{"id":23953,"date":"2017-04-26T22:39:41","date_gmt":"2017-04-26T22:39:41","guid":{"rendered":"http:\/\/ci027cfe6e700f2697"},"modified":"2017-04-26T22:39:41","modified_gmt":"2017-04-26T22:39:41","slug":"bitmain-can-remotely-shut-down-your-antminer-and-everyone-elses","status":"publish","type":"post","link":"https:\/\/bitcoinmagazine.com\/culture\/bitmain-can-remotely-shut-down-your-antminer-and-everyone-elses","title":{"rendered":"Bitmain Can Remotely Shut Down Your Antminer (and Everyone Else\u2019s)"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><figure><img decoding=\"async\" src=\"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/11\/bitmain-can-remotely-shut-down-your-antminer-and-everyone-elses.jpg\" title=\"\"><\/figure>\n<p>Major <a href=\"https:\/\/bitcoinmagazine.com\/bitcoin-mining\/bitcoin-mining-hardware\">Bitcoin mining hardware<\/a> producer <a href=\"https:\/\/www.bitmain.com\/\" target=\"_blank\" rel=\"noopener\">Bitmain<\/a> can remotely shut down almost all active Antminer machines. Dubbed the \u201cAntbleed\u201d backdoor, abuse of the vulnerability could probably knock half of all hash power on the Bitcoin network offline.<\/p>\n<p>\u201cEven if Bitmain had no bad intent, this is a gaping security hole,\u201d said our source, who discovered the backdoor but asked to remain anonymous.<\/p>\n<p>The backdoor code can be seen on <a href=\"https:\/\/pastebin.com\/jREuwQ8b\" target=\"_blank\" rel=\"noopener\">Pastebin<\/a> and on GitHub, and today a<a href=\"http:\/\/www.antbleed.com\" target=\"_blank\" rel=\"noopener\">&nbsp;website<\/a> has been put up for Antbleed as well.<\/p>\n<p><strong>How It Works<\/strong><\/p>\n<p>The Antbleed backdoor is \u201cstupid simple,\u201d as our source described it.<\/p>\n<p>Whenever an Antminer appears online, and once every one to eleven minutes, it contacts a \u201cport 7000 service\u201d on the domain <a href=\"http:\/\/auth.minerlink.com\/\" target=\"_blank\" rel=\"noopener\">auth.minerlink.com<\/a>, which is <a href=\"https:\/\/lookup.icann.org?name=minerlink.com\" target=\"_blank\" rel=\"noopener\">owned by Bitmain<\/a>. The domain currently does not connect to any IP-address, and therefore does nothing.<\/p>\n<p>However, the domain could in the (near) future start connecting to a corresponding IP-address. If that happens, it will report the Antminer\u2019s serial number as well as the <a href=\"https:\/\/en.wikipedia.org\/wiki\/MAC_address\" target=\"_blank\" rel=\"noopener\">MAC address<\/a> and the IP-address to Bitmain.&nbsp;<\/p>\n<p>This could be enough for the company to link the machine to a specific user.<\/p>\n<p>\u201cBitmain can use this data to cross check against customer sales and delivery records making it personally identifiable,\u201d our source explained. \u201cAnd Bitcoin mining is a small industry, so it shouldn\u2019t even be hard to connect the machines to specific pools, or blocks.\u201d<\/p>\n<p>Once connected, the server the Antminer connects to \u2014 Bitmain\u2019s server \u2014 sends a message back. If that message is \u201ctrue\u201d, the machine will continue mining. But if that message is \u201cfalse\u201d, the code produces a piece of text that reads: \u201cStop mining!!!\u201d<\/p>\n<p>It seems obvious that this piece of text would make the machine stop mining, which is indeed confirmed by our source, who tested it on an Antminer machine. Additionally, it can be checked by anyone with an affected miner; <a href=\"http:\/\/www.antbleed.com\" target=\"_blank\" rel=\"noopener\">antbleed.com<\/a> explains how.<\/p>\n<p>The backdoor&nbsp;can be verified, since it is embedded in open source code. In fact, it seems rather strange Bitmain would include such a backdoor \u201cout in the open\u201d, for anyone to see.<\/p>\n<p>Speaking to<em> Bitcoin Magazine<\/em>, <a href=\"https:\/\/bitcoincore.org\/\" target=\"_blank\" rel=\"noopener\">Bitcoin Core<\/a> developer Peter Todd, who was quick to comment to the issue on <a href=\"https:\/\/twitter.com\/peterktodd\/status\/857337673358479360\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> and <a href=\"https:\/\/www.reddit.com\/r\/Bitcoin\/comments\/67qwqv\/antbleed_exposing_the_malicious_backdoor_on\/\" target=\"_blank\" rel=\"noopener\">Reddit<\/a>, suggested:<\/p>\n<p>\u201cBitmain probably underestimated how much source code actually does get audited \u2014 it&#8217;s a common myth that code never gets read. Also, if you&#8217;re going to add a backdoor, you do want plausible deniability in case it does get found. Hiding in plain sight, amongst thousands of lines of undocumented code, helps. Perhaps Bitmain will claim this is actually a feature.\u201d<\/p>\n<p><strong>What It Affects<\/strong><\/p>\n<p>The backdoor probably affects most Antminers in use today: the <a href=\"https:\/\/shop.bitmain.com\/product\/detail?pid=000201704120303282920qp75Rg10655\" target=\"_blank\" rel=\"noopener\">S9<\/a>, the <a href=\"https:\/\/shop.bitmain.com\/product\/detail?pid=00020170425095123561SXkfKSo506B3\" target=\"_blank\" rel=\"noopener\">T9<\/a> the <a href=\"https:\/\/shop.bitmain.com\/product\/detail?pid=00020170113035124055C7pSkE6a066C\" target=\"_blank\" rel=\"noopener\">R4<\/a>, as well as Litecoin\u2019s <a href=\"https:\/\/shop.bitmain.com\/product\/detail?pid=00020161229040715306ygMSJQLh06C0\" target=\"_blank\" rel=\"noopener\">L3<\/a>.<\/p>\n<p>The commit date indicates the backdoor was introduced in July 2016. This is one month after the first S9 machines were shipped. All machines that shipped since July 2016 should have the backdoor on board, which means they can be shut down by Bitmain. Machines that were shipped before July 2016, but have been updated since, should be vulnerable, too.<\/p>\n<p>\u201cIt\u2019s difficult to say with certainty how much hash power on the Bitcoin network is subject to the vulnerability,\u201d our source said. \u201cBut since Bitmain is by far the market leader for hardware machines, it\u2019s not a stretch to attribute at least half of all hash power to the vulnerable machines. As such, Bitmain could potentially shut down an enormous share of Bitcoin\u2019s hash power with the push of a button. In addition to that, the company can target specific machines or customers.\u201d<\/p>\n<p>And it\u2019s not just Bitmain who could shut down the machines. Because the connection is unauthenticated, the code will connect to anything that appears like &#8220;<a href=\"http:\/\/auth.minerlink.com\/\" target=\"_blank\" rel=\"noopener\">auth.minerlink.com<\/a>&#8220;, which can be spoofed by certain third parties. Apart from Bitmain, it could, for example, be an internet service provider, anti-DoS service CloudFlare (used by Bitmain), or anyone who can hijack DNS records: rogue ICANN employees, hackers, the U.S. government, and more.<\/p>\n<p>\u201cThe nicest possible explanation is that Bitmain is incompetent at security, putting the whole Bitcoin network at risk,\u201d Todd concluded. \u201cBut given the history we have of miners threatening with attacks, it wouldn&#8217;t surprise me if this was added as a last resort option for shutting down competitors if they needed to push something through with hashing power.\u201d<\/p>\n<p><strong>Update&nbsp;<\/strong><\/p>\n<p>A representative for Bitmain commented on the issue:<\/p>\n<p>&#8220;The code running on the machines is open source, everyone can review it so no secret features exist in it. The code that was pointed out is a feature to allow owners of the Antminers to be able to remotely control their miners. It is not a secret and it does not provide any kind of remote control to Bitmain for the Antminers it does not own or operate in its own mining farms.&#8221;<\/p>\n<p><em>(Note: The representative provided this comment a bit before publication of the article, but due to a miscommunication this update was added only briefly after publication.)<\/em><\/p>\n<p><strong>Update&nbsp;<\/strong><\/p>\n<p>It should be noted that if you own an affected machine, a fix is available on <a href=\"http:\/\/www.antbleed.com\" target=\"_blank\" rel=\"noopener\">antbleed.com<\/a> as well.<\/p>\n<p><strong>Update<\/strong><\/p>\n<p>Bitmain has issued an official <a href=\"https:\/\/blog.bitmain.com\/en\/antminer-firmware-update-april-2017\/\" target=\"_blank\" rel=\"noopener\">press release<\/a> commenting on the issue. In it, the company acknowledges the existence of the feature, stating:<\/p>\n<p>&#8220;This feature was intended to allow the owners of Antminer to remotely shut down their miners that may have been stolen or hijacked by their hosting service provider, and to also provide law enforcement agencies with more tracking information in such cases. We never intended to use this feature on any Antminer without authorization from its owner.&#8221;<\/p>\n<p><em>This story will be updated as more news becomes available.<\/em><\/p>\n<p><em>The identity of our source is known to us and considered to be reliable.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Major Bitcoin mining hardware producer Bitmain can remotely shut down almost all active Antminer machines. Dubbed the \u201cAntbleed\u201d backdoor, abuse of the vulnerability could probably knock half of all hash power on the Bitcoin network offline. \u201cEven if Bitmain had no bad intent, this is a gaping security hole,\u201d said our source, who discovered the [&hellip;]<\/p>\n","protected":false},"author":2509,"featured_media":23954,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[464,197,556,97,330],"class_list":{"0":"post-23953","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-culture","8":"tag-asics","9":"tag-bitmain","10":"tag-blockchain","11":"tag-mining","12":"tag-security"},"author_data":{"id":2509,"name":"Aaron van Wirdum","nicename":"aaron-van-wirdum","avatar_url":"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/12\/aaron-van-wirdum-96x96.jpg"},"featured_image_url":"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/11\/bitmain-can-remotely-shut-down-your-antminer-and-everyone-elses.jpg","_links":{"self":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts\/23953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/users\/2509"}],"replies":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/comments?post=23953"}],"version-history":[{"count":0,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts\/23953\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/media\/23954"}],"wp:attachment":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/media?parent=23953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/categories?post=23953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/tags?post=23953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}