FTC 51% Attack - Case Study
-
Hello guys, in an attempt to further understand what hapened in the attack 2 weeks ago I searched into the blockchain to check for what traces were left by the attacker. I did not like what I found… I know this community and its developers are working in preventing these attacks from happening but until some better assurances are given, I can’t find myself using this coin.
I whish the information I collected can be helpful to the great developers of this community in putting aditional obstacles to attackers trying to destroy Feathercoin.
I made a PDF([url=http://maxminer.files.wordpress.com/2013/06/ftc_51attack.pdf]http://maxminer.files.wordpress.com/2013/06/ftc_51attack.pdf[/url]) for a workshop to with all my findings. Also created a gallery ([url=http://imgur.com/a/fTye4#0]http://imgur.com/a/fTye4#0[/url]) for easy distribution.
Suggestions to improve this document are welcome.
-
Thanks for the research and sharing!
-
So much info! Thank you for making this :)
-
Wow. Very informative, and very damning. Well done.
-
[b]Max[/b], well done analysis. if you want to enjoy watching numerous successful attempts of double spending, welcome to the Powercoin block chain. I’ve analysed them earlier today. Unlike Feathercoin, they’re dead now. Here is a copy of my post on the Bitcointalk.org forum:
[quote=ghostlander][quote author=fenican]
So let’s be clear:1. PWC, with the new checkpoints, is perfectly valid. Anyone can mine it. Anyone can use it. It will, like the other 40 or so low hash rate coins, remain vulnerable to further 51% attacks
2. An attacker was able to steal coins from Cryptsy using an exploit where they deposited coins on a forked block chain and then proceeded to withdraw those coins on a real blockchain
3. Vern has fixed the vulnerability in #2 but does not have sufficient PWC to pay everyone their full balance
While this particular attack is unlikely to occur again, a far more common one is far an attacker to do a 51% attack, deposit coins to an exchange, immediately convert to BTC, and then withdraw the BTC. That attack is easier to pull off and much harder for an exchange to protect against.
Anyone trading alt coins on an exchange needs to be aware coins can effectively be stolen from an exchange in this manner resulting in a loss of capital for the traders. That is why there are very few exchanges that allow low hash rate coins to be traded.
[/quote]You don’t get how hilarious the story is. I’ve spent some time on analysis of the Powercoin’s block chain. This is not a single exploit or security breach, this is something really outstanding :)
They say someone with huge hash power took control over the network, so here we have a 51% attack. That evil guy double spent his coins through Cryptsy. He forked the block chain, deposited coins at Cryptsy, mined new blocks until it confirmed, then switched to the original block chain, withdrew coins to his address, and continued to mine until the withdrawal confirmed. It seemed no one cared to process such high deposit and withdrawal manually, so the evil guy got away with over 2 million PWC. Cool, yeah? Now they feel pissed off extremely and ready to destroy the whole currency to make sure the hacker never profits. Good guys with PWC deposits at Cryptsy are going to receive some kind of compensation, other good guys out there get nothing. And the story ends.
Wait, 2 million coins moved at once? Get ready for real fun now. They weren’t hacked once or twice. They were hacked a couple dozen times! The bad guy worked hard 2 days long forking and orphaning the block chain, depositing and withdrawing coins. The 1st attempt was at block [url=http://block.al.tcoin.info/block/d323e688aa2861c8bf66be3c47d0565b541b2e84e09825b76bc6c2fdeedc528d]#29294[/url], time stamp 2013-06-15 00:38:00. He started with some 20K PWC to double spend. It worked out, cool. He tried it again a few more times. No problem. The dude decided to raise stakes. Again and again. The last double spends were over 200K each: [url=http://block.al.tcoin.info/block/9f32cf6a5e743ea8cd6d9734df0c93ab24ff3202190304c229c8a182c4df2bae]#29669[/url] (2013-06-16 11:55:17) and [url=http://block.al.tcoin.info/block/d243bf00e5abdd1fb78807ecce966f856b8e30d3d97403d1ab9700fa5b795392]#29706[/url] (2013-06-16 15:42:35).
His highest withdrawals went to this address: [url=http://block.al.tcoin.info/address/p5p53rioyjqyuwbySUzZAeX2JU4778yECZ]p5p53rioyjqyuwbySUzZAeX2JU4778yECZ[/url]
2 days under attack and no one gave a shit! They didn’t care even to increase the number of confirmations for deposits, say, to 100 like BTC-e did with Feathercoin recently. Now they tell stories and the community is at loss.[/quote]
-
[quote]There exists a Feathercoin user holding about a fifth of all coins with the intent and capability to execute a highly damaging attack to the network and its users.
Recipients of Feathercoin when the network shows signs of being under attack should increase their confirmation requirements before accepting any payments.[/quote]
I guess a past tense would be more appropriate. We cannot be sure he still owns a large share of FTC. His ability of executing such an attack on the network currently is also doubtful as certain precautions have been taken, more in development now, and the network hash rate is much higher than 3 weeks ago. Although I’m sure Feathercoin to experience more attacks in the not so distant future. Many people out there want us to lay down and die. [i]Si vis pacem, para bellum.[/i]
-
From my understanding, and I’m definitely no expert. Someone used a massive hashrate to control the blockchain (a 51% attack), added there own fake block/transaction with mass amounts of FTC and attempted to collect fees at the same time. Since they controlled a majority of the hashing they kept moving the coins to get them accepted or washed by the system to make them valid. If the conclusion you were looking for is whether they were successful or not, I’m not sure and would like to know as well. Please correct my understanding of this, if I’m wrong.
-
[quote name=“ghostlander” post=“17558” timestamp=“1372165026”]
I guess a past tense would be more appropriate…
[/quote]I would argue that it is still current, unless that user was able get rid of the coins to unsuspecting users. But let’s keep it clear that one thing is the product of fake block generation and another is the [b]attempt[/b] at double spending coins which at the lack of evidence otherwise were obtained legitimately. No news came about anyone complaining about having been defrauded in the multiple attempts at double-spending. Attacker could as well be just testing, or even naively trying to create coins out of negative fees(!)
[quote author=Simkill link=topic=2178.msg18030#msg18030 date=1372335133]
So, for those of us who aren’t able to grasp the document, what’s the conclusion?
[/quote]My interpretation of the event has been quoted just above your post, this was meant as an exercise and I did not intend to advance it too much since was asked for objectivity. In a way I think the research is not finished and actually think that a deeper technical review would add much better insight to help the developers (any crypto) achieve a higher level of both prevention and protection.
To the non technical inclined the message is: be careful with the heightened risk associated with adopting such a cryptocurrency, where the known vulnerabilities are not just theoretical but exploited as a matter of fact.
More directly:
Devs - this was the attacker methods > neutralise them > develop realtime attack detection tools > make them public
Miners/Pools - cooperate with developers in the detection > help mitigate the attackers success by isolating its moves
Merchants and users - beware of attacks > keep alert for its footprints > act accordinglyFeathercoin is apparently joining forces with other cryptos, which can be very positive, but I remain skeptical until I see actual / structural improvements to crypto in general…
“Hope for the best, plan for the worse”
-
[quote name=“Max” post=“18955” timestamp=“1372626189”]
No news came about anyone complaining about having been defrauded in the multiple attempts at double-spending.
[/quote]The only market which could process such large amounts of FTC at that time was BTC-e. They were very quick to act. In fact, they had increased the number of confirmations to 100 even before I and other developers started to investigate what was happening with the block chain. Even if they lost anything to double spending, they kept this information undisclosed to protect the reputation.
-
[quote name=“ghostlander” post=“19029” timestamp=“1372654191”]
[quote author=Max link=topic=2178.msg18955#msg18955 date=1372626189]
No news came about anyone complaining about having been defrauded in the multiple attempts at double-spending.
[/quote]The only market which could process such large amounts of FTC at that time was BTC-e. They were very quick to act. In fact, they had increased the number of confirmations to 100 even before I and other developers started to investigate what was happening with the block chain. Even if they lost anything to double spending, they kept this information undisclosed to protect the reputation.
[/quote]And they still haven’t brought it back down, even though no other coin requires more than 8 confirms.
-
[quote name=“Kevlar” post=“19440” timestamp=“1372828251”]
[quote author=ghostlander link=topic=2178.msg19029#msg19029 date=1372654191]
[quote author=Max link=topic=2178.msg18955#msg18955 date=1372626189]
No news came about anyone complaining about having been defrauded in the multiple attempts at double-spending.
[/quote]The only market which could process such large amounts of FTC at that time was BTC-e. They were very quick to act. In fact, they had increased the number of confirmations to 100 even before I and other developers started to investigate what was happening with the block chain. Even if they lost anything to double spending, they kept this information undisclosed to protect the reputation.
[/quote]And they still haven’t brought it back down, even though no other coin requires more than 8 confirms.
[/quote]they where probably responding to previous lost see post below for previous attack. but for sure they have not lost that much as trade size is not that big even if it seems to have some jump in size around those time on BTC-e transaction history (internal wallet to wallet exchange so not visible on the chain). previous attack was 200K last one 49999.99 so probably bellow a 50K threshold :-\. BTC-e is putting counter-measure in place to protect themself . possibly all attempt have filed so far or got just a very small amount for the attacker. But they prepare for a full attack. and probably will until we get an “acceptable” 51% mitigation with dynamic checkpointing or a constant hash rate that keep us out of trouble for 51% that seems to be around 2Gh/s (in fact the hashpower should be calculated from all block produce between 2 known legitimate block for timestamp, my previous analyse took the timestamp of the attacker that can be false as he prove in the long time attack)
-
[quote name=“Max” post=“18955” timestamp=“1372626189”]
Devs - this was the attacker methods > neutralise them > develop realtime attack detection tools > make them public
Miners/Pools - cooperate with developers in the detection > help mitigate the attackers success by isolating its moves
Merchants and users - beware of attacks > keep alert for its footprints > act accordinglyFeathercoin is apparently joining forces with other cryptos, which can be very positive, but I remain skeptical until I see actual / structural improvements to crypto in general…
“Hope for the best, plan for the worse”
[/quote]The worst thing you can do in an attack is to stop mining. That’s like stopping the heart during surgery on the liver. It’s not like snake poison, where slowing the flow of blood is a good idea. That’s the wrong analogy.
The right thing to do is encourage more miners to jump on and support. Stopping mining is the same as austerity which is causing destruction of economies all over.
-
How do we increase our confirms if we think there is an attack as outlined by the “attack analysis paper” ? Why didn’t we do this for the current attack? as of 18th July?
[attachment deleted by admin]
-
Damm,
I read this material now for the first time!
I am glad ACP is working now… ::) -
[quote name=“mkBit88” post=“29345” timestamp=“1380298276”]
Seems like this thread got zombied, but now that some time has passed and people have pondered and analyzed, can anyone give us non-techies rundown of what happened?
[/quote]As you can see, Feathercoin is still alive, so nothing really critical happened. Lesson learned, fixes applied.
-
The only lasting effect is that it happened at all. Whenever altercoins come up in /r/Bitcoin on reddit our 51% attack always seems to get brought up.