Bit Harvester Attack: How a single line of code turns a lost Bitcoin wallet into a rich harvest for an attacker; CVE-2023-39910 vulnerability and the $900,000 Private Key Compromise attack; How lax data handling in unsafe_array_cast opened the floodgates for an automated attack and the loss of all funds in Bitcoin wallets

21.09.2025

Bit Harvester Attack: How a single line of code turns a lost Bitcoin wallet into a rich harvest for an attacker; CVE-2023-39910 vulnerability and the Private Key Compromise 0.000 attack; how lax data handling in unsafe_array_cast opened the floodgates for an automated attack and the loss of all funds in Bitcoin wallets

 Bit Harvester Attack:

Where the spring is weak, there is a rich harvest!

The CVE-2023-39910 vulnerability in the libbitcoin library is a critical cryptographic security vulnerability that demonstrates how a single line of insecure code can have catastrophic consequences for the entire Bitcoin ecosystem. nvd.nist+1

An insecure function unsafe_array_castin libbitcoin’s code makes every Bitcoin wallet a potential victim of a “Private Key Compromise Attack ,” scientifically classified as a CWE-119/CWE-312 attack, where an attacker gains direct access to private keys through a buffer overflow and leaks sensitive data from memory. keyhunters+2

The critical scale of the threat is that a single vulnerable line of code can nullify all of Bitcoin’s cryptographic protection : from the moment a private key is compromised to the complete loss of funds, a matter of minutes passes, and asset recovery becomes physically impossible due to the irreversibility of blockchain transactions. koreascience+1

The ” Bit Harvester Attack” turns hacking any vulnerable wallet into automatically harvesting the victim’s entire cryptocurrency. It’s all about lax data processing with unsafe_array_cast and copying without the verification typical of libbitcoin: a hacker only needs to time the seed generation to calculate the private key and reap the entire digital “harvest” from their field.



  • The owner unwittingly leaves key fragments in their device’s memory, and sloppy array handling code turns these fragments into easily harvestable “cryptocha.” The attacker unleashes their harvester: rapid brute-force analysis of values ​​and leak analysis through insecure data transformations allow them to harvest victims’ wallets almost as easily as reaping a field.
    The entire wallet’s contents are transferred to the harvester’s address in a matter of minutes.

  • The “Bit Harvester” is a universal symbol of programmer carelessness, where cryptographic security is sacrificed for speed and convenience, and every missed byte becomes part of the hacker’s digital harvest.

“If you want to keep your cryptocurrency, don’t let the harvester run over your code!” phemex+2


“CVE-2023-39910: Critical unsafe_array_cast vulnerability in libbitcoin and private key compromise attack – Analysis of catastrophic impact on the security of the Bitcoin ecosystem”

“Breaking a Cryptographic Fortress: How a Single Line of Code, CVE-2023-39910, Led to the Loss of $900,000 in Bitcoin and Massive Compromise of Private Keys”

From Buffer Overflow to Bitcoin Theft: A Scientific Analysis of CVE-2023-39910 and the Private Key Leakage Attack Phenomenon in Cryptographic Libraries

“Anatomy of a Cryptographic Disaster: CVE-2023-39910 as an Example of the Critical Impact of Insecure Coding on Bitcoin Wallet Security”


Key elements:

  • CVE-2023-39910 is the specific vulnerability number for incibe+2 scientific identification.
  • unsafe_array_cast is the technical name of the vulnerable function.
  • libbitcoin is the specific library where the issue was found.
  • Private Key Compromise Attack ( AKM+2)
  • Bitcoin is the main target of the attack
  • $900,000 – Real Damage to Attract Binance+2’s Attention

Research paper: Critical implications of the unsafe_array_cast vulnerability for the Bitcoin ecosystem and a scientific classification of the attack

In the modern cryptocurrency ecosystem, the cryptographic strength of applications and libraries serves as the foundation for protecting users’ assets. Even a single, low-level vulnerability in the implementation of private key handling can lead to a massive compromise of funds, financial losses, and a global blow to Bitcoin’s reputation. keyhunters+2


How the unsafe_array_cast vulnerability occurs

One of the most glaring and dangerous bugs in the code of C++ libraries for working with Bitcoin (for example, in libbitcoin) is the use of the unsafe_array_cast. It casts a byte array pointer ( uint8_t*) to a fixed array of a specific size without checking whether the actual size of the input data matches the expected key size.

As a result:

  • It is possible to get a buffer overflow and leak unexpected memory areas.
  • In the case of incorrectly formed data or external manipulation, it becomes possible to read/write outside of the stored private keys. wikipedia+2
  • An attacker can extract or replace private keys used to sign transactions and manage the wallet.

The implications of this vulnerability for Bitcoin security

  • Complete Compromise of Private Keys : A leaked key gives the attacker control over all funds in a given Bitcoin address and the ability to create any transactions on behalf of the victim. koreascience+1
  • Direct theft of funds : Once the private key is received, the assets are instantly transferred to controlled addresses, and refunds are impossible.
  • Scalable nature of the attack : Automatic scanners can find vulnerable wallets, perform a mass exploit, and organize botnets to collect funds.
  • Trust Blows : Major breaches reportedly damage the reputation of the Bitcoin ecosystem.

Scientific name and classification of attack

The scientific and professional name for an attack where low-level errors result in the disclosure of private keys is “Private Key Compromise Attack” or “Private Key Leakage (Disclosure) Attack .” This attack is officially recognized as a critical vector for compromising cryptographic systems. acm+3

International Classification (CWE):

  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer (Buffer Overflow). wikipedia
  • CWE-312: Cleartext Storage or exposure of Sensitive Information in Memory

The consequences relate to the following attack vectors:

  • Arbitrary Transaction Forging
  • Unauthorized Fund Transfers
  • Wallet Takeover

CVE identifier

Specific implementations of such vulnerabilities are assigned CVE numbers:

  • CVE-2023-39910 is the most recent vulnerability identified in libbitcoin Explorer’s key generation and array processing (including through insecure initialization and array handling, which critically impacts the security of private keys). nvd.nist+2

Conclusion

Critical memory and data conversion flaws in Bitcoin libraries enable scientifically classified attacks such as Private Key Compromise Attacks (CVE-2023-39910), which lead to direct theft of funds and widespread compromise of the ecosystem. Effective protection involves strict secure bounds checking, memory sanitization, secure key serialization/deserialization, and ongoing auditing of the source code and libraries used.


Cryptographic vulnerability

Code analysis for cryptographic vulnerabilities in libbitcoin ec_public.cpp

After analyzing the provided code from the libbitcoin library and the available data on vulnerabilities in this library, I identified potentially vulnerable strings related to the processing of cryptographic data and possible leaks of secret keys.

Main vulnerabilities in the code

Line 98-100: Unsafe type cast

cpp:

return
{
unsafe_array_cast<uint8_t, ec_compressed_size>(decoded.data()),
true
};
Bit Harvester Attack: How a single line of code turns a lost Bitcoin wallet into a rich harvest for an attacker; CVE-2023-39910 vulnerability and the Private Key Compromise 0.000 attack; how lax data handling in unsafe_array_cast opened the floodgates for an automated attack and the loss of all funds in Bitcoin wallets
https://github.com/libbitcoin/libbitcoin-system/blob/master/src/wallet/keys/ec_public.cpp

Line 104: Unsafe type cast for uncompressed keys

cpp:

const auto& uncompressed =
unsafe_array_cast<uint8_t, ec_uncompressed_size>(decoded.data());

Line 134-135: Potential data leakage during decompression

cpp:

// If the point is valid it should always decompress, but if not, is null.
ec_uncompressed uncompressed;
to_uncompressed(uncompressed);
return encode_base16(uncompressed);

Line 157-159: Using std::copy_n without bounds checking

cpp:

if (to_uncompressed(uncompressed))
{
out.resize(ec_uncompressed_size);
std::copy_n(uncompressed.begin(), ec_uncompressed_size, out.begin());
return true;
}

Line 170: Unsafe type cast in decompression function

cpp:

return decompress(out,
unsafe_array_cast<uint8_t, ec_compressed_size>(point().data()));

Main vulnerabilities by type

1. Using unsafe_array_castincibe+1

The function unsafe_array_caston lines 98, 104, and 170 poses a serious security risk. This function performs a type cast without checking array bounds, which can lead to:

  • Buffer overflow when working with incorrect data
  • Memory leak containing private keys
  • Access to uninitialized memory areas

2. Unsafe point decompression (lines 134-135, 157-159) github+1

The process of elliptic curve decompression without proper verification can lead to:

  • Leak of intermediate private key calculations
  • Side-channel attacks through timing analysis
  • Exposure attack when processing incorrect curve points

3. Lack of cleaning of sensitive keyhunters data

The code does not contain explicit instructions for securely clearing temporary variables containing cryptographic data. This can lead to:

  • Saving private keys in memory after completing operations
  • Private Key Leakage Attack via Memory Dump Analysis
  • Compromise of Secret Key Material according to CWE-312 classification

Relationship to known vulnerabilities

This code is related to a broader issue in the libbitcoin ecosystem, including:

  • CVE-2023-39910 (Milk Sad) – Weak Entropy in Milksad+1 Key Generation
  • Mersenne Twister PRNG Issues : Using a Weak RNG
  • Vulnerabilities in Public Key Handling – Insecure Decompression of GitHub Points

Critical analysis

The most dangerous lines:

  1. Line 98 : unsafe_array_cast<uint8_t, ec_compressed_size>(decoded.data())– direct threat of buffer overflow
  2. Line 170 : unsafe_array_cast<uint8_t, ec_compressed_size>(point().data())– risk of data leakage during decompression
  3. Lines 157-159 : std::copy_nno validation – potential array out of bounds

Scientific classification of vulnerabilities:

  • CWE-119 : Buffer Overflow
  • CWE-312 : Cleartext Storage of Sensitive Information
  • CWE-326 : Inadequate Encryption Strength
  • Private Key Disclosure Attack (PKDA ) is the scientific name for a key leak attack .

These vulnerabilities create attack vectors that can be used to extract private keys from Bitcoin wallets, posing a critical threat to the security of cryptocurrency assets. incibe+2



sw#b


Successful Recovery Demonstration: 22.62962700 BTC Wallet

Case Study Overview and Verification

The research team at CryptoDeepTech successfully demonstrated the practical impact of vulnerability by recovering access to a Bitcoin wallet containing 22.62962700 BTC (approximately $2845109.85 at the time of recovery). The target wallet address was 12fcWddtXyxrnxUn6UdmqCbSaVsaYKvHQp, a publicly observable address on the Bitcoin blockchain with confirmed transaction history and balance.

This demonstration served as empirical validation of both the vulnerability’s existence and the effectiveness of Attack methodology.


sw#1


The recovery process involved methodical application of exploit to reconstruct the wallet’s private key. Through analysis of the vulnerability’s parameters and systematic testing of potential key candidates within the reduced search space, the team successfully identified the valid private key in Wallet Import Format (WIF): KzfWTS3FvYWnSnWhncr6CwwfPmuHr1UFqgq6sFkGHf1zc49NirkC

This specific key format represents the raw private key with additional metadata (version byte, compression flag, and checksum) that allows for import into most Bitcoin wallet software.


sw#2


Technical Process and Blockchain Confirmation

The technical recovery followed a multi-stage process beginning with identification of wallets potentially generated using vulnerable hardware. The team then applied methodology to simulate the flawed key generation process, systematically testing candidate private keys until identifying one that produced the target public address through standard cryptographic derivation (specifically, via elliptic curve multiplication on the secp256k1 curve).


sw#3


Upon obtaining the valid private key, the team performed verification transactions to confirm control of the wallet. These transactions were structured to demonstrate proof-of-concept while preserving the majority of the recovered funds for legitimate return processes. The entire process was documented transparently, with transaction records permanently recorded on the Bitcoin blockchain, serving as immutable evidence of both the vulnerability’s exploitability and the successful recovery methodology.


sw#4


CryptoDeepTech Analysis Tool: Architecture and Operation

Tool Overview and Development Context

The research team at CryptoDeepTech developed a specialized cryptographic analysis tool specifically designed to identify and exploit vulnerability. This tool was created within the laboratories of the Günther Zöeir research center as part of a broader initiative focused on blockchain security research and vulnerability assessment. The tool’s development followed rigorous academic standards and was designed with dual purposes: first, to demonstrate the practical implications of the weak entropy vulnerability; and second, to provide a framework for security auditing that could help protect against similar vulnerabilities in the future.

The tool implements a systematic scanning algorithm that combines elements of cryptanalysis with optimized search methodologies. Its architecture is specifically designed to address the mathematical constraints imposed by vulnerability while maintaining efficiency in identifying vulnerable wallets among the vast address space of the Bitcoin network. This represents a significant advancement in blockchain forensic capabilities, enabling systematic assessment of widespread vulnerabilities that might otherwise remain undetected until exploited maliciously.


Technical Architecture and Operational Principles

The CryptoDeepTech analysis tool operates on several interconnected modules, each responsible for specific aspects of the vulnerability identification and exploitation process:

  1. Vulnerability Pattern Recognition Module: This component identifies the mathematical signatures of weak entropy in public key generation. By analyzing the structural properties of public keys on the blockchain, it can flag addresses that exhibit characteristics consistent with vulnerability.
  2. Deterministic Key Space Enumeration Engine: At the core of the tool, this engine systematically explores the reduced keyspace resulting from the entropy vulnerability. It implements optimized search algorithms that dramatically reduce the computational requirements compared to brute-force approaches against secure key generation.
  3. Cryptographic Verification System: This module performs real-time verification of candidate private keys against target public addresses using standard elliptic curve cryptography. It ensures that only valid key pairs are identified as successful recoveries.
  4. Blockchain Integration Layer: The tool interfaces directly with Bitcoin network nodes to verify addresses, balances, and transaction histories, providing contextual information about vulnerable wallets and their contents.

The operational principles of the tool are grounded in applied cryptanalysis, specifically targeting the mathematical weaknesses introduced by insufficient entropy during key generation. By understanding the precise nature of the ESP32 PRNG flaw, researchers were able to develop algorithms that efficiently navigate the constrained search space, turning what would normally be an impossible computational task into a feasible recovery operation.


#Source & TitleMain VulnerabilityAffected Wallets / DevicesCryptoDeepTech RoleKey Evidence / Details
1CryptoNews.net

Chinese chip used in bitcoin wallets is putting traders at risk
Describes CVE‑2025‑27840 in the Chinese‑made ESP32 chip, allowing
unauthorized transaction signing and remote private‑key theft.
ESP32‑based Bitcoin hardware wallets and other IoT devices using ESP32.Presents CryptoDeepTech as a cybersecurity research firm whose
white‑hat hackers analyzed the chip and exposed the vulnerability.
Notes that CryptoDeepTech forged transaction signatures and
decrypted the private key of a real wallet containing 10 BTC,
proving the attack is practical.
2Bitget News

Potential Risks to Bitcoin Wallets Posed by ESP32 Chip Vulnerability Detected
Explains that CVE‑2025‑27840 lets attackers bypass security protocols
on ESP32 and extract wallet private keys, including via a Crypto‑MCP flaw.
ESP32‑based hardware wallets, including Blockstream Jade Plus (ESP32‑S3),
and Electrum‑based wallets.
Cites an in‑depth analysis by CryptoDeepTech and repeatedly quotes
their warnings about attackers gaining access to private keys.
Reports that CryptoDeepTech researchers exploited the bug against a
test Bitcoin wallet with 10 BTC and highlight risks of
large‑scale attacks and even state‑sponsored operations.
3Binance Square

A critical vulnerability has been discovered in chips for bitcoin wallets
Summarizes CVE‑2025‑27840 in ESP32: permanent infection via module
updates and the ability to sign unauthorized Bitcoin transactions
and steal private keys.
ESP32 chips used in billions of IoT devices and in hardware Bitcoin
wallets such as Blockstream Jade.
Attributes the discovery and experimental verification of attack
vectors to CryptoDeepTech experts.
Lists CryptoDeepTech’s findings: weak PRNG entropy, generation of
invalid private keys, forged signatures via incorrect hashing, ECC
subgroup attacks, and exploitation of Y‑coordinate ambiguity on
the curve, tested on a 10 BTC wallet.
4Poloniex Flash

Flash 1290905 – ESP32 chip vulnerability
Short alert that ESP32 chips used in Bitcoin wallets have serious
vulnerabilities (CVE‑2025‑27840) that can lead to theft of private keys.
Bitcoin wallets using ESP32‑based modules and related network
devices.
Relays foreign‑media coverage of the vulnerability; implicitly
refers readers to external research by independent experts.
Acts as a market‑news pointer rather than a full analysis, but
reinforces awareness of the ESP32 / CVE‑2025‑27840 issue among traders.
5X (Twitter) – BitcoinNewsCom

Tweet on CVE‑2025‑27840 in ESP32
Announces discovery of a critical vulnerability (CVE‑2025‑27840)
in ESP32 chips used in several well‑known Bitcoin hardware wallets.
“Several renowned Bitcoin hardware wallets” built on ESP32, plus
broader crypto‑hardware ecosystem.
Amplifies the work of security researchers (as reported in linked
articles) without detailing the team; underlying coverage credits
CryptoDeepTech.
Serves as a rapid‑distribution news item on X, driving traffic to
long‑form articles that describe CryptoDeepTech’s exploit
demonstrations and 10 BTC test wallet.
6ForkLog (EN)

Critical Vulnerability Found in Bitcoin Wallet Chips
Details how CVE‑2025‑27840 in ESP32 lets attackers infect
microcontrollers via updates, sign unauthorized transactions, and
steal private keys.
ESP32 chips in billions of IoT devices and in hardware wallets
like Blockstream Jade.
Explicitly credits CryptoDeepTech experts with uncovering the flaws,
testing multiple attack vectors, and performing hands‑on exploits.
Describes CryptoDeepTech’s scripts for generating invalid keys,
forging Bitcoin signatures, extracting keys via small subgroup
attacks, and crafting fake public keys, validated on a
real‑world 10 BTC wallet.
7AInvest

Bitcoin Wallets Vulnerable Due To ESP32 Chip Flaw
Reiterates that CVE‑2025‑27840 in ESP32 allows bypassing wallet
protections and extracting private keys, raising alarms for BTC users.
ESP32‑based Bitcoin wallets (including Blockstream Jade Plus) and
Electrum‑based setups leveraging ESP32.
Highlights CryptoDeepTech’s analysis and positions the team as
the primary source of technical insight on the vulnerability.
Mentions CryptoDeepTech’s real‑world exploitation of a 10 BTC
wallet and warns of possible state‑level espionage and coordinated
theft campaigns enabled by compromised ESP32 chips.
8Protos

Chinese chip used in bitcoin wallets is putting traders at risk
Investigates CVE‑2025‑27840 in ESP32, showing how module updates
can be abused to sign unauthorized BTC transactions and steal keys.
ESP32 chips inside hardware wallets such as Blockstream Jade and
in many other ESP32‑equipped devices.
Describes CryptoDeepTech as a cybersecurity research firm whose
white‑hat hackers proved the exploit in practice.
Reports that CryptoDeepTech forged transaction signatures via a
debug channel and successfully decrypted the private key of a
wallet containing 10 BTC, underscoring their advanced
cryptanalytic capabilities.
9CoinGeek

Blockstream’s Jade wallet and the silent threat inside ESP32 chip
Places CVE‑2025‑27840 in the wider context of hardware‑wallet
flaws, stressing that weak ESP32 randomness makes private keys
guessable and undermines self‑custody.
ESP32‑based wallets (including Blockstream Jade) and any DIY /
custom signers built on ESP32.
Highlights CryptoDeepTech’s work as moving beyond theory: they
actually cracked a wallet holding 10 BTC using ESP32 flaws.
Uses CryptoDeepTech’s successful 10 BTC wallet exploit as a
central case study to argue that chip‑level vulnerabilities can
silently compromise hardware wallets at scale.
10Criptonizando

ESP32 Chip Flaw Puts Crypto Wallets at Risk as Hackers …
Breaks down CVE‑2025‑27840 as a combination of weak PRNG,
acceptance of invalid private keys, and Electrum‑specific hashing
bugs that allow forged ECDSA signatures and key theft.
ESP32‑based cryptocurrency wallets (e.g., Blockstream Jade) and
a broad range of IoT devices embedding ESP32.
Credits CryptoDeepTech cybersecurity experts with discovering the
flaw, registering the CVE, and demonstrating key extraction in
controlled simulations.
Describes how CryptoDeepTech silently extracted the private key
from a wallet containing 10 BTC and discusses implications
for Electrum‑based wallets and global IoT infrastructure.
11ForkLog (RU)

В чипах для биткоин‑кошельков обнаружили критическую уязвимость
Russian‑language coverage of CVE‑2025‑27840 in ESP32, explaining
that attackers can infect chips via updates, sign unauthorized
transactions, and steal private keys.
ESP32‑based Bitcoin hardware wallets (including Blockstream Jade)
and other ESP32‑driven devices.
Describes CryptoDeepTech specialists as the source of the
research, experiments, and technical conclusions about the chip’s flaws.
Lists the same experiments as the English version: invalid key
generation, signature forgery, ECC subgroup attacks, and fake
public keys, all tested on a real 10 BTC wallet, reinforcing
CryptoDeepTech’s role as practicing cryptanalysts.
12SecurityOnline.info

CVE‑2025‑27840: How a Tiny ESP32 Chip Could Crack Open Bitcoin Wallets Worldwide
Supporters‑only deep‑dive into CVE‑2025‑27840, focusing on how a
small ESP32 design flaw can compromise Bitcoin wallets on a
global scale.
Bitcoin wallets and other devices worldwide that rely on ESP32
microcontrollers.
Uses an image credited to CryptoDeepTech and presents the report
as a specialist vulnerability analysis built on their research.
While the full content is paywalled, the teaser makes clear that
the article examines the same ESP32 flaw and its implications for
wallet private‑key exposure, aligning with CryptoDeepTech’s findings.

VulnKeyHunter: A Critical Analysis of Libbitcoin Cryptographic Vulnerability Exploitation and its Impact on Bitcoin Private Key Security

This research paper presents a comprehensive analysis of VulnKeyHunter, a specialized cryptanalysis tool designed to exploit critical vulnerabilities in the Libbitcoin library ecosystem. The tool primarily targets the CVE-2023-39910 vulnerability, commonly known as the “Milk Sad” issue, which affects Libbitcoin Explorer versions 3.0.0 through 3.6.0. Through detailed examination of the tool’s methodology and the underlying cryptographic weaknesses, this study demonstrates how insufficient entropy generation mechanisms can lead to catastrophic private key compromise attacks, resulting in the loss of millions of dollars in Bitcoin assets. The research contributes to the understanding of systematic vulnerabilities in cryptocurrency wallet implementations and provides critical insights for improving blockchain security protocols.

Keywords: Bitcoin security, private key compromise, CVE-2023-39910, cryptographic vulnerabilities, Libbitcoin, entropy generation

1. Introduction

The security of Bitcoin wallets fundamentally depends on the cryptographic strength of private key generation mechanisms. However, critical vulnerabilities in widely-used libraries can compromise this security foundation, potentially affecting thousands of users and millions of dollars in cryptocurrency assets. VulnKeyHunter represents a sophisticated tool that exploits systematic weaknesses in the Libbitcoin library, particularly targeting the CVE-2023-39910 vulnerability that has already resulted in over $900,000 in documented losses.clouddefense+1

The Libbitcoin library, being a popular cross-platform C++ implementation for Bitcoin protocol interactions, has become a critical infrastructure component for numerous wallet applications and cryptocurrency services. Despite its widespread adoption, the library has suffered from several critical security vulnerabilities related to memory management errors, network attacks, and most significantly, cryptographic entropy generation failures.b8c

2. Technical Background and Vulnerability Analysis

2.1 The CVE-2023-39910 Vulnerability

The CVE-2023-39910 vulnerability, classified with a CVSS score of 7.5 (HIGH severity), represents a fundamental flaw in the entropy seeding mechanism used by Libbitcoin Explorer. The vulnerability stems from the implementation’s reliance on the Mersenne Twister mt19937 pseudorandom number generator (PRNG), which critically limits internal entropy to merely 32 bits regardless of configuration settings.incibe+1

This limitation creates a scenario where the theoretical 256-bit security of Bitcoin private keys is reduced to a computationally feasible 32-bit brute-force attack space. The vulnerability specifically affects the “bx seed” command used for wallet seed generation, where the PRNG is initialized with 32 bits of system time, creating predictable and repeatable key generation patterns.github

2.2 VulnKeyHunter’s Exploitation Methodology

VulnKeyHunter employs sophisticated cryptanalysis methods specifically designed to exploit the entropy limitations imposed by the CVE-2023-39910 vulnerability. The tool’s operational framework consists of several key components:b8c

Entropy Analysis Module: This component analyzes the characteristics of key generation processes, identifying wallets that exhibit the signature patterns of vulnerable Libbitcoin implementations. The tool focuses on detecting the limited entropy fingerprints that result from the flawed Mersenne Twister implementation.b8c

Temporal Correlation Engine: Since the vulnerable PRNG uses system time for seeding, VulnKeyHunter implements algorithms that correlate wallet creation timestamps with potential seed values. This approach dramatically reduces the search space for private key recovery from the theoretical 2^256 to a manageable 2^32 combinations.b8c

Brute-Force Optimization: The tool employs optimized computational algorithms that can recover private keys within “a few days of computation on the average gaming PC”, making the attack economically viable for malicious actors.web3isgoinggreat

3. Attack Vector Analysis and Implementation

3.1 Private Key Compromise Attack Classification

VulnKeyHunter facilitates what is scientifically classified as a “Private Key Compromise Attack,” falling under the Common Weakness Enumeration categories CWE-119 (Buffer Overflow) and CWE-312 (Cleartext Storage of Sensitive Information). The attack vector operates through the following mechanism:clouddefense

  1. Target Identification: The tool scans for Bitcoin addresses generated using vulnerable Libbitcoin Explorer versions by analyzing blockchain transaction patterns and wallet creation metadata.
  2. Entropy Reconstruction: Using knowledge of the limited entropy space, VulnKeyHunter reconstructs possible seed values based on estimated wallet creation timeframes.
  3. Key Derivation: The tool systematically generates private keys using the same flawed PRNG implementation, testing each generated key against known Bitcoin addresses.
  4. Asset Extraction: Upon successful private key recovery, the tool can generate valid transactions to transfer funds from compromised wallets.

3.2 Real-World Impact Assessment

The practical deployment of tools like VulnKeyHunter has resulted in significant financial losses within the Bitcoin ecosystem. Research indicates that attackers exploiting the CVE-2023-39910 vulnerability have successfully stolen over $900,000 worth of Bitcoin and other cryptocurrencies as of August 2023. One particularly notable incident involved the theft of 9.7441 BTC (approximately $278,318) in a single attack.cointelegraph+1

The vulnerability’s impact extends beyond Bitcoin to affect multiple cryptocurrency ecosystems, including Ethereum, Ripple, Dogecoin, Solana, Litecoin, Bitcoin Cash, and Zcash, all of which rely on similar entropy generation mechanisms for wallet creation.binance

4. Cryptographic Security Implications

4.1 Systematic Failure Analysis

The VulnKeyHunter attack demonstrates a fundamental principle in cryptographic security: the security of an entire system is only as strong as its weakest component. In this case, the mathematical strength of elliptic curve cryptography (ECC) becomes irrelevant when the entropy generation mechanism fails to provide adequate randomness.clouddefense

The vulnerability highlights several critical security failures:

Insufficient Entropy Sources: The reliance on 32-bit system time as a primary entropy source creates predictable patterns that can be exploited at scale.github

Inadequate PRNG Implementation: The use of Mersenne Twister for cryptographic key generation violates established security best practices, as this PRNG was never designed for cryptographic applications.clouddefense

Lack of Proper Validation: The absence of entropy quality validation mechanisms allowed the deployment of fundamentally insecure key generation processes.github

4.2 Attack Scalability and Automation

VulnKeyHunter’s design enables large-scale automated attacks against vulnerable Bitcoin wallets. The tool can systematically scan the Bitcoin blockchain for addresses exhibiting vulnerability signatures, then deploy computational resources to recover private keys in parallel. This scalability transforms individual wallet compromises into systematic ecosystem-wide attacks.b8c

The automation capabilities include:

  • Blockchain Analysis: Automated scanning of Bitcoin transaction history to identify vulnerable wallet patterns
  • Distributed Computing: Parallel processing of key recovery across multiple computational nodes
  • Real-time Monitoring: Continuous surveillance for newly created vulnerable wallets

5. Defense Mechanisms and Mitigation Strategies

5.1 Immediate Response Protocols

For users potentially affected by the CVE-2023-39910 vulnerability, immediate action is required to prevent asset loss:incibe+1

  1. Asset Migration: All funds from wallets created using Libbitcoin Explorer 3.0.0 through 3.6.0 must be immediately transferred to secure, newly generated wallets using updated software.
  2. Entropy Verification: Implementation of robust entropy testing mechanisms to validate the randomness quality of private key generation processes.
  3. Library Updates: Migration to patched versions of cryptographic libraries that implement secure entropy generation mechanisms.

5.2 Long-term Security Enhancements

Cryptographic Standards Compliance: Implementation of FIPS 140-2 Level 3 or higher entropy generation standards for all cryptocurrency wallet applications.clouddefense

Hardware Security Modules (HSMs): Deployment of dedicated hardware for secure key generation and storage, eliminating reliance on software-based entropy sources.

Regular Security Audits: Establishment of mandatory cryptographic security audits for all cryptocurrency-related software libraries and applications.

6. Regulatory and Industry Implications

6.1 Vulnerability Disclosure Timeline

The CVE-2023-39910 vulnerability disclosure process revealed significant challenges in cryptocurrency security governance. Initial reports to the Libbitcoin development team were met with resistance, with developers claiming the vulnerability was adequately documented despite evidence of widespread exploitation.web3isgoinggreat+1

This response pattern highlights the need for improved vulnerability disclosure protocols and mandatory security standards within the cryptocurrency industry.

6.1 Economic Impact Assessment

The financial impact of VulnKeyHunter-enabled attacks extends beyond direct asset theft. The vulnerability has created:

  • Market Confidence Erosion: Reduced trust in cryptocurrency security infrastructure
  • Compliance Costs: Increased regulatory scrutiny and compliance requirements for cryptocurrency exchanges
  • Insurance Premium Increases: Higher costs for cryptocurrency custody and exchange insurance

7. Future Research Directions

7.1 Advanced Cryptanalysis Techniques

Future research should focus on developing more sophisticated detection mechanisms for entropy-based vulnerabilities. This includes:

  • Machine Learning-Based Vulnerability Detection: Development of AI systems capable of identifying entropy patterns indicative of cryptographic vulnerabilities
  • Quantum-Resistant Entropy Generation: Research into entropy generation mechanisms that remain secure against future quantum computing attacks

7.2 Blockchain Security Infrastructure

The development of blockchain-native security verification systems could provide real-time protection against vulnerability exploitation:

  • On-Chain Entropy Validation: Implementation of smart contracts capable of validating entropy quality for wallet generation
  • Distributed Security Monitoring: Creation of decentralized networks for monitoring and alerting on potential vulnerability exploitation

8. Conclusion

VulnKeyHunter represents more than just a tool for exploiting Bitcoin wallet vulnerabilities; it serves as a stark demonstration of how fundamental cryptographic implementation flaws can compromise the security of entire cryptocurrency ecosystems. The CVE-2023-39910 vulnerability and its exploitation through tools like VulnKeyHunter have resulted in over $900,000 in documented losses and potentially millions more in undiscovered compromises.cointelegraph+1

This research reveals that the security of Bitcoin and other cryptocurrencies depends not only on the mathematical strength of underlying cryptographic algorithms but equally on the quality of their implementation in real-world software systems. The 32-bit entropy limitation in Libbitcoin Explorer transformed theoretically secure 256-bit private keys into practically vulnerable 32-bit systems, demonstrating how implementation flaws can completely negate cryptographic security guarantees.incibe+1

The systematic nature of the vulnerability, affecting thousands of wallets across multiple cryptocurrency platforms, underscores the critical importance of rigorous security auditing and testing protocols for cryptocurrency infrastructure. The reluctance of the Libbitcoin development team to acknowledge the severity of the vulnerability further highlights the need for improved security governance and mandatory disclosure protocols within the cryptocurrency industry.web3isgoinggreat+1

Moving forward, the cryptocurrency ecosystem must prioritize the implementation of robust entropy generation mechanisms, mandatory security auditing procedures, and rapid response protocols for vulnerability disclosure and remediation. Only through such systematic improvements can the industry hope to prevent future VulnKeyHunter-style attacks and maintain the security foundation upon which the entire cryptocurrency ecosystem depends.

The lessons learned from the CVE-2023-39910 vulnerability and its exploitation serve as a critical reminder that in the world of cryptocurrency security, there is no margin for error. Every line of code, every entropy bit, and every cryptographic implementation must meet the highest security standards, as the cost of failure is measured not only in financial losses but in the erosion of trust in the technology that promises to revolutionize global finance.


Bit Harvester Attack: How a single line of code turns a lost Bitcoin wallet into a rich harvest for an attacker; CVE-2023-39910 vulnerability and the Private Key Compromise 0.000 attack; how lax data handling in unsafe_array_cast opened the floodgates for an automated attack and the loss of all funds in Bitcoin wallets

Research paper: Cryptographic vulnerability in libbitcoin key handling and a robust solution

Introduction

In modern blockchain applications, secure generation and storage of cryptographic keys is a fundamental requirement. The slightest vulnerability can lead to the compromise of private keys and significant financial losses. One of the dangerous bugs in the C++ implementation is insecure array handling and type conversion, which can lead to buffer overflows, sensitive data leaks, and successful attacks by attackers. wikipedia+1


How does vulnerability arise?

In the libbitcoin library, the ec_public class contains a section of code that uses a function unsafe_array_castto cast a byte array pointer to a fixed size for a public or private key:

cppunsafe_array_cast<uint8_t, ec_compressed_size>(decoded.data())

This implementation does not check the actual input buffer size against the expected size. As a result, the following attacks are possible when processing invalid or specially crafted data:

  • Buffer Overflow: Writing data beyond the end of an allocated array, potentially overwriting sensitive memory structures. estudogeral.uc+2
  • Leakage of sensitive information: private keys may end up in memory areas accessible to an attacker through dumps or side channels. estudogeral.uc
  • Invalid memory access: When working with uninitialized data, segfaults and unauthorized transfer of private keys may occur. owasp
    This vulnerability was directly exploited in attacks on wallets using weak key generators or insecure array manipulations, such as the Bit Harvester Attack.

Safe way to fix

To eliminate this vulnerability, unsafe conversions must be replaced with strongly typed and verified memory management methods. Here’s a safe implementation of a similar function:

cpp#include <array>
#include <algorithm>
#include <bitcoin/system/define.hpp>

template<typename T, std::size_t N>
std::array<T, N> safe_array_cast(const uint8_t* data, std::size_t size)
{
    std::array<T, N> out{};
    if (size != N) throw std::invalid_argument("Input size mismatch");
    std::copy_n(data, N, out.begin());
    return out;
}

Applying the fix to ec_public:

cpp// Было ранее
// unsafe_array_cast<uint8_t, ec_compressed_size>(decoded.data())

// Стало теперь
auto compressed = safe_array_cast<uint8_t, ec_compressed_size>(decoded.data(), decoded.size());
  • Size checking prevents buffer overflows and ensures valid array manipulation.
  • Size mismatch exceptions allow you to immediately terminate the function and log the incident. estudogeral.uc
  • The initialization guarantee prevents reading garbage from memory.

A solution to protect against future attacks

  1. Use safe array copying methods with bounds checking everywhere (e.g. std::array, std::vector with explicit length validation). owasp
  2. Initializing temporary memory structures to zeros before use (std::fill or memset) and clearing them after working with cryptographic data.
  3. Error monitoring and logging of all incorrect array operations for rapid response to exploitation attempts.
  4. Updating cryptographic libraries and using modern key handling implementations that support secure APIs (e.g., Rust secp256k1, OpenSSL EVP API). github+1
  5. Conducting regular code audits using static and dynamic vulnerability analyzers. estudogeral.uc

Conclusion

Insecure array handling and type casting in cryptographic libraries lead to critical vulnerabilities that can lead to the leakage of private keys and the loss of funds. Only strictly typed, correctly implemented array handling, data boundary checking, regular memory cleanup, and the use of secure APIs can prevent successful attacks and ensure the long-term security of cryptocurrency applications.


Final scientific conclusion

The CVE-2023-39910 vulnerability in the libbitcoin library is a critical cryptographic security vulnerability that demonstrates how a single line of insecure code can have catastrophic consequences for the entire Bitcoin ecosystem. nvd.nist+1

An insecure function unsafe_array_castin libbitcoin’s code makes every Bitcoin wallet a potential victim of a “Private Key Compromise Attack ,” scientifically classified as a CWE-119/CWE-312 attack, where an attacker gains direct access to private keys through a buffer overflow and leaks sensitive data from memory. keyhunters+2

The critical scale of the threat is that a single vulnerable line of code can nullify all of Bitcoin’s cryptographic protection : from the moment a private key is compromised to the complete loss of funds, a matter of minutes passes, and asset recovery becomes physically impossible due to the irreversibility of blockchain transactions. koreascience+1

This vulnerability demonstrates a fundamental principle of cryptographic security: “a chain is only as strong as its weakest link.” In the case of Bitcoin, that weak link turned out to be a primitive memory management error, rendering mathematically secure elliptic curve cryptography useless against targeted attacks.

Final verdict : CVE-2023-39910 serves as a stark reminder that there is no room for compromise on code security in the world of cryptocurrency . Every function, every line, every byte must be subject to the strictest audit, as the cost of an error is measured not only in lost funds but also in damaged trust in the technology that is set to revolutionize the global financial system. acm+2

Bitcoin’s future depends on how seriously the cryptographic community takes the lessons of such vulnerabilities and whether it can create a truly impenetrable fortress for humanity’s digital assets.


  1. https://nvd.nist.gov/vuln/detail/CVE-2023-39910
  2. https://keyhunters.ru/critical-vulnerabilities-of-private-keys-and-rpc-authentication-in-bitcoinlib-analysis-of-security-risks-and-attack-methods-on-bitcoin-cryptocurrency/
  3. https://en.wikipedia.org/wiki/Buffer_overflow
  4. https://owasp.org/www-community/vulnerabilities/Buffer_Overflow
  5. https://www.koreascience.kr/article/JAKO202011161035971.pdf
  6. https://dl.acm.org/doi/full/10.1145/3596906
  7. https://estudogeral.uc.pt/bitstream/10316/101176/1/Characterizing_Buffer_Overflow_Vulnerabilities_in_Large_C_C_Projects.pdf
  1. https://en.wikipedia.org/wiki/Buffer_overflow
  2. https://owasp.org/www-community/vulnerabilities/Buffer_Overflow
  3. https://estudogeral.uc.pt/bitstream/10316/101176/1/Characterizing_Buffer_Overflow_Vulnerabilities_in_Large_C_C_Projects.pdf
  4. https://owasp.org/www-community/attacks/Buffer_overflow_attack
  5. https://github.com/rust-bitcoin/rust-secp256k1/blob/master/src/key.rs
  6. https://habr.com/ru/articles/591129/
  7. http://satoshinakamoto.me/2010/12/11/re-bitcoin-and-buffer-overflow-attacks/
  8. https://www.dcc.fc.up.pt/~edrdo/aulas/qses/lectures/qses-05-buffer-overflows.pdf
  9. https://github.com/nasa/CryptoLib/security/advisories/GHSA-q2pc-c3jx-3852
  10. https://stackoverflow.com/questions/2012645/can-you-help-me-get-my-head-around-openssl-public-key-encryption-with-rsa-h-in-c
  11. https://stackoverflow.com/questions/70155907/ecdsa-parameters-public-key
  12. https://github.com/1200wd/bitcoinlib/blob/master/bitcoinlib/keys.py
  13. https://www.usenix.org/legacy/event/usenix03/tech/full_papers/full_papers/prasad/prasad.pdf
  14. https://bitcoinlib.readthedocs.io/en/latest/source/bitcoinlib.keys.html
  15. https://cryptobook.nakov.com/asymmetric-key-ciphers/elliptic-curve-cryptography-ecc
  16. https://git.distrust.co/milksad/rust-bitcoin-unsafe-fast/commit/64f7d2549ed29bd290a8d7a3aeb4a3b2c51f2a50
  17. https://arxiv.org/pdf/1412.5400.pdf
  18. https://botan.randombit.net/handbook/api_ref/pubkey.html
  19. https://github.com/karask/python-bitcoin-utils/blob/master/bitcoinutils/keys.py
  20. https://www.ibm.com/docs/en/semeru-runtime-ce-z/11.0.0?topic=differences-ec-keys-operations
  1. https://www.incibe.es/en/incibe-cert/early-warning/vulnerabilities/cve-2023-39910
  2. https://cryptodeeptech.ru/milk-sad-vulnerability-in-libbitcoin-explorer/
  3. https://github.com/libbitcoin/libbitcoin-system/wiki/Addresses-and-HD-Wallets
  4. https://stackoverflow.com/questions/17171542/algorithm-for-elliptic-curve-point-compression
  5. https://keyhunters.ru/attack-on-private-key-exposure-we-will-consider-exploiting-errors-that-allow-obtaining-a-private-key-this-is-a-very-dangerous-attack-on-bitcoin-wallets-through-an-opcode-numbering-error-in-bitcoinli/
  6. https://milksad.info/disclosure.html
  7. https://github.com/demining/Milk-Sad-vulnerability-in-the-Libbitcoin-Explorer-3.x
  8. https://github.com/libbitcoin/libbitcoin-system
  9. https://github.com/libbitcoin/libbitcoin-explorer/wiki/cve-2023-39910
  10. https://github.com/libbitcoin/libbitcoin-system/wiki/Altchain-Encrypted-Private-Keys
  11. https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
  12. https://media.ccc.de/v/38c3-dude-where-s-my-crypto-real-world-impact-of-weak-cryptocurrency-keys
  13. https://pdfs.semanticscholar.org/c678/d64aa220af62d1397da19f43c1fef0f08316.pdf
  14. https://moldstud.com/articles/p-essential-tools-libraries-for-bitcoin-cryptography-development-2025-guide
  15. https://bitcoinops.org/en/topics/cve/
  16. https://linuxreviews.org/Serious_Buffer_Overflow_Vulnerability_In_The_Bitcoin_Core_Client_Disclosed
  17. https://www.schneier.com/blog/archives/2023/08/cryptographic-flaw-in-libbitcoin-explorer-cryptocurrency-wallet.html
  18. https://bitcoinops.org/en/newsletters/2020/09/30/
  19. https://www.publish0x.com/cryptodeep/milk-sad-vulnerability-in-the-libbitcoin-explorer-3x-library-xqqmoqd
  20. https://github.com/demining/Vulnerable-to-Debian-OpenSSL-bug-CVE-2008-0166
  21. https://github.com/bitcoin-core/secp256k1/issues/238
  22. https://bitcointalk.org/index.php?topic=5463676.0
  23. https://b8c.ru/author/wallet/page/7/
  24. https://vulert.com/vuln-db/crates-io-libsecp256k1-91988
  25. https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBBITCOINLIBBITCOINEXPLORER-5891151
  26. https://b8c.ru/author/wallet/page/11/
  27. https://github.com/swansontec/libbitcoin/blob/master/ChangeLog
  28. https://github.com/libbitcoin/libbitcoin-explorer/wiki/bx-ec-to-public
  29. https://stackoverflow.com/questions/1239938/accessing-an-array-out-of-bounds-gives-no-error-why
  30. https://helix.stormhub.org/papers/Wijaya%20D.%20A.,%20Anonymity%20in%20Bitcoin.pdf
  31. https://github.com/libbitcoin/libbitcoin-explorer/wiki/bx-ec-to-ek
  32. https://diyhpl.us/wiki/bitcoin/big-pile/
  33. https://github.com/libbitcoin/libbitcoin-explorer/wiki/bx-ec-to-address
  34. https://studylib.net/doc/26314224/mastering-bitcoin-2nd-edition
  35. https://github.com/libbitcoin/libbitcoin-system/wiki/Examples-from-Elliptic-Curve-Operations
  36. https://archive.org/stream/MasteringBitcoin2nd/Mastering%20Bitcoin%202nd%20_djvu.txt
  37. https://lists-ec2.96boards.org/archives/list/linux-stable-mirror@lists.linaro.org/thread/RMXPI5RX4AL5VOORKESIK4KDREOVGVRN/
  38. https://it.scribd.com/document/617480372/Mastering-Bitcoin-Traduzione-Italiana-Della-Guida-Completa-Al-Mondo-Di-Bitcoin-e-Della-Blockchain
  39. https://github.com/libbitcoin/libbitcoin-system/wiki/Working-with-Serialised-Data
  40. https://mastering-bitcoin.doge.tg
  41. https://issues.ecosyste.ms/hosts/GitHub/repositories/libbitcoin%2Flibbitcoin-system/issues
  42. https://www.parazyd.org/git/obelisk/commit/034a96ed80b9abc4e64f88912430d30387329ce8.html
  1. https://keyhunters.ru/critical-vulnerabilities-of-private-keys-and-rpc-authentication-in-bitcoinlib-analysis-of-security-risks-and-attack-methods-on-bitcoin-cryptocurrency/
  2. https://www.koreascience.kr/article/JAKO202011161035971.pdf
  3. https://dl.acm.org/doi/full/10.1145/3596906
  4. https://en.wikipedia.org/wiki/Buffer_overflow
  5. https://owasp.org/www-community/vulnerabilities/Buffer_Overflow
  6. https://estudogeral.uc.pt/bitstream/10316/101176/1/Characterizing_Buffer_Overflow_Vulnerabilities_in_Large_C_C_Projects.pdf
  7. https://cris.bgu.ac.il/en/publications/beatcoin-leaking-private-keys-from-air-gapped-cryptocurrency-wall
  8. https://nvd.nist.gov/vuln/detail/CVE-2023-39910
  9. https://www.securitylab.ru/news/540834.php
  10. https://github.com/libbitcoin/libbitcoin-system/wiki/Working-with-Serialised-Data
  11. https://github.com/libbitcoin/libbitcoin-system/wiki
  12. https://github.com/swansontec/libbitcoin/blob/master/ChangeLog
  13. https://en.bitcoin.it/wiki/Libbitcoin_Common
  14. https://bitcoinops.org/en/newsletters/2020/09/30/
  15. https://pdfs.semanticscholar.org/c678/d64aa220af62d1397da19f43c1fef0f08316.pdf
  16. https://www.merklescience.com/blog/dark-skippy-a-new-threat-to-hardware-wallets
  17. https://libbitcoin.dyne.org/doc/introduction.html
  18. https://arxiv.org/html/2508.01280v1
  19. https://github.com/BWallet/libbitcoin/blob/master/include/bitcoin/bitcoin.hpp
  20. https://arxiv.org/html/2109.07634v3

References

CVE-2023-39910: Weak Entropy Seeding in Libbitcoin Explorer. Cloud Defense AI. https://www.clouddefense.ai/cve/2023/CVE-2023-39910clouddefense

Serious Buffer Overflow Vulnerability In The Bitcoin Core Client Disclosed. Linux Reviews. https://linuxreviews.org/Serious_Buffer_Overflow_Vulnerability_In_The_Bitcoin_Core_Client_Disclosedlinuxreviews

Newly discovered Bitcoin wallet loophole let hackers steal funds – SlowMist. Cointelegraph. https://cointelegraph.com/news/newly-discovered-bitcoin-wallet-loophole-let-hackers-steal-funds-slow-mistcointelegraph

CVE-2023-39910910 | INCIBE-CERT. https://www.incibe.es/en/incibe-cert/early-warning/vulnerabilities/cve-2023-39910

Key Fountain Attack: Turning a Buffer Overflow into a Tool for BTC Theft. KeyHunters. https://keyhunters.ru/key-fountain-attack-turning-a-buffer-overflow-into-a-tool-for-btc-theftkeyhunters

Stealth Hijack Attack – KeyHunters. https://keyhunters.ru/stealth-hijack-attack-recovering-private-keyskeyhunters

CVE-2023-39910 · libbitcoin/libbitcoin-explorer Wiki. GitHub. https://github.com/libbitcoin/libbitcoin-explorer/wiki/cve-2023-39910github

Users’ Private Keys Compromised Due to Libbitcoin. Binance Square. https://www.binance.com/cs/square/post/951306binance

Multiple wallets compromised due to irresponsible encryption in Libbitcoin project. Web3 Is Going Great. https://www.web3isgoinggreat.com/single/libbitcoin-vulnerabilityweb3isgoinggreat

VulnKeyHunter – B8C TECH. https://b8c.ru/page/11/b8c

CryptoScanVuln – B8C TECH. https://b8c.ru/cryptoscanvuln/b8c

  1. https://www.clouddefense.ai/cve/2023/CVE-2023-39910
  2. https://cointelegraph.com/news/newly-discovered-bitcoin-wallet-loophole-let-hackers-steal-funds-slow-mist
  3. https://b8c.ru/page/11/
  4. https://www.incibe.es/en/incibe-cert/early-warning/vulnerabilities/cve-2023-39910
  5. https://github.com/libbitcoin/libbitcoin-explorer/wiki/cve-2023-39910
  6. https://www.web3isgoinggreat.com/single/libbitcoin-vulnerability
  7. https://www.binance.com/cs/square/post/951306
  8. https://linuxreviews.org/Serious_Buffer_Overflow_Vulnerability_In_The_Bitcoin_Core_Client_Disclosed
  9. https://keyhunters.ru/key-fountain-attack-turning-a-buffer-overflow-into-a-tool-for-btc-theft-and-private-key-recovery-in-the-bitcoin-ecosystem-where-an-attacker-gains-the-ability-to-extract-or-replace-bitcoin-wallet-sec/
  10. https://keyhunters.ru/stealth-hijack-attack-recovering-private-keys-and-completely-stealing-a-victims-btc-via-a-bitcoin-script-serialization-vulnerability-where-the-attacker-creates-a-wallet-with-the-public-use-of-a-cu/
  11. https://b8c.ru/cryptoscanvuln/
  12. http://satoshinakamoto.me/2010/12/11/re-bitcoin-and-buffer-overflow-attacks/
  13. https://service.securitm.ru/vm/vulnerability/cve/show/CVE-2023-39910
  14. https://satoshi.nakamotoinstitute.org/fi/posts/bitcointalk/threads/258/
  15. https://cryptodeep.ru/milk-sad-vulnerability-in-libbitcoin-explorer/
  16. https://satoshi.nakamotoinstitute.org/pt-br/posts/bitcointalk/540/
  17. https://dl.acm.org/doi/full/10.1145/3596906
  18. https://nvd.nist.gov/vuln/detail/CVE-2023-39910
  19. https://owasp.org/www-community/vulnerabilities/Buffer_Overflow
  20. https://www.investing.com/news/cryptocurrency-news/libbitcoin-vulnerability-leads-to-900k-theft-from-bitcoin-wallets-3152533
  21. https://www.cve.org/CVERecord?id=CVE-2023-39910
  22. https://www.dcc.fc.up.pt/~edrdo/aulas/qses/lectures/qses-05-buffer-overflows.pdf
  23. https://github.com/brichard19/BitCrack
  24. https://play.google.com/store/apps/details?id=io.github.keyhunter
  25. https://github.com/roginvs/bitcoin-scan
  26. https://journal.engineering.fuoye.edu.ng/index.php/engineer/article/view/1257/685
  27. https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
  28. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  29. https://www.elliptic.co/platform/navigator
  30. https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2025/
  31. https://github.com/ZenGo-X/big-spender
  32. https://onlinelibrary.wiley.com/doi/pdf/10.1002/ajs4.351
  33. https://github.com/topics/btc-tools-2025
  34. https://bitcointalk.org/index.php?topic=977070.0
  35. https://dfpi.ca.gov/consumers/crypto/crypto-scam-tracker/
  36. https://usa.kaspersky.com/blog/vulnerability-in-hot-cryptowallets-from-2011-2015/29456/
  37. https://www.alchemy.com/dapps/best/wallet-security-tools
  38. https://www.chainalysis.com/solution/crypto-investigations/
  39. https://oag.ca.gov/crypto
  40. https://www.sonatype.com/blog/multiple-crypto-packages-hijacked-turned-into-info-stealers