דער זשוק וואָס האָט אַראָפּגענומען ווינטערמוטע איז נאָך גרויס

  • ParaSwap was alerted of the vulnerability early Tuesday by security firms
  • The vulnerability, in a tool called Profanity, was exploited to drain $160 million from global crypto market maker Wintermute last month

Blockchain security infrastructure company BlockSec confirmed אויף טוויטטער that decentralized exchange aggregator ParaSwap’s deployer address was vulnerable to what’s become known as the Profanity vulnerability.

ParaSwap was first אַלערטיד of the vulnerability early Tuesday morning after Web3 ecosystem security team Supremacy Inc. learned that the deployer address was associated with multiple multi-signature wallets.

Profanity once was one of the most popular tools used to generate wallet addresses, but the project was abandoned due to fundamental security flaws

Most recently, global crypto market maker Wintermute was set back $ קסנומקס מיליאָן due to a suspected Profanity bug.

A Supremacy Inc. developer, Zach — who didn’t provide his last name — told Blockworks that Profanity generated addresses are vulnerable to hacks because it uses weak random numbers to generate private keys.

“If these addresses initiate transactions on the chain, exploiters can recover their public keys through transactions and then obtain the private keys by continuously back-propelling collisions on the public keys,” Zach told Blockworks via Telegram on Tuesday.

“There is one and only one solution [to this problem], which is to transfer the assets and change the wallet address immediately,” he said.

After looking into the incident, ParaSwap said that no vulnerabilities were found and denied that Profanity generated its deployer.

Although it is true that Profanity did not generate the deployer, BlockSec co-founder Andy Zhou told Blockworks that the tool that generated ParaSwap’s smart contract was still at risk of Profanity vulnerability.

“They didn’t realize they used a vulnerable tool to generate the address,” Zhou said. “The tool did not have enough randomness which made it possible to crack the private key address.”

Knowledge of the vulnerability has also been able to help BlockSec recover funds. This was true for DeFi protocols BabySwap and TransitSwap, which were both attacked on Oct. 1.

“We were able to retrieve the funds and return them to the protocols,” Zhou said.

After noticing that some attack transactions had been front run by a bot susceptible to Profanity vulnerability, BlockSec developers were able to effectively steal from the thieves.

Despite its popularity as an efficient tool for generating addresses, the developer of Profanity cautioned on Github that wallet security is paramount. “The code will not receive any updates, and I’ve left it in an uncompilable state,” the developer wrote. “Use something else!”


ווייץ דאַס: לאָנדאָן און הערן ווי די גרעסטע TradFi און קריפּטאָ אינסטיטוציעס זען די צוקונפֿט פון קריפּטאָ ס ינסטיטושאַנאַל קינדער. רעגיסטרירן דאָ.


  • בעסי ליו

    בלאָקקוואָרקס

    רעפּאָרטער

    Bessie איז אַ קריפּטאָ רעפּאָרטער באזירט אין ניו יארק וואָס פריער געארבעט ווי אַ טעק זשורנאַליסט פֿאַר די אָרג. זי האָט געענדיקט איר מאַסטער 'ס גראַד אין זשורנאליסטיק אין ניו יארק אוניווערסיטעט נאָך ארבעטן ווי אַ פאַרוואַלטונג קאָנסולטאַנט פֿאַר איבער צוויי יאָר. בעסי איז ערידזשנאַלי פֿון מעלבורן, אויסטראַליע.

    איר קענט קאָנטאַקט Bessie ביי [אימעיל באשיצט]

Source: https://blockworks.co/the-bug-that-took-down-wintermute-is-still-at-large/