Wednesday, May 29, 2024

Amber Group Uses Easily Accessible Hardware to Reproduce Wintermute Hack.

Amber Group successfully reproduced the recent Wintermute Hack by using hardware that is easily accessible to consumers. The Hong Kong-based crypto finance service provider said the process was fast and simple.

The firm tweeted that it figured out the algorithm to build the exploit. Amber Group reproduced the private key on a MacBook M1 with 16G memory in less than 48 hours. It also left an on-chain message to prove its claims.

Evgeny Gaevoy, the CEO of Wintermute protocol, had said that despite the exploit, the protocol was still very solvent and could fulfill all of its obligations to its creditors and users. He highlighted that the platform could extract the private key belonging to Wintermute’s vanity address and estimate the hardware and time requirements to crack the address generated by Profanity.

Amber revealed that Profanity relied on a particular elliptic curve algorithm to generate large sets of public and private addresses that had certain desirable characters. It said the process used to generate the address that was used to exploit Wintermute is not random and could easily be regenerated. Amber figured out how Profanity divides the job on GPUs. As such, it can efficiently compute the private key of any public key generated by Profanity.

Cryptured Team
Cryptured Team
The writers team at is composed of passionate and experienced journalists who cover the latest developments in the crypto and blockchain space. They aim to provide accurate, unbiased and easy-to-understand news and information for their readers, as well as insights and analysis from industry experts. The writers team is always on the lookout for new and exciting stories that can help the general public learn more about the potential and challenges of these technologies.

Most Popular