Multi-Signatures in Bitcoin: How It Works, How to Protect Funds, How It Works, and How Leaking Private Keys Increases Fraud Risks
In this research paper, we will explore in detail how multisig works in the Bitcoin ecosystem. While multisig mechanisms used in other cryptocurrencies may differ depending on the transaction model,…
DeserializeSignature vulnerability in Bitcoin protocol: deep cryptanalysis and risks of forging ECDSA signatures and how to protect against fake signatures in the Bitcoin network that exploit this vulnerability
This paper presents a detailed study of the DeserializeSignature vulnerability discovered in the Bitcoin network in 2023, which allows attackers to create invalid but accepted ECDSA signatures. The principles of…
Hidden risks of multi-signature Bitcoin wallets: analysis of Copay vulnerability via SIGHASH_SINGLE attack (Digital Signature Forgery Attack) vulnerabilities such as CVE-2025-29774 and CVE-2025-29775 in the xml-crypto library and the SIGHASH_SINGLE bug in the Bitcoin protocol
This paper presents a detailed analysis of the vulnerability of the multi-signature Bitcoin wallet Copay, developed by BitPay, which created a threat to user security due to the peculiarities of…
Bitcoin Cryptanalysis: Mechanisms and Reliability of SHA-256 in Ensuring Blockchain Security and How Future Technological Advances Will Affect SHA-256’s Resilience to Digital Signature Forgery Attacks
The SHA (Secure Hash Algorithm) family of algorithms are cryptographic functions that transform messages of arbitrary length into hash codes of fixed length, which ensures the integrity and authenticity of…
Segregated Witness: A Key Step Towards Bitcoin Scalability And Security Is Deep Cryptanalysis. How SegWit Implementation Affects Protection Against Transaction Data Forgery
One of the most pressing issues with the Bitcoin network is its limited scalability, which is the subject of active research and development. Among the proposed approaches to improving network…
Cryptanalysis of Bitcoin transactions: internal mechanisms and software features
In traditional banking systems, transferring funds amounts to changing entries in a balance table: one client’s amount decreases, another’s increases. Interbank transactions sometimes involve intermediaries, such as SWIFT. However, the…
Modern Password Cryptanalysis: How Unique Salts and Slowdown Algorithms Protect Data in the Age of Attacks and Bitcoin
Hash functions and modern methods of secure password storage: aspects of cryptanalysis In digital systems, ensuring authentication security is closely related to the correct organization of storing user passwords. Cryptanalysis…
Large Bitcoin transaction worth around $8 billion (80,000 BTC were moved)
According to Arkham Intelligence, on July 5, 2025, one of the largest transactions in Bitcoin history occurred: 80,000 BTC (approximately $8.6 billion at current rates) were moved from addresses associated…
The largest incident is the hack of the Iranian crypto exchange Nobitex and the hack of the ResupplyFi protocol – $9.6 million in damages
In June 2025, crypto projects’ losses from hacker attacks decreased significantly – by 56% compared to May, and amounted to $116.6 million, cybersecurity specialists from PeckShield reported. Despite the decrease…
Crypto Hack and Fraud Costs in the First Six Months of 2025: A Detailed Look
In the first half of 2025, the cryptocurrency industry faced massive financial losses due to cyberattacks, exploits, and fraudulent schemes. According to a report by blockchain security analytics company CertiK,…