Odaily Planet Daily News According to news from the Slow Mist District, Distrust discovered a serious vulnerability that affects cryptocurrency wallets using Libbitcoin Explorer 3.x. The vulnerability, which allows attackers to access the wallet's private keys by cracking the Mersenne Twister pseudo-random number generator (PRNG), has now had real-world impact.
Vulnerability details:
The vulnerability stems from the pseudo-random number generator (PRNG) implementation in Libbitcoin Explorer version 3.x. This implementation uses the Mersenne Twister algorithm and only uses the 32-bit system time as the seed. This implementation allows an attacker to find a user's private key within a few days through a brute force method.
Sphere of influence:
This vulnerability affects all users who use Libbitcoin Explorer 3.x to generate wallets, as well as applications that use libbitcoin-system 3.6 to develop libraries.
Known affected cryptocurrencies include Bitcoin, Ethereum, Ripple, Dogecoin, Solana, Litecoin, Bitcoin Cash, and Zcash, among others.
Risk assessment: Due to the existence of this vulnerability, attackers can access and control the user's wallet, thereby stealing funds therein. As of August 2023, over $900,000 in crypto assets have been stolen.
solution:
All users of Libbitcoin Explorer 3.x versions are strongly advised to immediately stop using affected wallets and move funds to a secure wallet. Be sure to use a proven, secure random number generation method to generate new wallets.