BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets

04/23/2018
by   Mordechai Guri, et al.
0

Cryptocurrency wallets store the wallets private key(s), and hence, are a lucrative target for attackers. With possession of the private key, an attacker virtually owns all of the currency in the compromised wallet. Managing cryptocurrency wallets offline, in isolated ('air-gapped') computers, has been suggested in order to secure the private keys from theft. Such air-gapped wallets are often referred to as 'cold wallets.' In this paper, we show how private keys can be exfiltrated from air-gapped wallets. In the adversarial attack model, the attacker infiltrates the offline wallet, infecting it with malicious code. The malware can be preinstalled or pushed in during the initial installation of the wallet, or it can infect the system when removable media (e.g., USB flash drive) is inserted into the wallet's computer in order to sign a transaction. These attack vectors have repeatedly been proven feasible in the last decade (e.g., [1],[2],[3],[4],[5],[6],[7],[8],[9],[10]). Having obtained a foothold in the wallet, an attacker can utilize various air-gap covert channel techniques (bridgeware [11]) to jump the airgap and exfiltrate the wallets private keys. We evaluate various exfiltration techniques, including physical, electromagnetic, electric, magnetic, acoustic, optical, and thermal techniques. This research shows that although cold wallets provide a high degree of isolation, it is not beyond the capability of motivated attackers to compromise such wallets and steal private keys from them. We demonstrate how a 256-bit private key (e.g., bitcoin's private keys) can be exfiltrated from an offline, air-gapped wallet of a fictional character named Satoshi within a matter of seconds

READ FULL TEXT
research
04/13/2020

AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs

Air-gap covert channels are special types of covert communication channe...
research
02/08/2018

ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields

Air-gapped computers are computers which are kept isolated from the Inte...
research
02/04/2020

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

Air-gapped computers are systems that are kept isolated from the Interne...
research
07/19/2022

Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight

Public key infrastructure (PKI) is a certificate-based technology that h...
research
04/10/2018

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

In this paper we provide an implementation, evaluation, and analysis of ...
research
06/28/2022

Special subsets of addresses for blockchains using the secp256k1 curve

In 2020 Sala, Sogiorno and Taufer have been able to find the private key...
research
06/02/2021

Phoenix: A Formally Verified Regenerating Vault

An attacker that gains access to a cryptocurrency user's private keys ca...

Please sign up or login with your details

Forgot password? Click here to reset