Web3 security company Blowfish recently detected a pair of sophisticated Solana (SOL) transaction drainers capable of executing elusive bit-flip attacks.
The firm’s Feb. 9 analysis details how these drainers — dubbed aqua and vanish — can alter a condition in on-chain data post-transaction signature by the user’s private key.
These dangerous scripts lurking under the transactional radar are being peddled on the dark web, offering scammers a scam-as-a-service toolkit.
The Blowfish examination highlights the drainers’ adept use of the on-chain authority provided to decentralized apps (dapps), enabling them to switch from transaction facilitators to malicious account-draining entities.
According to the security firm, the troubling aspect of these attacks is their stealth; victims initially see valid transactions, which are then intercepted and manipulated by the attackers to extract cryptocurrency from the user’s account.
Such bit-flip attacks threaten transaction integrity by flipping bits in the encrypted data, altering the decrypted message without accessing the encryption key.
The discovery has cast a spotlight on the evolving cyber threat landscape within Solana’s network. This increasing threat is underscored by a Chainalysis report
Go to Source to See Full Article
Author: Julius Mutunkei