KRYPTON RECOVERS FROM A NEW TYPE OF 51% NETWORK ATTACK
Krypton, an Ethereum-based blockchain, recovered from a novel version of a 51% attack which appears to be the first of its kind.
The exploit includes a two pronged attack: first prong was, overpowering the network with at least 51% of the hashing power to roll back transactions and spend the same coins twice, and the second prong was DDoS-ing nodes to multiply network power. This exploit should be understood by all smaller coins to prevent copycat attacks.
The attackers managed to steal around 21,465 KR from Bittrex by double spending on the network. The attackers did this by sending KR to Bittrex, sold them for bitcoin and then rolled back the blockchain to reverse the transaction. Supernova mining pool and Krypton stats servers were also DDoS attacked to give the malicious miners an edge over the network.
The miners rented extra hashing power from Nicehash and used 4miners pool to conduct the attack. KR deposits and withdrawals are frozen on Bittrex and Yobit, pending confirmation that all work arounds have been successfully implemented.
LOW HASHING ETHEREUM BASED COINS AT RISK
This attack may be a “dry run” intended as proof of concept before targeting other Ethereum based blockchains. Shift, another Ethereum type coin, was also targeted by a similar 51% attack last week.
Ethereum based blockchains are being targeted predominantly because they’re easy to fork and manipulate offline, while being used in conjunction with DDoS attacks.
It is suspected that the attackers may be using these lower cap coins as a testnet before targeting Ethereum Classic. This attack may be more difficult to scale up because of ETC’s larger aggregated hashing power.
SOLUTIONS
The Krypton and Shift core development teams have been working to resolve the problem. Krypton has resolved the issue of lost funds due to the attack and suggested to Bittrex to increase KR withdrawal times to 1000 confirmations, to mitigate the risk of rolling back the network for another double spend. Deposits and withdrawals are expected to be re-enabled upon implementation of the above noted workarounds.
The Krypton community also stepped in to purchase additional hashing power and spread it across multiple pools. Bittrex also upgraded their Krypton client code to fix a caching bug with the new KR block explorer.
Potentially affected blockchains may consider merging POS with POW, because doing so may require the attackers to own coins prior to mounting their attack, thus increasing the barriers to a 51% attack. Node operators should be mindful of behaviour suggesting a DDoS as a signal that a 51% attack may be attempted.
相關文章
- NEW CONCEPT ENGLISH 51 - 60
- Verge Victim to Yet Another 51% Attack, XVG Down 15% In Past 24 HoursAST
- invalid conversion from ‘LRUCache*‘ to ‘int‘ [-fpermissive] /new的使用
- New Type Functions/Utilities for Dealing with Ranges in C++20FunctionC++
- from type [java.lang.String] to type [org. apache.kafka.clients.consumer.ConsumerRecord<? ?>JavaApacheKafkaclient
- Could not load type 'System.ServiceModel.Activation.HttpModule' from assembly 'HTTP
- Implementation of Make-A-Video, new SOTA text to video generator from Meta AI, in PytorchIDEAIPyTorch
- JSON parse error: Cannot deserialize value of type `java.time.LocalDateTime` from StringJSONErrorJavaLDA
- VMware建立虛擬機器時出現 network bot from intel e1000虛擬機Intel
- Samsung S Voice attack
- Reflected File Download Attack
- Intent scheme URL attackIntentScheme
- Unsortbin attack原理及分析
- linux symbolic link attack tutorialLinuxSymbol
- 【SEED Labs】DNS Rebinding Attack LabDNS
- Fishing for Hackers: Analysis of a Linux Server AttackLinuxServer
- JS中使用new Array()與使用Array.from()方式建立二維陣列的效能比較JS陣列
- new self()與new static()
- cannot convert (type interface {}) to type int: need type assertion
- Japanese Cryptocurrency Monacoin Hit by Selfish Mining Attack
- As a reader --> Diffusion Models for Imperceptible and Transferable Adversarial Attack
- 51
- New
- JavaScript中的new map()和new set()使用詳細(new map()和new set()的區別)JavaScript
- Bitcoin Node Numbers Fall After Spam Transaction "Attack"
- Wordpress 3.8.2補丁分析 HMAC timing attackMac
- 常回家看看之largebin_attack
- CSAPP-Lab03 Attack Lab 記錄APP
- HITSC_4_Data Type and Type Checking
- 理解new和實現一個new
- new learn
- a new ideaIdea
- a new blog
- in place new
- From now on
- Blind Return Oriented Programming (BROP) Attack - 攻擊原理
- Simple Neural Network
- Set介面_network