So long as cryptocurrency live , so too will theextraordinarylengthsto which thieves will go to attempt to steal it . Unfortunately , that also includes preying on weak individual keys , a method acting that has apparently made one crypto brigand filthy rich with millions in swiped Ethereum .

This was the accidental discovery made by security expert with the strong Independent Security Evaluators while do an judgment for a cryptocurrency client . They see a number of weak private keys — start with the stupidly childlike paint of 0x01 — and discovered on the blockchain that its associated wallet had been emptied , as was the caseful with hundreds of similarly simple keys . A “ blockchain bandit , ” they found , had been funneling Ethereum from these tonality .

In monastic order to see how quickly their bandit was working , they sent the equivalent weight of a dollar ’s worth of the cryptocurrency to the address associated with one of these weak private key fruit and found that the bandit instantly sent it to another report . By deal to swipe Ethereum using these guessable debile keys , the bandit — or , possibly , a group — managed to amass a fortune .

Article image

Image: Pixabay

“ We discovered that investment trust from these weak - winder addresses are being sneak and sent to a destination address belonging to an individual or group that is running participating campaigns to compromise / gather private key and obtain these funds , ” they wrote in apaperabout their findings issue Tuesday . “ On January 13 , 2018 , this ‘ blockchainbandit ’ hold a remainder of 37,926 ETH valued at $ 54,343,407 . ”

There are a couple of elbow room that these fallible key fruit could have been generated . The ISE research worker wrote that it ’s possible a coding error truncated what should have been a longer key , or as ISE senior security psychoanalyst Adrian Bednarek explained toWired , perchance by a billfold that let user opt their own key .

“ While it is tall that a weak key would ever be bring forth under legitimate setting using the appropriate computer code paths , we theorise that weak private Florida key may still be generated by coding mistakes , or operating system , twist , and slaying environment erroneousness , and that these issues are uncouth , ” ISE researchers wrote in their paper .

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

Bednarek tell Wired he has no idea as to the indistinguishability of the mastermind behind this Ethereum - despoil operation , though he tell Wired he “ would n’t be surprised if it ’s a state actor , like North Korea , but that ’s all just speculation . ” similarly , the ISE squad can not name which wallet are associated with the weak keys , only that they are being robbed — which , big yikes . But in the event that the perpetrator is based in a nation that succeed external law , they could ascertain themselves in big trouble if they adjudicate to withdraw the fund in a trackable way . And let ’s be honorable , most cryptocurrencies are much moretraceablethan their reputation implies .

This should be a wake - up call for both notecase developers as well as their users , who Bednarek say should be ensuring they ’re using a trusted wallet .

BlockchainCryptocurrencyEthereum

William Duplessie

Daily Newsletter

Get the best technical school , scientific discipline , and culture news in your inbox daily .

word from the future , delivered to your nowadays .

You May Also Like

Starship Test 9

Lilo And Stitch 2025

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

Photo: Jae C. Hong

Doctor Who Omega

Roborock Saros Z70 Review

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

William Duplessie

Starship Test 9

Lilo And Stitch 2025

Roborock Saros Z70 Review

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06