{"id":23470,"date":"2017-07-20T20:01:33","date_gmt":"2017-07-20T20:01:33","guid":{"rendered":"http:\/\/ci027cfe65f00f26c3"},"modified":"2017-07-20T20:01:33","modified_gmt":"2017-07-20T20:01:33","slug":"white-hats-step-save-funds-vulnerable-ether-wallets","status":"publish","type":"post","link":"https:\/\/bitcoinmagazine.com\/business\/white-hats-step-save-funds-vulnerable-ether-wallets","title":{"rendered":"White Hats Step In to Save Funds from Vulnerable Ether Wallets"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><figure><img decoding=\"async\" src=\"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/11\/white-hats-step-in-to-save-funds-from-vulnerable-ether-wallets.jpg\" title=\"\"><\/figure>\n<p>At 11:30 a.m. (CDT) on July 19, 2017, a hacker managed to <a href=\"https:\/\/twitter.com\/maraoz\/status\/887751004971831296\" target=\"_blank\" rel=\"noopener\">steal<\/a> 153,000 ETH (approximately $32 million at the time) from three Ethereum wallets by exploiting a vulnerability within the wallets&#8217; multi-signature verification. The affected wallets include the ones using Parity client version 1.5 or later.<\/p>\n<p>According to a <a href=\"https:\/\/twitter.com\/maraoz\/status\/887755889897295872\" target=\"_blank\" rel=\"noopener\">tweet<\/a> by Project Lead Manuel Ar\u00e1oz, the three multisig wallets first targeted by the hack were using Parity client version 1.5 or later, and included Edgeless Casino, Swarm City and \u00c6ternity Blockchain. However, <a href=\"https:\/\/blog.blocktix.io\/blocktix-and-the-parity-multisig-hack-81c1b2aefbd6?gi=e5093d267fe\" target=\"_blank\" rel=\"noopener\">Project Blocktix<\/a> also reported a loss totaling 3,916 ETH. According to <a href=\"https:\/\/www.ethnews.com\/massive-hack-hits-ethereum-parity-clients--more-than-30m-of-ether-still-at-large\" target=\"_blank\" rel=\"noopener\">ETHNews<\/a>, Blocktix.io was hit by a second attacker who exploited the same vulnerability.<\/p>\n<p>A Swarm City <a href=\"https:\/\/press.swarm.city\/parity-multisig-wallet-exploit-hits-swarm-city-funds-statement-by-the-swarm-city-core-team-d1f3929b4e4e?1&amp;gi=4b2d9ea969b4\" target=\"_blank\" rel=\"noopener\">blog post<\/a> revealed that a group of white hat hackers managed to secure the remaining funds from the affected ETH wallets using the same exploit. The swift response of the white hat hackers allowed them to secure the funds of other vulnerable projects. Unfortunately, funds in the wallets of Edgeless Casino, Swarm City and \u00c6ternity Blockchain are completely lost, though the \u201cwhite hat response team\u201d managed to secure 6,272 of 10,188 ETH at Blocktix.io.<\/p>\n<p>The White Hat Group announced on <a href=\"https:\/\/www.reddit.com\/r\/ethereum\/comments\/6obofq\/a_modified_version_of_a_common_multisig_had_a\/\" target=\"_blank\" rel=\"noopener\">Reddit<\/a> that they will create \u201canother multisig for you [the affected users] that has the same settings as your [the users\u2019] old multisig but with the vulnerability removed and we will return your [the users\u2019] funds to you [the users].\u201d The response team warned the Reddit community to be careful with donation addresses below their post since there are \u201ca lot of phishers in the community right now.\u201d<\/p>\n<p>On July 19, Parity Technologies published a <a href=\"https:\/\/www.parity.io\/blog\/\" target=\"_blank\" rel=\"noopener\">critical security alert<\/a> stating there was a vulnerability connected to Parity Wallets. The users affected by the vulnerability included \u201cany user with assets in a multi-sig wallet created in Parity Wallet prior to 19\/07\/17 23:14:56 CEST.\u201d The company urged users to move all assets from the multisig wallets to a secure address. Wallets seemingly unaffected by the breach include Geth, MyEtherWallet and single-user accounts created on Parity.<\/p>\n<p>Parity updated its post as of today stating that future versions of their multisig wallets are secure:<\/p>\n<p>\u201cFuture multi-sig wallets created by versions of Parity are secure (Fix in the code is [<a href=\"https:\/\/github.com\/openethereum\/openethereum\/pull\/6103\" target=\"_blank\" rel=\"noopener\">here<\/a>] and the newly registered code is [<a href=\"https:\/\/etherscan.io\/tx\/0x5f0846ccef8946d47f85715b7eea8fb69d3a9b9ef2d2b8abcf83983fb8d94f5f\" target=\"_blank\" rel=\"noopener\">here<\/a>]).\u201d<\/p>\n<p>Swarm City also <a href=\"https:\/\/press.swarm.city\/parity-multisig-wallet-exploit-hits-swarm-city-funds-statement-by-the-swarm-city-core-team-d1f3929b4e4e?1&amp;gi=49c4e8be602f\" target=\"_blank\" rel=\"noopener\">posted<\/a> information for users affected by the hack:<\/p>\n<p>\u201cIf you do have funds in the multisig contract: carefully move your funds to a new account ASAP. If your funds are no longer in your multisig, please check the Black hat and White hat addresses. They might have been saved by the White hat group.\u201d<\/p>\n<p>To check on funds held by either the black hat or the white hat hackers, see the ETH addresses below:<\/p>\n<p>White Hat Group\u2019s wallet: <a href=\"https:\/\/etherscan.io\/address\/0x1dba1131000664b884a1ba238464159892252d3a#tokentxns\" target=\"_blank\" rel=\"noopener\">0x1DBA1131000664b884A1Ba238464159892252D3a <\/a><\/p>\n<p>First hacker\u2019s wallet: <a href=\"https:\/\/etherscan.io\/address\/0xb3764761e297d6f121e79c32a65829cd1ddb4d32#internaltx\" target=\"_blank\" rel=\"noopener\">0xB3764761E297D6f121e79C32A65829Cd1dDb4D32 <\/a><\/p>\n<p>Second attacker\u2019s wallet: <a href=\"https:\/\/etherscan.io\/address\/0x1ff21eca1c3ba96ed53783ab9c92ffbf77862584#internaltx\" target=\"_blank\" rel=\"noopener\">0x1Ff21eCa1c3ba96ed53783aB9C92FfbF77862584<\/a><\/p>\n<p>The hacks have not only affected the wallets of the victims but also the overall price of ether. According to Coin Market Cap\u2019s <a href=\"https:\/\/coinmarketcap.com\/currencies\/ethereum\/\" target=\"_blank\" rel=\"noopener\">stats<\/a>, the price experienced a 15 percent drop from $234.94 (at 0:04, July 19) to $199.70 at the end of the day. However, ETH has since recovered to around $227 today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Criminals have stolen $32 million worth of ether from multisig wallets due to issues with the Parity client.<\/p>\n","protected":false},"author":3533,"featured_media":23471,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2037,621,2606,356,3539,163],"class_list":{"0":"post-23470","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"tag-ether","9":"tag-ethereum","10":"tag-hacks","11":"tag-multisig","12":"tag-parity","13":"tag-wallets"},"author_data":{"id":3533,"name":"Benjamin Vitaris","nicename":"benjamin-vitaris","avatar_url":"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/12\/benjamin-vitaris-promo-image-96x96.jpg"},"featured_image_url":"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/11\/white-hats-step-in-to-save-funds-from-vulnerable-ether-wallets.jpg","_links":{"self":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts\/23470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/users\/3533"}],"replies":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/comments?post=23470"}],"version-history":[{"count":0,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts\/23470\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/media\/23471"}],"wp:attachment":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/media?parent=23470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/categories?post=23470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/tags?post=23470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}