International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 2 | Views: 52 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper | Information Security | India | Volume 11 Issue 6, June 2022

Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture

Ujas Dhami [4] | Nisarg Shah [5]

Abstract: As the surface of blockchains is increasing over the years, several vulnerabilities and attacks have been identified in the network, and several of those are currently being exploited without proper remediation from the providers. Circumstantially, the security of vendors and users is at stake from this. Investigation: This paper demonstrates a simulated daisy-chain attack on a victim who is a user of the ETH blockchain. The attack involves the participation of other exploitation techniques used to jeopardize the victim's wallet and insecurely transfer funds across the network. Method: The daisy-chain attack uses privilege escalation to first compromise the machine as an administrator, then misusing the privilege, installing multiple miners, and performing an eclipse attack into the blockchain. Later, transferring funds using a double-signing attack. Principle Result: The simulated attack was successful, and funds were transferred to another wallet through the simulated blockchain. The reverse shell remained persistent, and the ETW (Event Tracer for Windows) was disabled successfully so no traces could be found. However, a multitudinous amount of broadcast packets was needed to efficaciously perform the eclipse attack.

Keywords: Blockchain, Daisy-Chain Attacks, Blockchain Security, Eclipse Attacks, Double Signing

Edition: Volume 11 Issue 6, June 2022,

Pages: 1655 - 1659

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait