Downloads: 2 | Views: 52 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper | Information Security | India | Volume 11 Issue 6, June 2022
Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture
Abstract: As the surface of blockchains is increasing over the years, several vulnerabilities and attacks have been identified in the network, and several of those are currently being exploited without proper remediation from the providers. Circumstantially, the security of vendors and users is at stake from this. Investigation: This paper demonstrates a simulated daisy-chain attack on a victim who is a user of the ETH blockchain. The attack involves the participation of other exploitation techniques used to jeopardize the victim's wallet and insecurely transfer funds across the network. Method: The daisy-chain attack uses privilege escalation to first compromise the machine as an administrator, then misusing the privilege, installing multiple miners, and performing an eclipse attack into the blockchain. Later, transferring funds using a double-signing attack. Principle Result: The simulated attack was successful, and funds were transferred to another wallet through the simulated blockchain. The reverse shell remained persistent, and the ETW (Event Tracer for Windows) was disabled successfully so no traces could be found. However, a multitudinous amount of broadcast packets was needed to efficaciously perform the eclipse attack.
Keywords: Blockchain, Daisy-Chain Attacks, Blockchain Security, Eclipse Attacks, Double Signing
Edition: Volume 11 Issue 6, June 2022,
Pages: 1655 - 1659