Intelligent Fin.tech Issue 30 | Page 41

I N D U S T R Y O U T L O O K wallet that requires multiple signatures, instead of just one, to execute each transaction. These signatures are associated with different cryptographic private keys, and a defined threshold of keys must sign a transaction to validate it.

I N D U S T R Y O U T L O O K wallet that requires multiple signatures, instead of just one, to execute each transaction. These signatures are associated with different cryptographic private keys, and a defined threshold of keys must sign a transaction to validate it.

According to Coinbase, a multi-signature wallet requires multiple signatures, instead of just one, to execute each transaction. These signatures are associated with different cryptographic private keys, and a defined threshold of keys must sign a transaction to validate it. This feature strives to prevent the abuse of power and introduce safeguards, making it a tool for businesses, institutions, and decentralised autonomous organisations.
The workflow of a multi-sig wallet remains the same irrespective of the number of signers. Any parties to a multi-sig wallet can initiate a transaction signed with their private key. However, the transaction is displayed as pending until other parties sign it.
Multi-sig wallets may implement an N-of-N setup where all signatories must validate a transaction before it is considered valid. Alternatively, an N-of-M setting requires a specific subset of signers to approve a transaction. For example, in a 3-of-4 wallet, three out of four signers must validate the transaction for it to be executed.
When used properly, a multi-sig wallet aims to offer additional security by eliminating the single point of failure risk associated with having one private key. It makes it difficult for hackers to steal funds from a wallet, because they must have the different keys to complete any action. This feature is especially desirable when the assets belong to multiple parties in a company or a decentralised autonomous organisation.
While multi-sig wallets provide a level of security, they are not without their risks. High-profile breaches have occurred from compromised multi-sig wallets, where the private keys were stored improperly. It is essential to distribute multi-sig private key access among distinct entities.
A multi-sig setup where a single entity holds multiple private keys and stores them in a single location is essentially the same as a single-key wallet. A recommended scenario is distributing access to entities in a way that a single security breach does not lead to the loss of two or more keys.
Malicious JavaScript injected into Safe hosted on AWS
According to Check Point, this attack is especially troubling because it was not a conventional vulnerability that looked for a flaw in the blockchain system or a smart contract. Rather, security researchers have determined that hackers injected malicious JavaScript directly into Safe’ s online infrastructure hosted on AWS. The code was specifically designed to activate only when interacting with Bybit’ s contract address, allowing it to remain undetected by regular users.
Safe is governed by SafeDAO, a decentralised collective of core contributors, backers, GnosisDAO, users, and ecosystem contributors, that is Safe { Guardians }. Safe Multisig is a customisable crypto wallet running on Ethereum that requires a predefined number of signatures to confirm transactions to prevent unauthorised access to the assets stored.
According to Hacker News, such attacks do not exploit any vulnerability in AWS. Rather, the threat actors take advantage of misconfigurations in victims’ environments that expose their AWS access keys in order to send phishing messages by abusing Amazon Simple Email Service and WorkMail services.
In doing so, the modus operandi offers the benefit of not having to host or pay for their own infrastructure to carry out the malicious activity. It enables the threat actor’ s phishing messages to sidestep email protections since the digital missives originate from a known entity from which the target organisation has previously received emails. www. intelligentfin. tech
41