Security experts said they have unveiled a number of vulnerabilities in the open-source libraries used by numerous crypto exchanges and financial institutions – which could be exploited by hackers looking for a way into users’ wallets.
At a recent Black Hat cybersecurity conference, experts said that some of the issues that affected exchanges have now been fixed – but claimed that others still pose a threat to their owners.
Jean-Philippe Aumasson, the co-founder of crypto exchange technology firm Taurus Group and Vice President at Kudelski Security, made note of the vulnerabilities, which were discovered by Omer Shlomovits, co-founder of mobile wallet maker ZenGo, into three categories of attacks, reported Wired.
The first type of attack requires hackers to use an insider at one of the exchanges to exploit a vulnerability in an open-source library made by a leading exchange that the researchers chose not to name.
By using a flaw in the library’s mechanism for refreshing keys, hackers could manipulate the process to change key components – while leaving all other components intact. As a result, the attackers could prevent the exchange from accessing crypto on its own platform.
The researchers informed the library developer of the bug’s existence one week after the code went live. But, since it was found in an open-source library, it is possible that other exchanges may still be using it in their operations.
The second scenario involves hackers exploiting a flaw in the key rotation process. Here, a failure in the validation of all of the statements that users and exchanges make to each other could allow a rogue exchange to extract its users’ private keys over multiple key refreshes, seizing control of their crypto assets.
Again, the bug was found in an open-source library developed by a major management firm whose name was not disclosed by the researchers.
The third category of attacks could occur when trusted parties originally derive their segments of a key, generating random numbers that are then publicly verified and tested for later use.
The researchers found that, as part of this process, a protocol in an open-source library developed by crypto exchange Binance failed to check these random numbers.
This issue could allow a rogue party in the key generation procedure to capitalize on the failure to extract other parties’ segments of the key.
Binance fixed the bug in March, when it called on its users to upgrade to a new version of “tss-lib” library.
How Bitcoin Critic Peter Schiff Launched Another ‘Proof of Keys’ Day
Discovered Vulnerability Made Ledger to Choose Between ‘Security and Usability’
‘A New Class of Attack’ In Crypto Is ‘Actively Exploited’ – Research
Seedless Wallets Want to Make Bitcoin More User Friendly
Credit: Source link