Is Your Crypto Safe from Randstorm Vulnerability?

5 min read

Understand Randstorm vulnerability, affected platforms, and precautions against it.

Security and privacy are major concerns in the crypto space, a domain where the convergence of technology and finance creates fertile ground for both innovation and exploitation. The decentralized nature of cryptocurrencies, while offering advantages in terms of autonomy and enhanced security measures, also presents unique challenges in safeguarding digital assets.

The security of cryptocurrencies relies heavily on the robustness of their underlying technology and the vigilance of individual users. If a vulnerability in the technology is detected, it might lure malicious actors to exploit it.

The discovery of the "Randstorm" vulnerability by the cybersecurity firm Unciphered sends ripples through the cryptocurrency community. This newfound flaw, with its effect on billions worth of crypto assets, points to the fragility of digital security that could arise from older technology and slight oversight by the developers.

In this blog, we’ll explain the details and complexities of the Randstorm vulnerability, including affected platforms and users, mitigation efforts, and precautions against it.

Randstorm Vulnerability - Overview#

The cybersecurity company Unciphered made a rather fortunate discovery of the Randstorm vulnerability. The team stumbled upon this significant flaw while assisting a client who was locked out of their Bitcoin wallet. This incident led to a deeper investigation, revealing a systemic issue with far-reaching implications, specifically for the wallets generated using web browsers between 2011 and 2015. The information about the vulnerability was released on November 14th, 2023.

The name "Randstorm" aptly encapsulates the nature of the vulnerability. It signifies the chaotic and unpredictable "storm" in the randomness (hence "Rand") generation process used in cryptographic functions. This flaw compromises the integrity of the cryptographic keys, making them easy to crack or figure out. Consequently, the assets they protect become vulnerable to unauthorized access.

The scope of the Randstorm vulnerability is alarmingly extensive. It's estimated to affect millions of cryptocurrency wallets, putting approximately $2.1 billion in crypto assets at risk. The vulnerability is not confined to Bitcoin alone; other popular cryptocurrencies such as Dogecoin, Litecoin, and Zcash are also under threat due to their reliance on similar cryptographic mechanisms during the period.

For users concerned about the security of their assets, you can use a resource at www.keybleed.com. People can use this platform to see if their wallets are among those that the Randstorm vulnerability has exposed.

Technical Details of the Randstorm Vulnerability#

Central to the Randstorm vulnerability is the SecureRandom function within the JSBN (JavaScript Big Number) library of the BitcoinJS suite. BitcoinJS has been widely used for creating cryptocurrency wallets directly in web browsers, a practice particularly prevalent from 2011 to 2015.

The issue lies in how SecureRandom generates the random numbers that form the backbone of private keys. According to the report, the function generated the private keys with “insufficient entropy,” meaning that the private keys didn’t have enough randomness.

This shortfall implies that the "randomly" generated numbers are not as unpredictable as required. As a result, rendering the private keys of wallets become possible through brute-force attacks or other cryptographic analysis methods.

The absence of a CVE (Common Vulnerabilities and Exposures) is the factor that made the issue worse. This absence signifies the intricate nature of the flaw and the challenges in its identification and resolution.

The Randstorm vulnerability casts a wide net, affecting a range of projects and platforms that incorporate the BitcoinJS library. Among these, several projects have since become inactive, yet the wallets created during their operation remain susceptible. These include BrainWallet, CoinPunk, and QuickCoin, platforms that once offered wallet generation services but are no longer operational.

In addition, active and prominent platforms such as Blockchain.comBitgoDogechain.info, and some others also utilized the BitcoinJS library. The continued operation and significant user base of these platforms underscore the urgency and scale of addressing the Randstorm vulnerability.

Response and Mitigation Efforts against Randstorm#

Since the identification of the Randstorm vulnerability in January 2022, Unciphered has undertaken a series of proactive measures to address and mitigate the potential fallout. The initial step involved extensive notifications to various blockchain and wallet services that were potentially impacted.

This list of notified entities includes Blockchain.com, BitGo, Dogechain.info, BitPay, Blockstream Green, Bitaddress.org, Coinkite, and BitcoinJS. The aim was to ensure that these platforms were aware of the vulnerability and could take immediate steps to protect their users.

Addressing the vulnerability is not as straightforward as issuing a simple patch. The core of the problem lies in the cryptographic keys generated during the affected period. These keys, once created, remain permanent and continue to secure the wallets and the assets within.

In light of this, the users with wallets generated between 2011 and 2015 are suggested to transfer their assets to wallets generated more recently with updated and secure software.

As of the most recent updates, there is no evidence to suggest that malicious actors have actively exploited the Randstorm vulnerability. However, this absence of reported breaches shouldn’t be the cause of negligence. But rather, it should be a cue for heightened vigilance and taking precautions.

The Unciphered team has exercised utmost discretion and responsibility in handling the disclosure of the issue from their side. They have deliberately refrained from publicizing specific details of the vulnerability, preventing the information from reaching malicious actors.

About Neptune Mutual#

Similar to the Randstorm vulnerability, DeFi and the blockchain ecosystem could have potential threats that are yet to be discovered, posing a significant risk to your funds and digital assets. So, the necessity for robust protective measures is essential. This is where Neptune Mutual steps in, offering a safety net for users against such threats.

Neptune Mutual is a DeFi insurance protool, operating on a parametric model that is dedicated to safeguarding your investments against threats that pervade the DeFi ecosystem.

Our platform offers a versatile marketplace where projects can establish cover pools tailored to their specific products. We invite you to engage with us through our contact page; our team is ready to assist you in creating cover pools and setting parameters that align with your requirements.

Neptune Mutual's reach extends across various networks, including EthereumArbitrum, and BNB Smart Chain. So, it has allowed our marketplace to reach various projects in DeFi, CeFi, or the Metaverse.

We also invite Liquidity Providers (LPs) to contribute liquidity to our cover pools. With that, LPs not only earn rewards but also play a crucial role in enhancing the platform's capacity to underwrite risks effectively.

Follow us on X (Twitter) and join our vibrant community on Discord to get informed about Neptune Mutual's latest offerings and updates.

By

Tags