This site is reader-supported. When you click through links on our site, we may be compensated.
<header class="article__header"> </header> <strong>On April 23, the security consulting firm Independent Security Evaluators (ISE) published a document concerning a number of unsound public and private key pairs tied to the Ethereum blockchain. The probability of chance needed to crack 256-bit encryption would take years for hackers to access random private keys. However, ISE recently queried 49,060 ETH transactions which found 732 “weak” public keys, essentially revealing the corresponding private keys.</strong>
732 Private Keys and Discovering the Blockchain Bandit
An independent security consulting firm headquartered in Baltimore, Maryland has recently released a new study concerning “weak keys” found on the Ethereum blockchain. The researchers ISE detail that this trend could be detected on any blockchain implementation that uses public key signing based on ECDSA encryption. According to ISE they devised a scheme that can discover private keys that were generated by using either faulty code or defective random number generators (RNG), and a combination of both.
While studying the matter, ISE found an individual or group they dubbed ‘Blockchain Bandit’ who has been pilfering these weak key addresses. ISE claims Blockchain Bandit managed to steal 37,926 ETH valued at $54.3 million by January 13, 2018.
“Even when faced with this statistical improbability, ISE discovered 732 private keys as well as their corresponding public keys that committed 49,060 transactions to the Ethereum blockchain,” explains the study. “Additionally, we identified 13,319 Ethereum that was transferred to either invalid destination addresses, or wallets derived from weak keys that at the height of the Ethereum market had a combined total value of $18,899,969.”
Highly Successful Hacking Campaigns
In addition to the 732 key pairs found, there were 60,286,012 ERC20 based tokens held within these keys. ISE says with 50 million public Ethereum addresses there’s likely to be some weak keys found or a general lack of randomness. One of the biggest would be key truncation which is when the key length of the symmetric 256-bit encryption is generated but only a small subset is used due to errors. All kinds of errors can exist like type confusion, random device or RNG errors, seed re-use, memory reference errors, memory corruption, code logic errors and entropy errors. While querying another region of key space on the chain, the researchers discovered more vulnerable key pairs.
“Scanning this region of the key space yielded 8,920 transactions through 464 private keys,” the ISE paper details. “The total value of transactions using these weak private keys was 28.9456 Ethereum — While transactions are common in this range, there is currently a balance of 0 ETH.”
The ISE paper underscores that the use of weak private key pairs is not a “widespread problem” and it took the researchers 1024 hours total to complete the task. But the researchers note that any similar cryptographic algorithms can be examined for key generation errors which would include networks like BTC, ZEC, XRP, XMR and others. Because these cryptocurrencies are so popular, ISE can envision “highly successful hacking campaigns ongoing to steal these virtual currencies.” If the cryptocurrency network effect continues to grow, ISE stresses that software developers who build infrastructure need to incorporate every defense mechanism available to keep private keys safe. Innovative measures need to be taken to counter successful attackers like Blockchain Bandit and future hacking attempts.
What do you think about the private keys found by ISE due to errors and weak key pairs? Let us know what you think about this subject in the comments section below.
Image credits: Shutterstock, Independent Security Evaluators (ISE), and Pixabay.
Have you tried the open source, noncustodial Bitcoin.com Wallet? Try it today over 3.9 million wallets created so far!
<div class="article__body__share-story"> <h6 class="article__body__tags-related__title"> Share this story: </h6> </div> <div class="article__body__tags-related"> <div class="article__body__tags-related__tags"> <h6 class="article__body__tags-related__title"> Tags in this story </h6> <div class="article__body__tags"> <a href="https://news.bitcoin.com/tag/256-bit/">256-bit</a>, <a href="https://news.bitcoin.com/tag/732-private-keys/">732 private keys</a>, <a href="https://news.bitcoin.com/tag/bitcoin/">Bitcoin</a>, <a href="https://news.bitcoin.com/tag/blockchain-bandit/">Blockchain Bandit</a>, <a href="https://news.bitcoin.com/tag/blockchain-querie/">Blockchain Querie</a>, <a href="https://news.bitcoin.com/tag/entropy/">Entropy</a>, <a href="https://news.bitcoin.com/tag/erc20s/">ERC20s</a>, <a href="https://news.bitcoin.com/tag/eth/">ETH</a>, <a href="https://news.bitcoin.com/tag/ethereum/">Ethereum</a>, <a href="https://news.bitcoin.com/tag/faulty-code/">faulty code</a>, <a href="https://news.bitcoin.com/tag/hackers/">Hackers</a>, <a href="https://news.bitcoin.com/tag/independent-security-evaluators/">Independent Security Evaluators</a>, <a href="https://news.bitcoin.com/tag/ise/">ISE</a>, <a href="https://news.bitcoin.com/tag/private-keys/">private keys</a>, <a href="https://news.bitcoin.com/tag/public-keys/">Public Keys</a>, <a href="https://news.bitcoin.com/tag/random-key-generation/">Random Key Generation</a>, <a href="https://news.bitcoin.com/tag/rng/">RNG</a>, <a href="https://news.bitcoin.com/tag/safety/">safety</a>, <a href="https://news.bitcoin.com/tag/security/">Security</a>, <a href="https://news.bitcoin.com/tag/smart-contracts/">Smart Contracts</a>, <a href="https://news.bitcoin.com/tag/successful-hacking-attacks/">Successful Hacking Attacks</a>, <a href="https://news.bitcoin.com/tag/weak-keys/">weak keys</a> </div> </div> </div> <div class="article__body__author" readability="33.5"> <div class="article__body__author__avatar"> <img class="avatar avatar-115 photo" width="64" height="64" src="http://www.scoreit.online/wp-content/uploads/2019/04/2Khomers-42.jpg"> </div> <div class="article__body__author__info" readability="37"> <h6 class="article__body__author__info__name"> Jamie Redman </h6> <p class="article__body__author__info__about"> Jamie Redman is a financial tech journalist living in Florida. Redman has been an active member of the cryptocurrency community since 2011. He has a passion for Bitcoin, open source code, and decentralized applications. Redman has written thousands of articles for news.Bitcoin.com about the disruptive protocols emerging today.<br></p> </div> </div>