Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture
Journal: International Journal of Science and Research (IJSR) (Vol.11, No. 6)Publication Date: 2022-06-05
Authors : Ujas Dhami; Nisarg Shah;
Page : 1655-1659
Keywords : Blockchain; Daisy-Chain Attacks; Blockchain Security; Eclipse Attacks; Double Signing;
Abstract
As the surface of blockchains is increasing over the years, several vulnerabilities and attacks have been identified in the network, and several of those are currently being exploited without proper remediation from the providers. Circumstantially, the security of vendors and users is at stake from this. Investigation: This paper demonstrates a simulated daisy-chain attack on a victim who is a user of the ETH blockchain. The attack involves the participation of other exploitation techniques used to jeopardize the victim's wallet and insecurely transfer funds across the network. Method: The daisy-chain attack uses privilege escalation to first compromise the machine as an administrator, then misusing the privilege, installing multiple miners, and performing an eclipse attack into the blockchain. Later, transferring funds using a double-signing attack. Principle Result: The simulated attack was successful, and funds were transferred to another wallet through the simulated blockchain. The reverse shell remained persistent, and the ETW (Event Tracer for Windows) was disabled successfully so no traces could be found. However, a multitudinous amount of broadcast packets was needed to efficaciously perform the eclipse attack.
Other Latest Articles
- Bayesian Estimation of Change Point of Burr Type III Distribution under Precautionary Loss Function
- A Case Report on Recurrent Pneumothorax in a Premature Baby
- Histopathological Study of Gallbladder Disease in Tertiary Care Centre
- A Conceptual Model in Dealing with the Challenging of Education
- A Conceptual Model in Dealing with the Challenges of Education
Last modified: 2022-09-07 15:17:07