CoinInsight360.com logo CoinInsight360.com logo
A company that is changing the way the world mines bitcoin

WallStreet Forex Robot 3.0
crypto.news 2025-03-05 10:49:34

SlowMist flags a security flaw that could lead to private key leakage

SlowMist has identified a critical security flaw in a widely-used encryption library, which could allow hackers to reverse engineer private keys in applications that depend on it. Blockchain security firm SlowMist has flagged a critical security vulnerability in the JavaScript elliptic encryption library, commonly utilized in crypto wallets (including MetaMask , Trust Wallet, Ledger, and Trezor), identity authentication systems, and Web3 applications. Specifically, flagged vulnerability allows attackers to extract private keys by manipulating specific inputs during a single signature operation, which could give them full control over a victim’s digital assets or identity credentials. ⚠️A critical vulnerability (GHSA-vjh7-7g9h-fjfh) has been discovered in the widely-used elliptic encryption library. 😈Attackers can exploit this flaw by crafting specific inputs to extract private keys with just a single signature, potentially compromising digital assets or… — SlowMist (@SlowMist_Team) March 5, 2025 The typical Elliptic Curve Digital Signature Algorithm process requires several parameters to generate a digital signature: the message, the private key, and a unique random number (k). The message is hashed and then signed using the private key. As for the random value k, it’s needed to make sure that even if the same message is signed multiple times, each signature is different—similar to how a stamp requires fresh ink for each use. The specific vulnerability identified by SlowMist occurs when k is mistakenly reused for different messages. If k is reused, attackers can exploit this vulnerability, which can allow them to reverse engineer the private key . You might also like: News Kaspersky warns of SparkCat malware that targets private keys on Android and iOS Similar vulnerabilities in ECDSA have led to security breaches in the past. For example, in July 2021, the Anyswap protocol was compromised when attackers took advantage of weak ECDSA signatures. They used the vulnerability to forge signatures, allowing them to withdraw funds from the Anyswap protocol, resulting in a loss of around $8 million. You might also like: Crypto wallet recovery without a private key or seed phrase | Opinion

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.