skip to main content
10.1145/3589335.3651573acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
short-paper
Open Access

Towards Understanding Crypto-Asset Risks on Ethereum Caused by Key Leakage on the Internet

Published:13 May 2024Publication History

ABSTRACT

In public blockchains, leaking secret keys can cause the permanent loss of crypto assets. It is imperative to understand the illicit activities on blockchains related to leaked keys. This paper presents the first measurement study that uncovers, quantifies, and characterizes the actual misuses of the leaked keys from top websites on the Internet to withdraw assets on Ethereum. By finding key-leaking web pages and joining them with transactions, the study reveals 7.29*10^6/0.59*10^6 USD worth of assets on Ethereum mainnet/Binance Smart Chain (BSC) are withdrawn from 1421/1514 leaked secret keys. Mitigations are proposed to avoid the financial loss caused by leaked keys.

Skip Supplemental Material Section

Supplemental Material

shp7786.mp4

Supplemental video

mp4

56 MB

References

  1. 2019. Ethercombing: Finding Secrets in Popular Places. https://www.ise.io/ casestudies/ethercombing/Google ScholarGoogle Scholar
  2. 2019. Stealing Ethereum by Guessing Weak Private Keys, Schneier on Security. https://www.schneier.com/blog/archives/2019/04/stealing_ethere.htmlGoogle ScholarGoogle Scholar
  3. Retrieved May. 26, 2023. Telethon: an Python 3 library to interact with Telegram's API. https://pypi.org/project/Telethon/.Google ScholarGoogle Scholar
  4. Retrieved May, 5, 2021. Etherscan: Ethereum (ETH) Blockchain Explorer. https: //etherscan.io/.Google ScholarGoogle Scholar
  5. Retrieved Sep, 2023. 0xDeadList collects the "dead" address with leaked private key. https://github.com/0xDeadList/0xDeadList.Google ScholarGoogle Scholar
  6. Retrieved Sep, 2023. Brainwallet ). https://brainwalletx.github.io/.Google ScholarGoogle Scholar
  7. Michael Brengel and Christian Rossow. 2018. Identifying Key Leakage of Bitcoin Users. In Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10--12, 2018, Proceedings (Lecture Notes in Computer Science, Vol. 11050), Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, and Sotiris Ioannidis (Eds.). Springer, 623--643. https://doi.org/10.1007/978--3-030-00470--5_29Google ScholarGoogle ScholarCross RefCross Ref
  8. Runhan Feng, Ziyang Yan, Shiyan Peng, and Yuanyuan Zhang. 2022. Automated Detection of Password Leakage from Public GitHub Repositories. In 44th IEEE/ACM 44th International Conference on Software Engineering, ICSE 2022, Pittsburgh, PA, USA, May 25--27, 2022. ACM, 175--186. https://doi.org/10.1145/ 3510003.3510150Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, and Ari Juels. 2021. Forsage: Anatomy of a Smart-Contract Pyramid Scheme. CoRR abs/2105.04380 (2021). arXiv:2105.04380 https://arxiv.org/abs/2105.04380Google ScholarGoogle Scholar
  10. Michael Meli, Matthew R. McNiece, and Bradley Reaves. 2019. How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24--27, 2019. The Internet Society. https://www.ndss-symposium.org/ndss-paper/how-bad-can-it-gitcharacterizing- secret-leakage-in-public-github-repositories/Google ScholarGoogle Scholar
  11. Marie Vasek, Joseph Bonneau, Ryan Castellucci, Cameron Keith, and Tyler Moore. 2016. The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin BrainWallets. In Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised Selected Papers (Lecture Notes in Computer Science, Vol. 9603), Jens Grossklags and Bart Preneel (Eds.). Springer, 609--618. https://doi.org/10.1007/978--3--662- 54970--4_36Google ScholarGoogle ScholarCross RefCross Ref
  12. Marie Vasek and Tyler Moore. 2015. There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26--30, 2015, Revised Selected Papers (Lecture Notes in Computer Science, Vol. 8975), Rainer Böhme and Tatsuaki Okamoto (Eds.). Springer, 44--61. https://doi.org/10.1007/978--3--662--47854--7_4Google ScholarGoogle ScholarCross RefCross Ref
  13. Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, and Guoai Xu. 2022. Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. In SIGMETRICS/PERFORMANCE '22: ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, Mumbai, India, June 6 - 10, 2022, D. Manjunath, Jayakrishnan Nair, Niklas Carlsson, Edith Cohen, and Philippe Robert (Eds.). ACM, 23--24. https://doi.org/10.1145/3489048.3522636Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards Understanding Crypto-Asset Risks on Ethereum Caused by Key Leakage on the Internet

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WWW '24: Companion Proceedings of the ACM on Web Conference 2024
          May 2024
          1928 pages
          ISBN:9798400701726
          DOI:10.1145/3589335

          Copyright © 2024 Owner/Author

          This work is licensed under a Creative Commons Attribution International 4.0 License.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 May 2024

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate1,899of8,196submissions,23%
        • Article Metrics

          • Downloads (Last 12 months)47
          • Downloads (Last 6 weeks)47

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader