Industry News What can we learn from the DMM Bitcoin “leak”?

Key Takeaways from the Eterbase $5 Million Hot Wallet Hack

The news about the latest exchange that was hacked earlier this week, with hackers netting over $5 million, brings up a big inconvenient truth: no matter how much financial institutions that handle […]

The news about the latest exchange that was hacked earlier this week, with hackers netting over $5 million, brings up a big inconvenient truth: no matter how much financial institutions that handle cryptocurrency invest in security measures – they still seem to be vulnerable to attacks.

Not much has been published yet about the Eterbase attack, with many questions still looming over the incident, but from what’s known so far – hackers gained access to users’ private keys by breaking into the hot wallet used by Eterbase.

Screenshot of Eterbase homepage, taken on Sep. 9. The reputational damage of such a breach can far exceed the direct financial loss

It’s a chilling reminder that all hot wallets – including those employing advanced Multi Party Computation (MPC) – can be breached. In theory, MPC technology offers a robust security solution: it’s based on splitting private keys into shards and dividing these shards to multiple co-signers – each running their designated part in the signing ceremony. Only by getting all or most of co-signers to sign on their designated part enables the signing of the transaction.

While there are several MPC implementations in the market today, they all share two common flaws that make them vulnerable to attacks:

  • The first vulnerability stems from the somber reality that any PC connected to the internet, whether on-prem or in the cloud, can potentially be hacked. Regardless of how sophisticated it is, with sufficient effort and persistence – a skilled hacker will eventually find an attack vector on this device. Adding one or two more co-signers to the MPC network simply requires hackers to add incremental effort to break into the MPC network. Once they’re in, the private keys are compromised.

One might ask, “OK, why not just add many more co-signers to the network, giving hackers a hard time?”. Here’s the catch: expanding the MPC network to include more co-signers is not a feasible option, as it creates serious performance implications, making legitimate transactions to the blockchain slow and inefficient. that’s why the largest MPC networks in the market today typically don’t exceed 3 PCs. And here’s the bad news: hackers don’t event need to break into all 3. Why is that? The answer lies in the second vulnerability that MPC hot wallets suffer from:

MPC networks are typically programmed in a way that once the majority of co-signers in the network (typically 2 out of 3) provide their shard of the transaction, the transaction is signed and sent to the blockchain. What this means for hackers, is that they simply need to hack into one or two additional PCs to complete their takeover of the valuable keys. While this entails considerably more effort from the hacker, in today’s lucrative crypto market, the reward dwarfs the effort required to breaking into a hot wallet.

Bottom line: exchanges and banks offering digital assets must rethink their security strategy to avoid finding themselves in Eterbase’s spot.

Continue reading

Everything You Wanted to Know about Tokenization

Join the top experts in the field, Lior Lamesh, GK8’s Co-founder & CEO, and Thomas Cowan, Galaxy’s VP of Tokenization, for a webinar that’s all about explaining this hot and intriguing topic everyone’s been talking about.

5 Common Cold Wallet Myths (or: Why There’s No Real Cold Wallet Out There)

There seems to be some heated debate in the blockchain world between cold and hot wallets. Cold wallets are thought to be more secure but require processing any transaction manually, while hot […]

Cryptocurrency Crime Statistics: A Visual Guide

Ever since the pseudonymous Satoshi Nakamoto set out the case for a decentralized, trustless blockchain where everyone held their own account and transactions were verified by anyone who wanted to take part, […]