Amber Group Apple MacBook аркылуу 48 сааттын ичинде Wintermute эксплуатациясын кайра чыгарат

After conducting an investigation into the recent 160 миллион доллар иштетилди of Wintermute, digital assets firm Amber Group мындай деди: it was able to repeat the full attack vector.

Amber said it recalculated the private key of the address that market-making firm Wintermute had used. It also кол a transaction from Wintermute’s hacked address and сол an on-chain message to prove its claim. 

In its analysis of the hack, Amber said that it took the firm only two days to crack the private key with the help of a MacBook M1 computer. To do this, the firm launched a brute force attack that extracted the seed phrase for Wintermute’s address

“We have reproduced the recent Wintermute hack. Figured out the algorithm to build the exploit. We were able to reproduce the private key on a MacBook M1 with 16G memory in <48h,” Amber Group белгиленген  in a tweet.

On Sept. 20, crypto market-making firm Wintermute was hacked for $160 million from its Ethereum vault. The vault relied on an admin address, which was targeted to extract the private key to move the funds.

Wintermute’s hacked admin account was a “vanity address,” a type of crypto address containing identifiable names or numbers within them — or which have a particular style — and can be generated using certain online tools including Profanity. Security analysts at 1inch табылган that private keys of vanity addresses generated with Profanity could be calculated by malicious hackers to steal funds.

Several days after the exploit of Wintermute, Amber decided to conduct its own investigation. The firm went on to determine that it too could extract the private key belonging to Wintermute’s vanity address and estimate the hardware and time requirements to crack the address generated by Profanity.

In its independent analysis, Amber explained that Profanity relied on a particular algorithm to generate large sets of public and private addresses that had certain desirable characters. The Profanity tool created millions of addresses per second and searched for the desired letters or digits that were requested by users as custom wallet addresses. Still, the process used to generate those addresses lacked randomness, and private keys could be reverse-calculated with GPUs.

“We figured out how Profanity divides the job on GPUs. Based on that, we can efficiently compute the private key of any public key generated by Profanity. We pre-compute a public key table, then do reverse computation until we find the public key in the table,” Amber Group said.

© 2022 The Block Crypto, Inc. Бардык укуктар корголгон. Бул макала маалыматтык максатта гана берилген. Ал юридикалык, салыктык, инвестициялык, каржылык же башка кеп-кеңеш катары колдонулбайт.

Source: https://www.theblock.co/post/174055/amber-group-reproduces-wintermute-exploit-in-48-hours-using-an-apple-macbook?utm_source=rss&utm_medium=rss