (HNP)in the Bitcoin signature transaction as a basis ECDSA.In this article, we will apply Signature Fault Differential Analysis ECDSAand derive a private key from a transaction for five different Bitcoin Wallets.Rowhammer Attack…

Historical background regarding Bitcoin Wallet Hacks

On the web, you can find a lot of controversy regarding the hacking of Bitcoin Wallets. The result of the discussion is the selection of two main ways: by gaining access to the PC of cryptocurrency owners and through the selection of private keys (с помощью личных данных пользователя). Bitcoin and other cryptocurrencies traditionally attract increased attention хакеров of various calibers,…

Implement Frey-Rück Attack to get the secret key “K” (NONCE)

In this article, we implement an efficient Frey-Rück Attack algorithm for signing ECDSAa transaction on the Bitcoin blockchain. In our earlier posts, we touched on the topic of signature vulnerability several times ECDSA. With a critical vulnerability in the Bitcoin blockchain transaction, we can solve the rather difficult discrete logarithm problem to extract the ECDSA secret key"K" (NONCE) from the vulnerable signature in order to ultimately…