KRYPTON RECOVERS FROM A NEW TYPE OF 51% NETWORK ATTACK
Krypton, an Ethereum-based blockchain, recovered from a novel version of a 51% attack which appears to be the first of its kind.
The exploit includes a two pronged attack: first prong was, overpowering the network with at least 51% of the hashing power to roll back transactions and spend the same coins twice, and the second prong was DDoS-ing nodes to multiply network power. This exploit should be understood by all smaller coins to prevent copycat attacks.
The attackers managed to steal around 21,465 KR from Bittrex by double spending on the network. The attackers did this by sending KR to Bittrex, sold them for bitcoin and then rolled back the blockchain to reverse the transaction. Supernova mining pool and Krypton stats servers were also DDoS attacked to give the malicious miners an edge over the network.
The miners rented extra hashing power from Nicehash and used 4miners pool to conduct the attack. KR deposits and withdrawals are frozen on Bittrex and Yobit, pending confirmation that all work arounds have been successfully implemented.
LOW HASHING ETHEREUM BASED COINS AT RISK
This attack may be a “dry run” intended as proof of concept before targeting other Ethereum based blockchains. Shift, another Ethereum type coin, was also targeted by a similar 51% attack last week.
Ethereum based blockchains are being targeted predominantly because they’re easy to fork and manipulate offline, while being used in conjunction with DDoS attacks.
It is suspected that the attackers may be using these lower cap coins as a testnet before targeting Ethereum Classic. This attack may be more difficult to scale up because of ETC’s larger aggregated hashing power.
SOLUTIONS
The Krypton and Shift core development teams have been working to resolve the problem. Krypton has resolved the issue of lost funds due to the attack and suggested to Bittrex to increase KR withdrawal times to 1000 confirmations, to mitigate the risk of rolling back the network for another double spend. Deposits and withdrawals are expected to be re-enabled upon implementation of the above noted workarounds.
The Krypton community also stepped in to purchase additional hashing power and spread it across multiple pools. Bittrex also upgraded their Krypton client code to fix a caching bug with the new KR block explorer.
Potentially affected blockchains may consider merging POS with POW, because doing so may require the attackers to own coins prior to mounting their attack, thus increasing the barriers to a 51% attack. Node operators should be mindful of behaviour suggesting a DDoS as a signal that a 51% attack may be attempted.
相關文章
- NEW CONCEPT ENGLISH 51 - 60
- Verge Victim to Yet Another 51% Attack, XVG Down 15% In Past 24 HoursAST
- What's new in C# from 2.0 to 5.0C#
- 用Ollydbg快速手脫Krypton 0.5加殼程式――Krypton主程式 等
- 【51】編寫new和delete時需固守常規delete
- invalid conversion from ‘LRUCache*‘ to ‘int‘ [-fpermissive] /new的使用
- New Type Functions/Utilities for Dealing with Ranges in C++20FunctionC++
- MM-step to create a new material type/valuation cloass//account category referenceGo
- Could not load type 'System.ServiceModel.Activation.HttpModule' from assembly 'HTTP
- 程式設計師在國外:Hello World from New Zealand程式設計師
- from type [java.lang.String] to type [org. apache.kafka.clients.consumer.ConsumerRecord<? ?>JavaApacheKafkaclient
- MyBatis提示getFundBonus attempted to return null from a method with a primitive return type (double)MyBatisNullMIT
- The type XXX cannot be resolved.It is indirectly referenced from required .classUI
- padding oracle attack相關之padding oracle attackpaddingOracle
- Intent scheme URL attackIntentScheme
- JSON parse error: Cannot deserialize value of type `java.time.LocalDateTime` from StringJSONErrorJavaLDA
- Explain in detail the steps/processes that occur from the moment you type a URL in a browser and hit enterAI
- Implementation of Make-A-Video, new SOTA text to video generator from Meta AI, in PytorchIDEAIPyTorch
- Unsortbin attack原理及分析
- 51
- VMware建立虛擬機器時出現 network bot from intel e1000虛擬機Intel
- linux symbolic link attack tutorialLinuxSymbol
- HTTP Slow Attack測試工具SlowHTTPTestHTTP
- Krypton 0.5加殼程式脫殼及輸入表修復記
- New start new hope!
- 【SEED Labs】DNS Rebinding Attack LabDNS
- Bitcoin Node Numbers Fall After Spam Transaction "Attack"
- 常回家看看之largebin_attack
- variable: Type 與 Type variable
- cannot convert (type interface {}) to type int: need type assertion
- new self()與new static()
- new Child();new Child(1);
- Value Type vs Reference Type in SwiftSwift
- Wordpress 3.8.2補丁分析 HMAC timing attackMac
- Fishing for Hackers: Analysis of a Linux Server AttackLinuxServer
- 【機器學習】李宏毅——Adversarial Attack(對抗攻擊)機器學習
- CSAPP-Lab03 Attack Lab 記錄APP
- Japanese Cryptocurrency Monacoin Hit by Selfish Mining Attack