
HodlX Guest Post Submit Your Post Zero days without incidents in the DeFi space. This time the vulnerability was discovered in a widely used ‘elliptic library.’ What makes matters worse – its exploitation could lead to hackers taking control of users’ private keys and draining wallets. All through a simple fraudulent message signed by a user. Is this a critical issue? The first thing to consider is the fact that libraries like elliptic provide developers with ready-made code components. This means that instead of writing the code from scratch and checking it as they go, developers just borrow the elements they need. While it’s considered to be a safer practice, since the libraries are continuously used and tested, this also increases the risks if one vulnerability gets through. Elliptic library is used extensively across the JavaScript ecosystem. It powers cryptographic functions in many well-known blockchain projects, web applications and security systems. According to NPM statistics, the package containing the error is downloaded approximately 12–13 million times weekly, with over 3,000 projects directly listing it as a dependency. This broad usage implies that the vulnerability potentially affects a vast number of applications – especially cryptocurrency wallets, blockchain nodes and electronic signature systems – as well as any service relying on ECDSA signatures through elliptic, especially when handling externally provided input. This vulnerability allows remote attackers to fully compromise sensitive data without proper authorization. That’s why the issue received an extremely high severity rating – approximately nine out of 10 on the CVSS scale. It’s important to point out that exploiting this vulnerability requires a very specific sequence of actions and the victim must sign arbitrary data provided by the attacker. That means that some projects may remain safe, for example, if an application only signs predetermined internal messages. Still, many users don’t pay as much attention when signing messages via crypto wallets as they do when signing a transaction. Whenever a Web 3.0 site asks users to sign terms of service, users often neglect to read them. Similarly, users might quickly sign a message for an airdrop without fully understanding the implications. Technical details The problem comes from not handling errors properly during the creation of ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. ECDSA is commonly used to confirm that messages, like blockchain transactions, are genuine. To create a signature, you need a secret key – only the owner knows it – and a unique random number called a ‘nonce.’ If the same nonce is used more than once for different messages, someone could figure out the secret key using math. Normally, attackers can’t figure out the private key from one or two signatures because each one uses a unique random number (nonce). But the elliptic library has a flaw – i f it gets an odd type of input (like a special string instead of the expected format), it could create two signatures with the same nonce for different messages. This mistake could reveal the private key, which should never happen in proper ECDSA use. To exploit this vulnerability, an attacker needs two things. A valid message and its signature from the user – for instance, from any previous interactions The user to sign a second message explicitly created to exploit the vulnerability With these two signatures, the attacker can compute the user’s private key, gaining full access to funds and actions associated with it. Detailed information is available in the GitHub Security Advisory . Exploitation scenarios Attackers may exploit this vulnerability through various methods, including the following. Phishing attacks that direct users to fake websites and request message signatures Malicious DApps (decentralized applications) disguised as harmless services, such as signing terms of use or participating in airdrops Social engineering convincing users to sign seemingly harmless messages Compromising servers’ private keys that sign messages from users A particularly concerning aspect is users’ generally lax attitude toward signing messages compared to transactions. Crypto projects frequently ask users to sign terms of service or airdrop participation messages, potentially making exploitation easier. So, think about it – would you sign a message to claim free tokens? What if that signature could cost you your entire crypto balance? Recommendations Users must promptly update all applications and wallets that utilize the elliptic library for signatures to the latest secure version. Exercise caution when signing messages, particularly from unfamiliar or suspicious sources. Developers of wallets and applications should verify their elliptic library version. If any users could be affected by the vulnerable version, developers must inform them about the urgent need for updating. Gleb Zykov is the co-founder and CTO of HashEx Blockchain Security . He has more than 14 years of experience in the IT industry and over eight years in internet security, as well as a strong technical background in blockchain technology (Bitcoin, Ethereum and EVM-based blockchains). Check Latest Headlines on HodlX Follow Us on Twitter Facebook Telegram Check out the Latest Industry Announcements Disclaimer: Opinions expressed at The Daily Hodl are not investment advice. Investors should do their due diligence before making any high-risk investments in Bitcoin, cryptocurrency or digital assets. Please be advised that your transfers and trades are at your own risk, and any loses you may incur are your responsibility. The Daily Hodl does not recommend the buying or selling of any cryptocurrencies or digital assets, nor is The Daily Hodl an investment advisor. Please note that The Daily Hodl participates in affiliate marketing. Generated Image: DALLE3 The post HashEx Security Alert – A Single Signature Could Drain Your Wallet appeared first on The Daily Hodl .
The Daily Hodl
You can visit the page to read the article.
Source: The Daily Hodl
Disclaimer: The opinion expressed here is not investment advice – it is provided for informational purposes only. It does not necessarily reflect the opinion of BitMaden. Every investment and all trading involves risk, so you should always perform your own research prior to making decisions. We do not recommend investing money you cannot afford to lose.
Curious Minds Ponder Satoshi Nakamoto’s Identity on His 50th Birthday

Nakamoto`s identity and motives remain a significant mystery in cryptocurrency. April 5 is historically significant in both Bitcoin and finance. Continue Reading: Curious Minds Ponder Satoshi Nakamoto’s Identity on His 50th Birthday The post Curious Minds Ponder Satoshi Nakamoto’s Identity on His 50th Birthday appeared first on COINTURK NEWS . The Daily Hodl

Arthur Hayes Predicts a Shift in Global Financial Dynamics with Gold and Bitcoin
Arthur Hayes predicts a resurgence of gold and Bitcoin in global finance. He argues that U.S. Continue Reading: Arthur Hayes Predicts a Shift in Global Financial Dynamics with Gold and Bitcoin The post Arthur Hayes Predicts a Shift in Global Financial Dynamics with Gold and Bitcoin appeared first on COINTURK NEWS . The Daily Hodl