Company updates

How to Identify Transaction Malleability Attack

, October 30, 2015

In the past month, we have experienced several attempts of transaction malleability attack against CEX.IO exchange. This is not the first round of attacks against the exchange, and, within our professional team, we always manage to detect such attacks very quickly, preventing losses.

Having greatly influenced Mt. Gox in 2014, it is a “new old” issue within the industry that can still create problems for Bitcoin network subjects, namely, Bitcoin exchanges, which could negatively affect Bitcoin ecosystem in general.

Therefore, we would like to share our experience and speak out on how to identify and fight off transaction malleability with an example of 2 transactions made on CEX.IO within the attack.

What is transaction malleability?

Transaction malleability is an attack that lets a person change Bitcoin transaction’s unique ID before confirmation on the Bitcoin network. This change makes it possible for the person to pretend that a transaction didn’t happen. In case of Bitcoin exchanges, it can be used to make a double deposit or double withdrawal.

However, it should not be confused with double spending, as the latter implies spending an amount of crypto coins once, and creating another transaction with the same coins (thus, they can be spent twice).

How to determine that you are under transaction malleability attack?

For example, a hacker requests a Bitcoin withdrawal from his account on an exchange and changes unique ID of the transaction.

Here are two transactions recently happened on CEX.IO. Let’s compare them by using transaction ID scripts on the blockchain.

transaction malleability

It is clear the signatures’ encoding have been changed, which led to altering script length, transaction and txid, without affecting transaction data.

Although the database of the exchange contains initial txid, it can happen that attacker’s transaction with altered txid will be confirmed in the blockchain first, while the original transaction will never be confirmed. This will allow hacker complain that the transaction is pending and claim compensation. More than one fake transaction can be made based on the original transaction.

How to fight off transaction malleability attack?

There is hardly a way to prevent such an attack automatically. However, there are at least two ways to avoid losses:

– required transaction confirmation
– manual verification of bitcoin withdrawals from exchanges.

In general, if an exchange notices suspicious pending transactions, it is already an alarm for something going wrong, and can serve as a signal of transaction malleability attack.

Related

Company updates

2022 Awards and Accolades: A Year in Review

With 2022 sliding into the rear-view, we took a look back at some of the awards and accolades that kept us inspired during this difficult year.

Dec 22, 2022 | 6 min read
CEX.IO News Company updates

CEX.IO will support Spark (SPARK) Airdrop Program

Responding to numerous requests, we’ve decided to support the upcoming Spark (SPARK) Airdrop Program for Ripple (XRP) holders. Learn more and get your CEX.IO account ready!

Dec 07, 2020 | 6 min read
CEX.IO News Company updates

CEX.IO Makes CryptoCompare Top 10

CEX.IO ranked by CryptoCompare and got high scores in Security, Market Quality, Team/Exchange, Data Provision, and Legal/Regulation.

Aug 27, 2020 | 4 min read