<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic $10 Million stolen and Nobody noticed in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/10-Million-stolen-and-Nobody-noticed/m-p/74560#M7256</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Imagine an attack against Bitcoin, only to discover the criminals have been you to it.&amp;nbsp; Here is the story of how $10 million vanished without a trace.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, some background.&amp;nbsp; Bitcoin uses the Elliptic Curve Digital Signature Algorithm (ECDSA) for transaction security.&amp;nbsp; It is difficult to write a good ECDSA implementation because small mistakes can reveal your private key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ECDSA relies on nonces.which are random numbers used only once during a cryptographic operation.&amp;nbsp; Small weaknesses in your ECDSA nonces can be exploited to reverse-engineer your private key.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In 2023, researchers discovered a new flaw in ECDSA nonce generation related to weak random number generators.&amp;nbsp;&amp;nbsp; With this attack, dubbed Polynonce, tiny correlations between the random numbers in the nonces and the private key were exploited to break the private key.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Curious about the impact of the attack, the researchers downloaded the entire Bitcoin transaction history.&amp;nbsp; They discovered over 700 wallets that exhibited evidence of this weakness.&amp;nbsp; Here is the catch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The wallets were empty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Digging further into the transactions, they concluded at least $10 million was stolen because of this Polynonce weakness.&amp;nbsp; These thefts were unreported until that point, which everyone wonder how many other undiscovered attacks there are on weak randomness or other ECDSA vulnerabilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks to Duncan Jones for bringing this to our attention.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/" target="_blank"&gt;https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Everyone happy to keep using Bitcoin and other cryptocurrency systems?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Tue, 15 Oct 2024 19:35:04 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-10-15T19:35:04Z</dc:date>
    <item>
      <title>$10 Million stolen and Nobody noticed</title>
      <link>https://community.isc2.org/t5/Industry-News/10-Million-stolen-and-Nobody-noticed/m-p/74560#M7256</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Imagine an attack against Bitcoin, only to discover the criminals have been you to it.&amp;nbsp; Here is the story of how $10 million vanished without a trace.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, some background.&amp;nbsp; Bitcoin uses the Elliptic Curve Digital Signature Algorithm (ECDSA) for transaction security.&amp;nbsp; It is difficult to write a good ECDSA implementation because small mistakes can reveal your private key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ECDSA relies on nonces.which are random numbers used only once during a cryptographic operation.&amp;nbsp; Small weaknesses in your ECDSA nonces can be exploited to reverse-engineer your private key.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In 2023, researchers discovered a new flaw in ECDSA nonce generation related to weak random number generators.&amp;nbsp;&amp;nbsp; With this attack, dubbed Polynonce, tiny correlations between the random numbers in the nonces and the private key were exploited to break the private key.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Curious about the impact of the attack, the researchers downloaded the entire Bitcoin transaction history.&amp;nbsp; They discovered over 700 wallets that exhibited evidence of this weakness.&amp;nbsp; Here is the catch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The wallets were empty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Digging further into the transactions, they concluded at least $10 million was stolen because of this Polynonce weakness.&amp;nbsp; These thefts were unreported until that point, which everyone wonder how many other undiscovered attacks there are on weak randomness or other ECDSA vulnerabilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks to Duncan Jones for bringing this to our attention.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/" target="_blank"&gt;https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Everyone happy to keep using Bitcoin and other cryptocurrency systems?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 19:35:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/10-Million-stolen-and-Nobody-noticed/m-p/74560#M7256</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-10-15T19:35:04Z</dc:date>
    </item>
  </channel>
</rss>

