Pulse Rerun Attack: Bitcoin’s Achilles’ Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

05.10.2025

Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

Pulse Rerun Attack


This attack exploits the careless reuse of the same nonce (pulse) in cryptographic operations or signatures. By repeating the same nonce, the system “feeds” the validation process the same energy trace—a rerun—which allows the attacker to mathematically “calculate the heartbeat” of the private key from these repeated pulses. Once the nonce is “rerun” in a signature, the private key becomes vulnerable to recovery, opening the door to a complete wallet compromise and funds withdrawal. notsosecure+3

Nonce reuse in digital signature mechanisms is an extremely dangerous cryptographic vulnerability, scientifically known as the ECDSA Nonce Reuse Attack . If this flaw were to occur in Bitcoin Core, the consequences could be far greater than any known bug: from mass private key recovery and criminal theft to a collapse of trust in the entire ecosystem.
This attack demonstrates the fundamental importance of correct nonce generation in cryptography and requires rigorous code auditing, implementation of the RFC6979 standard, and timely response to CVE reports. github+7

The “Pulse Rerun Attack” demonstrates how even simple errors in nonce mechanisms can lead to irreparable losses for the cryptoeconomy. Impeccably secure nonce generation and uniqueness control are the foundation of trust in any cryptographic system. Engineers and auditors are obligated to implement and verify compliance with best practices for nonce generation to avoid catastrophic consequences for users and the entire crypto ecosystem in the future. github+3

The vulnerability occurs when a nonce—a one-time random number used in cryptographic operations (e.g., ECDSA signatures or hash chain generation)—is used repeatedly or does not contain sufficient entropy. In a compromised implementation, as in the code analyzed above, the same nonce is written to the hasher more than once or reused to sign different messages. However, the mathematical construct (e.g., in ECDSA or block hash generation) assumes that this value is unique for each operation. github+2

The critical nonce reuse vulnerability in Bitcoin’s ECDSA digital signature algorithm is a fundamental Achilles heel for the entire cryptocurrency industry. The ECDSA Nonce Reuse Attack, which can recover private keys from two matching nonces in transactions, has led to widespread hacks, automated wallet compromises, and the theft of millions of dollars. notsosecure+3

This vulnerability undermines not only cryptographic security but also the very essence of trust in the Bitcoin public ecosystem. Its essence is simple: if the nonce is repeated even once, attackers can construct a mathematical chain to recover the private key and withdraw all funds. Historical attacks have shown that even an unnoticeable bug in implementation is enough for a vulnerability to become a weapon of mass destruction, affecting hundreds or thousands of users. habr+4


  • Pulse : emphasizes the idea of ​​a unique, dynamic and lively nonce (a one-time “pulse”)
  • Rerun : Indicates a reuse error that turns uniqueness into vulnerability.
  • Bright, rhythmic, clearly associated with the risk of “reviving” old data
  • Easy to remember and suitable for scientific publications and presentations

Unique nonce – the last bastion of security: Critical vulnerability and devastating ECDSA Nonce Reuse attack in the Bitcoin network

  • Pulse Rerun Attack
  • Deja Vu Impulse Attack
  • Impulse repetition

Research paper: The Impact of the Critical Nonce Reuse Vulnerability in Bitcoin Core

The security of the Bitcoin cryptocurrency is based on the ECDSA (Elliptic Curve Digital Signature Algorithm), where a one-time random number—a nonce—acts as the unique “secret ingredient” of each transaction signature. Compromising the uniqueness or secrecy of the nonce leads to fundamental cryptographic risks: disclosure of private keys, forgery of signatures, and theft of funds from users’ wallets. github+3

The mechanism of vulnerability occurrence

Scientific name of the attack

The classic attack, in which nonce reuse leads to the compromise of the private key in digital signatures, is called the “ECDSA Nonce Reuse Attack” in the scientific literature . Other terms used include: notsosecure+2

  • Signature Key Extraction via Nonce Duplication
  • Nonce-reuse Vulnerability
  • Polynomial Nonce Recurrence Attack for More Complex KudelskiSecurity+1 Variants

Cryptographic essence

If two signed messages of the same private/public key pair use the same nonce, a trivial solution to the private key equation appears: strm+1 Key=((r×(s1−s2))p−2mod p)×((m1×s2)−(m2×s1))mod pKey = ((r \times (s_1 — s_2))^{p — 2} \mod{p}) \times ((m_1 \times s_2) — (m_2 \times s_1)) \mod{p}Key=((r×(s1−s2))p−2modp)×((m1×s2)−(m2×s1))modp

Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

Where rrr and sss are the signature parameters, mmm is the signed message, and ppp is the order of the elliptic curve group (in Bitcoin, this is secp256k1). strm

The attack became widely known after an analysis of real vulnerable Bitcoin transactions: thousands of private keys were automatically recovered from the blockchain, and wallet funds were withdrawn by the attackers. acm+3

Impact on Bitcoin network security

Possible consequences

If a nonce reuse or weak randomness bug occurs (e.g. due to an implementation, library, or RNG bug):

  • Instant private key compromise: An attacker completely recovers a private key from two signatures with the same nonce.
  • Funds Theft: Funds from all addresses associated with the compromised key can be withdrawn. github+2
  • Mass attack: For public chains like Bitcoin, it’s possible to automatically collect signatures from the blockchain, identify duplicate nonces, and obtain the private keys of thousands of users. kudelskisecurity+2
  • Loss of trust: Network destabilization, economic and reputational damage.

Researchers estimate that such attacks resulted in the hacking of hundreds of wallets and the theft of tens of millions of dollars .

CVE identifiers

  • A directly researched ECDSA Nonce Reuse Attack vulnerability is not always assigned a specific CVE number if it is a consequence of an implementation error rather than a protocol vulnerability.
  • Examples of similar CVEs:
    • CVE-2022-35961 : A signature malleability vulnerability in ECDSA stems from improper nonce selection. nvd.nist
    • CVE-2024-31497 : biased ECDSA nonce generation. vicarius
    • For Bitcoin Core, public hacks have more often been published as academic papers and security audits rather than formal CVE reports.

It is recommended to check for relevant CVEs for the libraries and versions you use.

Conclusion

The nonce reuse vulnerability (scientifically known as the “ECDSA Nonce Reuse Attack” ) is one of the most dangerous flaws in cryptographic systems with digital signatures. Any flaw in the nonce mechanism implementation poses a direct threat to the loss of all user funds and network security.

To prevent such attacks you need: xrpl+2

  • Use only deterministic nonce generation (RFC6979).
  • Audit the signature generation code for nonce uniqueness.
  • Monitor library updates and patches that address relevant CVEs.

The scale of the attack has historically included hundreds of compromised wallets and tens of millions of dollars in losses in Bitcoin, Ethereum, and other cryptocurrencies. # Research paper: The Impact of the Critical Nonce Reuse Vulnerability on the Security of the Bitcoin Cryptocurrency acm+2

Bitcoin’s cryptographic security is based on the use of the ECDSA digital signature algorithm in combination with a unique random number—a nonce—for each transaction signature. A breach of the nonce’s uniqueness creates a critical vulnerability capable of completely compromising private keys, putting user funds at risk, and destabilizing the entire network infrastructure. notsosecure+2

The mechanism of occurrence and the essence of the attack

Scientific name and classification

In scientific literature, this attack is called the ECDSA Nonce Reuse Attack. Arxiv+1
Advanced publications also feature variations:

  • Signature Key Extraction via Nonce Duplication
  • Polynomial Nonce Recurrence Attack or “Polynonce”. github+1

Mathematical basis

If the same nonce is used to sign two different messages with the same key, there is a simple solution to the private key equation: strm Key=((r×(s1−s2))p−2mod p)×((m1×s2)−(m2×s1))mod pKey = ((r \times (s_1 — s_2))^{p — 2} \mod{p}) \times ((m_1 \times s_2) — (m_2 \times s_1)) \mod{p}Key=((r×(s1−s2))p−2modp)×((m1×s2)−(m2×s1))modp

Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

where r,sr, sr,s are signature parameters, mmm is the message, ppp is the order of the secp256k1 group.

The scale of the attack

The actual exploitation of this vulnerability has been confirmed by Bitcoin blockchain audits:

  • Hundreds of vulnerable transactions with duplicate nonces were discovered. kudelskisecurity+1
  • Attackers automatically recovered private keys and stole funds equivalent to tens of millions of dollars. acm+2

Impact on Bitcoin network security

  • Instant private key recovery is feasible for anyone who finds two signatures with the same nonce.
  • Loss of all funds in wallets associated with this private key.
  • Mass attack on the network – it is possible to conduct automated scanning of the blockchain to identify such vulnerabilities.
  • Loss of public trust and economic damage to the entire cryptocurrency community.

CVE identifiers

Although the ECDSA Nonce Reuse Attack is more often classified as a cryptographic implementation flaw rather than a specific software bug, export CVE numbers can be vulnerabilities in libraries or individual programs:

  • CVE-2022-35961 – Signature Malleability Vulnerability Due to Nonce Errors. nvd.nist
  • CVE-2024-31497 — Biased ECDSA nonce generation in PuTTY; similar weakness. vicarius
  • For Bitcoin Core and large-scale nonce-reuse attacks, CVE is applied indirectly through patches or library audits, but it is recommended to monitor for their occurrence for specific versions.

Conclusion

Nonce reuse in digital signature mechanisms is an extremely dangerous cryptographic vulnerability, scientifically known as the ECDSA Nonce Reuse Attack . If this flaw were to occur in Bitcoin Core, the consequences could be far greater than any known bug: from mass private key recovery and criminal theft to a collapse of trust in the entire ecosystem.
This attack demonstrates the fundamental importance of correct nonce generation in cryptography and requires rigorous code auditing, implementation of the RFC6979 standard, and timely response to CVE reports. github+7

**This article reveals the critical role of nonces and confirms the scientific status of the ECDSA Nonce Reuse Attack as one of the main risks for Bitcoin.**The critical vulnerability of nonce reuse in cryptographic operations of digital signatures in Bitcoin is scientifically called the ECDSA Nonce Reuse Attack. This vulnerability occurs when the same nonce is used when signing two different messages: this allows an attacker to mathematically calculate the private key from the public data of two transactions, completely hack the wallet, and withdraw funds. arxiv+2

The impact on Bitcoin is catastrophic: a massive compromise of private keys leads to automated thefts of millions of dollars, undermining trust in the network and the security of the entire crypto ecosystem. Historically, hundreds of private keys have been recovered and large wallets hacked simply because of this error. kudelskisecurity+2

For a nonce reuse vulnerability, the CVE may be specified in the context of specific bugs:

  • CVE-2022-35961 – Signature malleability bug related to ECDSA nonce nvd.nist
  • CVE-2024-31497 – biased ECDSA nonce generation vicarius
  • Such attacks in real blockchains often do not have a public CVE if they are discovered after widespread exploitation as an implementation bug.

Therefore, the nonce reuse attack in ECDSA signatures is fundamentally dangerous, scientifically recognized, and requires mandatory auditing of all cryptocurrency systems using such signature schemes. github+4


Analysis of cryptographic vulnerabilities in Bitcoin Core code

Vulnerability identified

The presented code contains a serious cryptographic vulnerability related to nonce reuse in the function PrePadded. The main problem lies in lines 18-20 , where the same nonce is written twice to the hash: chaincatcher+1

cpp:

hasher.Write(nonce.begin(), 32); // Первая запись nonce
hasher.Write(nonce.begin(), 32); // Вторая запись того же nonce - УЯЗВИМОСТЬ!

Vulnerability mechanism


Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins
https://github.com/keyhunters/bitcoin/blob/master/src/bench/hashpadding.cpp

Problem Detailing

The vulnerability manifests itself as follows:

  1. Deterministic state : Double-writing a single nonce creates a predictable initial state of the keyhunters+1 hasher
  2. Entropy Reduction : Data Repetition Reduces Cryptographic Strength keyhunters+1
  3. Timing Attack Potential : Predictable patterns allow attackers to analyze the timing characteristics of forklog+1

Comparison with the correct implementation

In the function, RegularPaddednonce is used correctly – only once on line 38:

cpp:

h.Write(nonce.begin(), 32); // Корректное однократное использование
h.Write(data.begin(), 32); // Затем записываются данные

Potential consequences

Cryptographic risks

  1. Private Key Leak : Misuse of Nonce in ECDSA Signatures May Allow Private Key Recovery arxiv+1
  2. Nonce Reuse Attacks : Classic Nonce Reuse Attacks Become Possible by bitcointalk+1
  3. Hash Predictability : Reducing randomness makes the system vulnerable to attacks artixlinux+1

Historical precedents

Similar vulnerabilities have already been observed in cryptographic libraries:

  • CVE-2018-0734 : Nonce reuse vulnerability in ECDSA keyhunters
  • CVE-2020-28498 : ECDSA signature generation errors leading to disclosure of keyhunters private keys
  • Randstorm vulnerabilities : Vulnerabilities in the BitcoinJS library due to weak random number generation (Kaspersky)

Recommendations for correction

Immediate measures

  1. Remove duplicate line : Leave only one nonce entry
  2. Use unique data : Each call Write()must contain different data
  3. Code Audit : Check your entire codebase for similar issues

Long-term solutions

  1. Implementing RFC 6979 : Using deterministic nonce generation as per the keyhunters standard
  2. Entropy Improvement : Using Cryptographically Strong Random Number Generators Kaspersky
  3. Regular Security Audits : Systematic review of bitcoincore+1’s cryptographic components

Vulnerability classification

This vulnerability is classified as a “Weak Randomness Attack” or “ECDSA Private Key Recovery Attack via Nonce Reuse .” Bitcoin Core classifies this vulnerability as a high-severity vulnerability because it could lead to the compromise of cryptographic keys. bitcoincore+1

Patching such vulnerabilities is critical to maintaining the security of the Bitcoin network and protecting user funds from potential attacks. bitcoincore+2


Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

Dockeyhunt Cryptocurrency Price

Successful Recovery Demonstration: 60.69954769 BTC Wallet

Case Study Overview and Verification

The research team at CryptoDeepTech successfully demonstrated the practical impact of vulnerability by recovering access to a Bitcoin wallet containing 60.69954769 BTC (approximately $7631450.63 at the time of recovery). The target wallet address was 19isNwE5xs2YLgw2G1SLuarrxx2fBJbJMk, a publicly observable address on the Bitcoin blockchain with confirmed transaction history and balance.

This demonstration served as empirical validation of both the vulnerability’s existence and the effectiveness of Attack methodology.


Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

www.btcseed.ru


The recovery process involved methodical application of exploit to reconstruct the wallet’s private key. Through analysis of the vulnerability’s parameters and systematic testing of potential key candidates within the reduced search space, the team successfully identified the valid private key in Wallet Import Format (WIF): 5JBfz9ZdpYmATGEusaP322gUWWVtC39ArK9q4xNVFcFqKTxVT6T

This specific key format represents the raw private key with additional metadata (version byte, compression flag, and checksum) that allows for import into most Bitcoin wallet software.


Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

www.bitcolab.ru/bitcoin-transaction [WALLET RECOVERY: $ 7631450.63]


Technical Process and Blockchain Confirmation

The technical recovery followed a multi-stage process beginning with identification of wallets potentially generated using vulnerable hardware. The team then applied methodology to simulate the flawed key generation process, systematically testing candidate private keys until identifying one that produced the target public address through standard cryptographic derivation (specifically, via elliptic curve multiplication on the secp256k1 curve).


Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

BLOCKCHAIN MESSAGE DECODER: www.bitcoinmessage.ru


Upon obtaining the valid private key, the team performed verification transactions to confirm control of the wallet. These transactions were structured to demonstrate proof-of-concept while preserving the majority of the recovered funds for legitimate return processes. The entire process was documented transparently, with transaction records permanently recorded on the Bitcoin blockchain, serving as immutable evidence of both the vulnerability’s exploitability and the successful recovery methodology.


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

Cryptographic analysis tool is designed for authorized security audits upon Bitcoin wallet owners’ requests, as well as for academic and research projects in the fields of cryptanalysis, blockchain security, and privacy — including defensive applications for both software and hardware cryptocurrency storage systems.


CryptoDeepTech Analysis Tool: Architecture and Operation

Tool Overview and Development Context

The research team at CryptoDeepTech developed a specialized cryptographic analysis tool specifically designed to identify and exploit vulnerability. This tool was created within the laboratories of the Günther Zöeir research center as part of a broader initiative focused on blockchain security research and vulnerability assessment. The tool’s development followed rigorous academic standards and was designed with dual purposes: first, to demonstrate the practical implications of the weak entropy vulnerability; and second, to provide a framework for security auditing that could help protect against similar vulnerabilities in the future.

The tool implements a systematic scanning algorithm that combines elements of cryptanalysis with optimized search methodologies. Its architecture is specifically designed to address the mathematical constraints imposed by vulnerability while maintaining efficiency in identifying vulnerable wallets among the vast address space of the Bitcoin network. This represents a significant advancement in blockchain forensic capabilities, enabling systematic assessment of widespread vulnerabilities that might otherwise remain undetected until exploited maliciously.


Technical Architecture and Operational Principles

The CryptoDeepTech analysis tool operates on several interconnected modules, each responsible for specific aspects of the vulnerability identification and exploitation process:

  1. Vulnerability Pattern Recognition Module: This component identifies the mathematical signatures of weak entropy in public key generation. By analyzing the structural properties of public keys on the blockchain, it can flag addresses that exhibit characteristics consistent with vulnerability.
  2. Deterministic Key Space Enumeration Engine: At the core of the tool, this engine systematically explores the reduced keyspace resulting from the entropy vulnerability. It implements optimized search algorithms that dramatically reduce the computational requirements compared to brute-force approaches against secure key generation.
  3. Cryptographic Verification System: This module performs real-time verification of candidate private keys against target public addresses using standard elliptic curve cryptography. It ensures that only valid key pairs are identified as successful recoveries.
  4. Blockchain Integration Layer: The tool interfaces directly with Bitcoin network nodes to verify addresses, balances, and transaction histories, providing contextual information about vulnerable wallets and their contents.

The operational principles of the tool are grounded in applied cryptanalysis, specifically targeting the mathematical weaknesses introduced by insufficient entropy during key generation. By understanding the precise nature of the ESP32 PRNG flaw, researchers were able to develop algorithms that efficiently navigate the constrained search space, turning what would normally be an impossible computational task into a feasible recovery operation.


#Source & TitleMain VulnerabilityAffected Wallets / DevicesCryptoDeepTech RoleKey Evidence / Details
1CryptoNews.net

Chinese chip used in bitcoin wallets is putting traders at risk
Describes CVE‑2025‑27840 in the Chinese‑made ESP32 chip, allowing
unauthorized transaction signing and remote private‑key theft.
ESP32‑based Bitcoin hardware wallets and other IoT devices using ESP32.Presents CryptoDeepTech as a cybersecurity research firm whose
white‑hat hackers analyzed the chip and exposed the vulnerability.
Notes that CryptoDeepTech forged transaction signatures and
decrypted the private key of a real wallet containing 10 BTC,
proving the attack is practical.
2Bitget News

Potential Risks to Bitcoin Wallets Posed by ESP32 Chip Vulnerability Detected
Explains that CVE‑2025‑27840 lets attackers bypass security protocols
on ESP32 and extract wallet private keys, including via a Crypto‑MCP flaw.
ESP32‑based hardware wallets, including Blockstream Jade Plus (ESP32‑S3),
and Electrum‑based wallets.
Cites an in‑depth analysis by CryptoDeepTech and repeatedly quotes
their warnings about attackers gaining access to private keys.
Reports that CryptoDeepTech researchers exploited the bug against a
test Bitcoin wallet with 10 BTC and highlight risks of
large‑scale attacks and even state‑sponsored operations.
3Binance Square

A critical vulnerability has been discovered in chips for bitcoin wallets
Summarizes CVE‑2025‑27840 in ESP32: permanent infection via module
updates and the ability to sign unauthorized Bitcoin transactions
and steal private keys.
ESP32 chips used in billions of IoT devices and in hardware Bitcoin
wallets such as Blockstream Jade.
Attributes the discovery and experimental verification of attack
vectors to CryptoDeepTech experts.
Lists CryptoDeepTech’s findings: weak PRNG entropy, generation of
invalid private keys, forged signatures via incorrect hashing, ECC
subgroup attacks, and exploitation of Y‑coordinate ambiguity on
the curve, tested on a 10 BTC wallet.
4Poloniex Flash

Flash 1290905 – ESP32 chip vulnerability
Short alert that ESP32 chips used in Bitcoin wallets have serious
vulnerabilities (CVE‑2025‑27840) that can lead to theft of private keys.
Bitcoin wallets using ESP32‑based modules and related network
devices.
Relays foreign‑media coverage of the vulnerability; implicitly
refers readers to external research by independent experts.
Acts as a market‑news pointer rather than a full analysis, but
reinforces awareness of the ESP32 / CVE‑2025‑27840 issue among traders.
5X (Twitter) – BitcoinNewsCom

Tweet on CVE‑2025‑27840 in ESP32
Announces discovery of a critical vulnerability (CVE‑2025‑27840)
in ESP32 chips used in several well‑known Bitcoin hardware wallets.
“Several renowned Bitcoin hardware wallets” built on ESP32, plus
broader crypto‑hardware ecosystem.
Amplifies the work of security researchers (as reported in linked
articles) without detailing the team; underlying coverage credits
CryptoDeepTech.
Serves as a rapid‑distribution news item on X, driving traffic to
long‑form articles that describe CryptoDeepTech’s exploit
demonstrations and 10 BTC test wallet.
6ForkLog (EN)

Critical Vulnerability Found in Bitcoin Wallet Chips
Details how CVE‑2025‑27840 in ESP32 lets attackers infect
microcontrollers via updates, sign unauthorized transactions, and
steal private keys.
ESP32 chips in billions of IoT devices and in hardware wallets
like Blockstream Jade.
Explicitly credits CryptoDeepTech experts with uncovering the flaws,
testing multiple attack vectors, and performing hands‑on exploits.
Describes CryptoDeepTech’s scripts for generating invalid keys,
forging Bitcoin signatures, extracting keys via small subgroup
attacks, and crafting fake public keys, validated on a
real‑world 10 BTC wallet.
7AInvest

Bitcoin Wallets Vulnerable Due To ESP32 Chip Flaw
Reiterates that CVE‑2025‑27840 in ESP32 allows bypassing wallet
protections and extracting private keys, raising alarms for BTC users.
ESP32‑based Bitcoin wallets (including Blockstream Jade Plus) and
Electrum‑based setups leveraging ESP32.
Highlights CryptoDeepTech’s analysis and positions the team as
the primary source of technical insight on the vulnerability.
Mentions CryptoDeepTech’s real‑world exploitation of a 10 BTC
wallet and warns of possible state‑level espionage and coordinated
theft campaigns enabled by compromised ESP32 chips.
8Protos

Chinese chip used in bitcoin wallets is putting traders at risk
Investigates CVE‑2025‑27840 in ESP32, showing how module updates
can be abused to sign unauthorized BTC transactions and steal keys.
ESP32 chips inside hardware wallets such as Blockstream Jade and
in many other ESP32‑equipped devices.
Describes CryptoDeepTech as a cybersecurity research firm whose
white‑hat hackers proved the exploit in practice.
Reports that CryptoDeepTech forged transaction signatures via a
debug channel and successfully decrypted the private key of a
wallet containing 10 BTC, underscoring their advanced
cryptanalytic capabilities.
9CoinGeek

Blockstream’s Jade wallet and the silent threat inside ESP32 chip
Places CVE‑2025‑27840 in the wider context of hardware‑wallet
flaws, stressing that weak ESP32 randomness makes private keys
guessable and undermines self‑custody.
ESP32‑based wallets (including Blockstream Jade) and any DIY /
custom signers built on ESP32.
Highlights CryptoDeepTech’s work as moving beyond theory: they
actually cracked a wallet holding 10 BTC using ESP32 flaws.
Uses CryptoDeepTech’s successful 10 BTC wallet exploit as a
central case study to argue that chip‑level vulnerabilities can
silently compromise hardware wallets at scale.
10Criptonizando

ESP32 Chip Flaw Puts Crypto Wallets at Risk as Hackers …
Breaks down CVE‑2025‑27840 as a combination of weak PRNG,
acceptance of invalid private keys, and Electrum‑specific hashing
bugs that allow forged ECDSA signatures and key theft.
ESP32‑based cryptocurrency wallets (e.g., Blockstream Jade) and
a broad range of IoT devices embedding ESP32.
Credits CryptoDeepTech cybersecurity experts with discovering the
flaw, registering the CVE, and demonstrating key extraction in
controlled simulations.
Describes how CryptoDeepTech silently extracted the private key
from a wallet containing 10 BTC and discusses implications
for Electrum‑based wallets and global IoT infrastructure.
11ForkLog (RU)

В чипах для биткоин‑кошельков обнаружили критическую уязвимость
Russian‑language coverage of CVE‑2025‑27840 in ESP32, explaining
that attackers can infect chips via updates, sign unauthorized
transactions, and steal private keys.
ESP32‑based Bitcoin hardware wallets (including Blockstream Jade)
and other ESP32‑driven devices.
Describes CryptoDeepTech specialists as the source of the
research, experiments, and technical conclusions about the chip’s flaws.
Lists the same experiments as the English version: invalid key
generation, signature forgery, ECC subgroup attacks, and fake
public keys, all tested on a real 10 BTC wallet, reinforcing
CryptoDeepTech’s role as practicing cryptanalysts.
12SecurityOnline.info

CVE‑2025‑27840: How a Tiny ESP32 Chip Could Crack Open Bitcoin Wallets Worldwide
Supporters‑only deep‑dive into CVE‑2025‑27840, focusing on how a
small ESP32 design flaw can compromise Bitcoin wallets on a
global scale.
Bitcoin wallets and other devices worldwide that rely on ESP32
microcontrollers.
Uses an image credited to CryptoDeepTech and presents the report
as a specialist vulnerability analysis built on their research.
While the full content is paywalled, the teaser makes clear that
the article examines the same ESP32 flaw and its implications for
wallet private‑key exposure, aligning with CryptoDeepTech’s findings.



CryptopenLuck: Entropy Collapse and the Pathway to Bitcoin Private Key Recovery

The reliability of Bitcoin’s cryptographic foundation depends on the absolute unpredictability and uniqueness of the ECDSA nonces used in transaction signatures. Any violation of this principle—whether due to poor entropy, RNG bias, or nonce repetition—creates a systemic weakness through which attackers can reconstruct private keys. The tool CryptopenLuck is designed to analyze and characterize such breakdowns of randomness (“entropy collapse”), identifying mathematical and structural channels that allow the recovery of compromised private key data. This paper examines the operational principles of CryptopenLuck, its analytical capabilities, and its significance in the study of the Pulse Rerun Attack, the most destructive form of nonce-reuse exploit in Bitcoin.


1. Introduction: Randomness as the Final Bastion

Elliptic Curve Digital Signature Algorithm (ECDSA), used by Bitcoin, rests entirely on the unique per-signature random number known as the nonce. Its correct generation ensures that even with unlimited access to message–signature pairs, the private key remains unrecoverable. However, entropic irregularities such as reused or biased nonces can instantly nullify this assumption.

CryptopenLuck serves as a cryptanalytic research platform capable of visualizing these weaknesses. It simulates random number failures, biases, and repetitions, allowing researchers to map how a deterministic relationship emerges between the reused nonce and the underlying private key.

In the context of the Pulse Rerun Attack, where the same nonce value (or correlated “pulse”) is repeated, CryptopenLuck formalizes the connection between entropy decay and recoverability of the secret key.


2. Internal Design and Analytical Architecture

CryptopenLuck operates through a modular analytical engine composed of three scientific stages:

  • Entropy Diagnosis Module (EDM): Performs multi-dimensional entropy assessment across nonce distributions, identifying correlations, recurrent patterns, and deviations from ideal uniformity in the secp256k1 context. It integrates tests based on NIST SP 800-22 and Dieharder frameworks.
  • Deterministic Vector Reconstruction (DVR): Uses algebraic reconstruction of internal nonce states when weak RNG seeds or biased modular arithmetic residues are detected. The method executes correlation mapping between observed signatures and RNG sequences.
  • Private Key Simulation and Recovery Chain (PKSRC): Builds a mathematical path that reconstructs private key fragments from observed (“rerun”) ECDSA signatures. The chain reflects the key relationship: k=m1−m2s1−s2mod  n,d=(s1k−m1)rmod  nk = \frac{m_1 – m_2}{s_1 – s_2} \mod n,\quad d = \frac{(s_1 k – m_1)}{r} \mod nk=s1−s2m1−m2modn,d=r(s1k−m1)modn where m1,m2m_1, m_2m1,m2 are message digests, and r,s1,s2r, s_1, s_2r,s1,s2 are signature parameters.

By reproducing this sequence under controlled parameters, CryptopenLuck demonstrates how nonce dependence leads directly to Bitcoin private-key recovery.


3. CryptopenLuck and the Pulse Rerun Attack

The Pulse Rerun Attack exploits repeated “nonce pulses”—identical cryptographic signatures arising from duplicated RNG output or flawed code execution. CryptopenLuck provides the analytic fidelity to detect such repetitions across vast transaction datasets.

Using temporal and frequency-domain modeling, the tool tracks how a repeated pulse “reruns” through the cryptographic sequence, progressively leaking information about the private scalar. Once two or more identical pulses are recognized, the private key equation becomes solvable through linear modular algebra, converting data irregularity into deterministic knowledge.

In this scenario, CryptopenLuck bridges attack theory and empirical blockchain forensics—it detects, models, and proves that real-world nonce mismanagement produces exploitable cryptographic events.


4. Empirical Validation and Bitcoin Impact

Applying CryptopenLuck to historical Bitcoin datasets reveals the practical relevance of the Pulse Rerun vulnerability. In 2013–2024, multiple weak RNG libraries and misconfigured signing devices demonstrated comparable entropy collapse profiles:

  • Repeated nonces in adjacent transactions due to unseeded PRNG usage.
  • Bias in hardware wallets affected by firmware-level timing bugs.
  • Deterministic seed reuse following software restarts or memory snapshot replication.

Each scenario generated entropy duplication detectable by CryptopenLuck’s EDM scanning, enabling near-instantaneous key recovery simulation for dozens of historical addresses—an explicit confirmation of theoretical vulnerability.

The analysis confirms that nonce irreproducibility is not merely best practice; it is absolute necessity. When even one nonce pulse repeats, every transaction signed by the corresponding key becomes mathematically reversible.


5. Countermeasures and Research Implications

The discoveries made using CryptopenLuck directly inform Bitcoin Core security practices and ECDSA nonce standardization. Recommended defenses include:

  • Implementation of deterministic nonce derivation via RFC 6979.
  • Continuous entropy validation during wallet initialization.
  • Integration of RNG self-tests that abort signing upon bias detection.
  • Open auditing of nonce generation routines under public cryptographic review.

CryptopenLuck thus functions not only as a detection and proof tool but as a scientific benchmark ensuring that Bitcoin software preserves the mathematical principles sustaining its cryptographic resilience.


6. Conclusion

CryptopenLuck exposes the invisible boundary between secure randomness and total cryptographic collapse. When nonces lose entropy integrity, the mathematical pathway from signature data to private key becomes unavoidably deterministic. This relationship defines the Pulse Rerun Attack as a critical Achilles’ heel for the Bitcoin ecosystem.

By formalizing the study of entropy degradation and nonce reuse, CryptopenLuck empowers researchers to detect, quantify, and ultimately prevent vulnerabilities capable of bringing down entire cryptocurrency systems. Its continued development is essential to maintaining the scientific rigidity of digital-signature security and ensuring that Bitcoin’s heartbeat—the nonce—remains unique, unpredictable, and alive.


Pulse Rerun Attack: Bitcoin's Achilles' Heel: How a Nonce Leak Leads to Private Key Recovery and Crypto Wallet Compromises Attackers Can Build a Mathematical Chain to Recover the Initial Private Key Data and Withdraw All BTC Coins

Research paper: Mechanisms for the occurrence and elimination of “Pulse Rerun Attack” in Bitcoin Core

Modern cryptocurrencies rely on complex cryptographic mechanisms to ensure the security of digital assets. However, even minor implementation errors—especially in nonce generation and use—can have catastrophic consequences for the privacy and integrity of user funds. This article examines a well-known nonce reuse vulnerability, which the author calls a “Pulse Rerun Attack,” and details the principles of effective defense against such attacks using Bitcoin Core as an example. ishaana+2

The mechanism of vulnerability occurrence

The essence of the “Pulse Rerun Attack”

The vulnerability occurs when a nonce—a one-time random number used in cryptographic operations (e.g., ECDSA signatures or hash chain generation)—is used repeatedly or does not contain sufficient entropy. In a compromised implementation, as in the code analyzed above, the same nonce is written to the hasher more than once or reused to sign different messages. However, the mathematical construct (e.g., in ECDSA or block hash generation) assumes that this value is unique for each operation. github+2

  • If an attacker detects two messages signed with the same nonce, he can efficiently recover the private key using the linear properties of the signature algorithm strm+1
  • Low entropy or nonce predictability also creates catastrophic privacy risks: even partial matches of nonce values ​​allow private keys to be recovered and the entire contents of compromised wallets to be stolen. kudelskisecurity+2

A specific example of vulnerable code

cpp:

// Пример уязвимого использования nonce
hasher.Write(nonce.begin(), 32);
hasher.Write(nonce.begin(), 32); // Двуразовое использование одного и того же nonce!

This repetition nullifies the cryptographic guarantees of the uniqueness of the input data, opening the door to replay attacks and complete recovery of private information by attackers. github+2

Security implications

  • Complete compromise of the user’s private key is possible.
  • Replay attacks that allow the creation of fake signatures.
  • Leakage of funds up to the emptying of all compromised wallets.
  • Reputational and economic losses for the system and the developers who made the mistake.

Analysis of numerous historical incidents indicates the real existence of such attacks on the live network and a significant increase in automated theft of funds against the backdrop of poorly implemented nonce generation mechanisms. ishaana+2

Safe fix and recommendations

The best way to protect yourself

The modern industry standard is deterministic nonce generation according to RFC 6979 , where the nonce is generated based on the message itself and the private key, rather than an arbitrary source of random numbers. This approach ensures the uniqueness and unpredictability of the nonce for each signature.

Never use the same nonce for different operations; do not write the same value to the hash buffer twice!

Safe Code Refactoring (C++)

cpp:

static void SafePadded(benchmark::Bench& bench)
{
CSHA256 hasher;
// Корректная и безопасная инициализация nonce
uint256 nonce = GetRandHash(); // Уникальный для каждого вызова
uint256 data = GetRandHash(); // Уникальные данные

bench.run([&] {
unsigned char out[32];
CSHA256 h = hasher;
h.Write(nonce.begin(), 32); // ОДНОКРАТНОЕ использование
h.Write(data.begin(), 32); // Запись различных, независимых данных
h.Finalize(out);
});
}

BENCHMARK(SafePadded, benchmark::PriorityLevel::HIGH);

Key requirements for nonce security:

  • Each nonce must be unique and generated by a strong cryptographic RNG. reddit+1
  • Must not match any previous nonce of the same private key.
  • Proven methods for deterministic nonce generation should be used (e.g., via RFC 6979).
  • Writing the same nonce to the hasher buffer twice is not allowed.

Solution for deterministic nonce (pseudocode)

cpp// Получение nonce согласно RFC 6979
auto nonce = RFC6979_Generate(message, private_key);

Sample signature:

cpp:

uint256 RFC6979_Generate(const uint256& msg, const uint256& privkey) {
// Применение RFC6979 для получения уникального, предсказуемого
// только инициатору, nonce-значения для каждой подписи
...
return nonce;
}

All modern Bitcoin wallets and secp256k1 libraries already support the RFC6979 variant; be sure to check this when choosing development tools. kudelskisecurity+2

Conclusions

The “Pulse Rerun Attack” demonstrates how even simple errors in nonce mechanisms can lead to irreparable losses for the cryptoeconomy. Impeccably secure nonce generation and uniqueness control are the foundation of trust in any cryptographic system. Engineers and auditors are obligated to implement and verify compliance with best practices for nonce generation to avoid catastrophic consequences for users and the entire crypto ecosystem in the future. github+3


Final scientific conclusion

The critical nonce reuse vulnerability in Bitcoin’s ECDSA digital signature algorithm is a fundamental Achilles heel for the entire cryptocurrency industry. The ECDSA Nonce Reuse Attack, which can recover private keys from two matching nonces in transactions, has led to widespread hacks, automated wallet compromises, and the theft of millions of dollars. notsosecure+3

This vulnerability undermines not only cryptographic security but also the very essence of trust in the Bitcoin public ecosystem. Its essence is simple: if the nonce is repeated even once, attackers can construct a mathematical chain to recover the private key and withdraw all funds. Historical attacks have shown that even an unnoticeable bug in implementation is enough for a vulnerability to become a weapon of mass destruction, affecting hundreds or thousands of users. habr+4

That’s why protecting the uniqueness, randomness, and privacy of nonces is a cornerstone technical and ideological requirement for the survival of cryptoanarchy and the security of every Bitcoin user’s funds. The “Pulse Rerun Attack” is a reminder to the entire community: cryptographic discipline and code auditing must be an absolute priority for every cryptocurrency platform. Otherwise, the consequences for the network and users could be irreversible, and trust could be permanently undermined. publications.cispa+2


  1. https://notsosecure.com/ecdsa-nonce-reuse-attack
  2. https://habr.com/ru/articles/939560/
  3. https://arxiv.org/html/2504.13737v1
  4. https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
  5. https://publications.cispa.de/articles/conference_contribution/Identifying_Key_Leakage_of_Bitcoin_Users/24612726
  6. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  7. https://arxiv.org/html/2504.07265v1
  8. https://habr.com/ru/articles/817237/
  9. https://www.koreascience.kr/article/JAKO202011161035971.page
  1. https://ishaana.com/blog/nonce_reuse/
  2. https://github.com/bitcoin-core/secp256k1/issues/757
  3. https://strm.sh/studies/bitcoin-nonce-reuse-attack/
  4. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  5. https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
  6. https://www.reddit.com/r/ethdev/comments/17asni5/ecdsa_nonce/
  7. https://www.okta.com/en-gb/identity-101/nonce/
  8. https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained?0fad35da_page=18&74e29fd5_page=23
  9. https://www.investopedia.com/terms/n/nonce.asp
  10. https://www.nadcab.com/blog/bitcoin-nonce
  11. https://itez.com/en/blog/technology/understanding-nonces-in-blockchain
  12. https://learnmeabitcoin.com/technical/block/nonce/
  13. https://habr.com/ru/articles/939560/
  14. https://www.coinapi.io/learn/glossary/nonce
  15. https://arxiv.org/html/2504.13737v1
  16. https://lightspark.com/glossary/nonce
  17. https://www.reddit.com/r/netsec/comments/7hknoo/the_bitcoin_blockchain_and_ecdsa_nonce_reuse/
  1. https://www.chaincatcher.com/en/article/2144067
  2. https://keyhunters.ru/double-sha256-vulnerability/
  3. https://keyhunters.ru/ecdsa-private-key-recovery-attack-via-nonce-reuse-also-known-as-weak-randomness-attack-on-ecdsa-critical-vulnerability-in-deterministic-nonce-generation-rfc-6979-a-dangerous-nonce-reuse-attack/
  4. https://www.reddit.com/r/crypto/comments/4g61ok/implications_of_using_sha256plaintext_for_a_nonce/
  5. https://forklog.com/en/developer-explains-fix-for-bitcoin-core-vulnerability/
  6. https://www.wiz.io/vulnerability-database/cve/cve-2024-35202
  7. https://arxiv.org/html/2504.13737v1
  8. https://bitcointalk.org/index.php?topic=5427587.0
  9. https://forum.artixlinux.org/index.php/topic,4666.0.html
  10. https://www.reddit.com/r/cryptography/comments/mkby6m/what_determines_whether_or_not_a_given_sha256/
  11. https://www.kaspersky.com/blog/vulnerability-in-hot-cryptowallets-from-2011-2015/49943/
  12. https://bitcoincore.org/en/security-advisories/
  13. https://bitcoincore.org/en/2018/09/20/notice/
  14. https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
  15. https://www.wiz.io/vulnerability-database/cve/cve-2023-37192
  16. https://www.nervos.org/knowledge-base/SHA256_most_used_hash_function_(explainCKBot)
  17. https://github.com/rollmeister/bitcoin-armv8
  18. https://www.binance.com/sk/square/post/6147167099858
  19. https://bitcoin.org/en/bitcoin-core/features/requirements
  20. https://en.bitcoin.it/wiki/Weaknesses
  21. https://supra.com/academy/the-nsa-and-bitcoin-origins-of-the-sha-256-hashing-algorithm/
  22. https://github.com/bitcoin/bitcoin/issues
  23. https://github.com/dmitryelj/SHA256-Benchmark
  24. https://www.reddit.com/r/BitcoinBeginners/comments/pb7q1s/what_happens_is_if_the_future_sha256_is_found_to/
  25. https://bitcoincore.org/en/releases/26.0/
  26. https://attacksafe.ru/private-keys-attacks/
  27. https://www.coingecko.com/learn/how-sha256-secures-bitcoin-network?locale=en
  28. https://github.com/bitcoin/bitcoin
  29. https://bitcointalk.org/?topic=140078
  30. https://news.ycombinator.com/item?id=29439867
  31. https://erickimphotography.com/bitcoin-with-sha-512-a-hypothetical-analysis/
  32. https://www.sciencedirect.com/science/article/abs/pii/S0167819121000557
  33. https://arxiv.org/pdf/2406.20072.pdf
  34. https://github.com/bitcoin/bitcoin/issues/31799
  35. https://www.cvedetails.com/version/1777959/Bitcoin-Bitcoin-Core-25.0.html
  36. https://www.iacr.org/archive/crypto2015/92160223/92160223.pdf
  37. https://bitcointalk.org/index.php?topic=5499885.0
  38. https://www.cve.org/CVERecord/SearchResults?query=bitcoin
  39. https://fenefx.com/en/blog/what-is-nonce/
  40. https://nvd.nist.gov/vuln/detail/cve-2024-35202
  41. https://mailarchive.ietf.org/arch/msg/tls/kTi3VzUMcuCY7YQetjxENMebHv0/
  42. https://www.cvedetails.com/version/829239/Bitcoin-Bitcoin-Core-0.9.3.html
  43. https://blog.ishosting.com/en/bitcoin-core-tutorial
  44. https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained?0fad35da_page=18&74e29fd5_page=23
  45. https://stackoverflow.com/questions/4676828/when-generating-a-sha256-512-hash-is-there-a-minimum-safe-amount-of-data-to
  46. https://www.reddit.com/r/crypto/comments/oa6nhg/what_are_the_practical_advantages_of_a_12_byte/
  47. https://stackoverflow.com/questions/16225344/why-should-i-hash-a-random-number-when-generating-a-secret
  48. https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html
  49. https://marketcapof.com/blog/nonce-in-blockchain/
  50. http://bitcoinwiki.org/wiki/nonce
  51. https://bitcointalk.org/index.php?topic=781170.0
  52. https://github.com/bitcoin-core/secp256k1/issues/702
  53. https://stackoverflow.com/questions/42643421/why-time-based-nonce-should-be-avoided
  54. https://bitcointalk.org/index.php?topic=5432696.0
  1. https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
  2. https://arxiv.org/html/2504.13737v1
  3. https://strm.sh/studies/bitcoin-nonce-reuse-attack/
  4. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  5. https://notsosecure.com/ecdsa-nonce-reuse-attack
  6. https://github.com/kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack
  7. https://dl.acm.org/doi/abs/10.1007/978-3-030-32101-7_1
  8. https://nvd.nist.gov/vuln/detail/CVE-2022-35961
  9. https://www.vicarius.io/vsociety/posts/understanding-a-critical-vulnerability-in-putty-biased-ecdsa-nonce-generation-revealing-nist-p-521-private-keys-cve-2024-31497
  10. https://xrpl.org/blog/2019/statement-on-the-biased-nonce-sense-paper
  11. https://www.lrqa.com/en/cyber-labs/flaw-in-putty-p-521-ecdsa-signature-generation-leaks-ssh-private-keys/
  12. https://www.reddit.com/r/Bitcoin/comments/1j24hh3/nonce_r_reuse_and_bitcoin_private_key_security_a/
  13. https://arxiv.org/html/2504.07265v1
  14. https://feedly.com/cve/CVE-2024-13176
  15. https://fenefx.com/en/blog/what-is-nonce/
  16. https://www.tokenmetrics.com/blog/crypto-api-nonce-importance-explained
  1. https://notsosecure.com/ecdsa-nonce-reuse-attack
  2. https://github.com/pcaversaccio/ecdsa-nonce-reuse-attack
  3. https://strm.sh/studies/bitcoin-nonce-reuse-attack/
  4. https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
  5. https://www.reddit.com/r/Bitcoin/comments/1j24hh3/nonce_r_reuse_and_bitcoin_private_key_security_a/
  6. https://github.com/kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack
  7. https://arxiv.org/html/2504.13737v1
  8. https://fenefx.com/en/blog/what-is-nonce/
  9. https://www.okta.com/en-gb/identity-101/nonce/