Wintermute бузукулары кайра түзүлдү; 20-сентябрда эмне ката болгонун билебиз.

Hong Kong-based digital asset company Amber Group decoded the Wintermute hack that took place last month. The hack that occurred on 20 September caused the trading platform to lose approximately $160 million to the exploit. 

A little about the hack

As билдирди by AMBCrypto earlier, the hacker made away with more than $61 million in USD монетасы [USDC], 29.4 миллион доллар Тетер [USDT]Жана 671 капталган Bitcoin [wBTC] 13 миллион доллардан ашык суммага бааланган.

Several other altcoins worth millions of dollars were also a part of the stolen funds. The hacker gained funds spread across more than 90 altcoins.

Amber Group’s investigation 

Эмбер тобу managed to recreate the hack by cloning the algorithm that was reportedly used by the perpetrator. The process, according to Amber Group, was rather quick and didn’t involve the use of any sophisticated equipment. 

Recall that crypto influencer @K06a previously stated that a brute force attack on Wintermute’s “vanity address” could theoretically be possible in 50 days using 1,000 graphics processing units. A vanity address is usually easily identifiable and thus comparatively vulnerable.

Wintemute деген after the hack that Profanity, an Ethereum address generation tool, was used to generate several of its addresses which happened to contain several zeros in front (vanity address).

Amber Group put this theory to the test and иштелип чыккан on how they exploited the Profanity bug to recreate the hacker’s exploit. For their test hack, the group used an Apple Macbook M1 with 16 GB RAM to process datasets related to the hack. They were able to recreate the algorithm in less than 48 hours. The blog further added,

“The actual process, not counting the precomputation, took about 40 minutes for one address with seven leading zeros. We finished the implementation and were able to crack the private key of 0x0000000fe6a514a32abdcdfcc076c85243de899b in less than 48 hours.” 

Wintermute’s CEO Evgeny Gaevoy was not quite amused when Amber Group first revealed that it had successfully cloned the algorithm of the hack. Gaevoy responded to the news by жорум “classy” on Amber Group’s tweet. 

The Amber Group further stated,

“By reproducing hacks and exploits, we can build a better understanding of the attack surface spectrum across Web3. Better collective awareness of various patterns of hacks, flaws, and vulnerabilities hopefully contributes to a stronger and more attack-resistant future”

Amber Group emphasized the fact that addresses generated through Profanity were not secure and any funds linked with them were definitely unsafe. 

Source: https://ambcrypto.com/wintermute-hack-recreated-learn-what-went-wrong-on-20-sept/