ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture

Journal: International Journal of Science and Research (IJSR) (Vol.11, No. 6)

Publication Date:

Authors : ; ;

Page : 1655-1659

Keywords : Blockchain; Daisy-Chain Attacks; Blockchain Security; Eclipse Attacks; Double Signing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

As the surface of blockchains is increasing over the years, several vulnerabilities and attacks have been identified in the network, and several of those are currently being exploited without proper remediation from the providers. Circumstantially, the security of vendors and users is at stake from this. Investigation: This paper demonstrates a simulated daisy-chain attack on a victim who is a user of the ETH blockchain. The attack involves the participation of other exploitation techniques used to jeopardize the victim's wallet and insecurely transfer funds across the network. Method: The daisy-chain attack uses privilege escalation to first compromise the machine as an administrator, then misusing the privilege, installing multiple miners, and performing an eclipse attack into the blockchain. Later, transferring funds using a double-signing attack. Principle Result: The simulated attack was successful, and funds were transferred to another wallet through the simulated blockchain. The reverse shell remained persistent, and the ETW (Event Tracer for Windows) was disabled successfully so no traces could be found. However, a multitudinous amount of broadcast packets was needed to efficaciously perform the eclipse attack.

Last modified: 2022-09-07 15:17:07