Phoenix Rowhammer Attack: Systemic Risk of Bitcoin Wallet Private Key Compromise in Global Blockchain Infrastructure Due to a Critical SK Hynix DDR5 Vulnerability (CVE-2025-6202)
This article examines the systemic cryptographic security threats posed by the Phoenix Rowhammer attack (CVE-2025-6202), which can extract private keys from DDR5 RAM through hardware-level bit manipulation. In recent years,…
Bit-flipping attack on Wallet.dat: Risks of using AES-256-CBC without authentication, exploitation and extracting private keys from Bitcoin Core
Bitcoin Core program uses the symmetric cryptographic algorithm AES-256-CBC to protect the wallet password . This algorithm is used to encrypt the wallet file (wallet.dat), where the user’s private keys…
Digital Signature Forgery Attack: How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX
In this article, we will look at the cryptographic attack of digital signature forgery (Digital Signature Forgery Attack), its consequences pose a threat to the security of transactions in the…
Private key Debug: Incorrect generation of private keys, system vulnerabilities and errors in calculating the order of the elliptic curve secp256k1 threats to the Bitcoin ecosystem
This paper analyzes cryptographic vulnerabilities related to incorrect generation of private keys in blockchain systems. One of the key issues is the incorrect calculation of the constant N, which determines…