Fireblocks Discloses Critical Vulnerability in BitGo Ethereum Wallets

Fireblocks Discloses Critical Vulnerability in BitGo Ethereum Wallets



The cryptography research team at blockchain infrastructure provider Fireblocks today released the details of a vulnerability in BitGo’s Ethereum wallets that use the firm’s Threshold Signature Scheme (TSS).

BitGo users whose private keys were potentially exposed include exchanges, banks, and notable Web3 brands with hundreds of thousands of users between them. Fireblocks refused to disclose the names of specific brands affected, citing a non-disclosure agreement (NDA).

Fireblocks was able to catch the vulnerability in early December, just over a month after the service was made public.

After confirming the technical details of the vulnerability, BitGo suspended the service on December 10, releasing a patch update in February. The Palo Alto-based firm also required its clients to update to the latest version by March 17.

okex

Today’s announcement comes at the end of a “coordinated disclosure” process that the firm’s research team has followed with BitGo’s security team. According to Fireblocks, the vulnerability could have enabled an attacker to extract a full private key using a single signature and a few seconds of computation, bypassing all of BitGo’s security features.

Digital asset custodian and security company BitGo, whose customers include some of the crypto industry’s big names, such as Bitstamp, Pantera Capital, and eToro, among others, first introduced TSS wallets in June 2022, with support for Ethereum wallets added in October.

Concerns remain over potential prior exploits

The vulnerability—dubbed BitGo Zero Proof Vulnerability—stemmed from a missing implementation of mandatory Zero-Knowledge Proofs in the BitGo TSS wallet protocol, which uses the Elliptic Curve Digital Signature Algorithm (ECDSA).

The Zero Proof vulnerability was initially discovered in BitGoJS, the SDK that BitGo clients use to interact with the BitGo API. BitGoJS is used for performing signatures on the client side.

Exploiting the vulnerability on the SDK allows an attacker to steal the private key share used by the client, regardless of their key storage methods and security measures.

Despite the measures taken by BitGo to address the vulnerability, the team at Fireblocks is still concerned that prior exploitation could have left affected brands’ NFT wallets vulnerable.

“Any patch introduced into the library should protect wallets that implement it,” Fireblocks head of technology, research and innovation Arik Galansky told Decrypt. “However, it still leaves the concern if anyone has already exploited the vulnerability in the past and extracted the key while it was using a vulnerable library.”

“As attacks on the crypto industry continue to accelerate, licensed custodians are entrusted with securing billions of dollars in user funds,” Fireblocks co-founder and CTO Idan Ofrat said in a statement shared with Decrypt. “The vulnerability is a result of the wallet provider failing to follow a well-reviewed cryptographic standard.”

Although wallets generated following the patch should be safe, according to Fireblocks, the keys of any BitGo Ethereum TSS wallet generated prior to the update should be considered potentially exposed. Any funds in those wallets should therefore be considered at risk and immediately moved to a secure wallet.

Stay on top of crypto news, get daily updates in your inbox.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Pin It on Pinterest