Exchanges Detects Ethereum Classic ‘Attacker’ for Security Companies

By Chris Torres | January 11, 2019

SlowMist, a China-based security firm has informed that it has successfully detected the culprit leading various chain attacks on ethereum classic.

Ethereum Classic Attacks

In a Medium article published Wednesday, SlowMist compiled the bulk of their analysis on ethereum classic. The firm has pointed out the three wallet addresses and four transaction hashes that launched the two-day block reorganization (reorg) attacks on the network. These attacks to have started as early as Saturday 19:58 UTC, with the last documented one occurring Tuesday at 4:30 UTC.

SlowMist added that double spends have occurred as a result of block reorgs, with SlowMist contending that a total of seven transactions were rolled back from the network and 54,200 ETC (almost $270,000) spent a second time.

Detect Attack Culprits

SlowMist is seeking for support of relevant exchanges to identify the actual addresses of the culprits of these attacks. The firms said it can be deduced “if the relevant exchanges are willing to assist.”

According to Coindesk, when asked to elaborate on the exact information beyond geography SlowMist is looking to identify about those behind the attack, the team responded in an email they could not disclose such information, calling it “a secret.”

In respond to SlowMist, Gate.io has claimed 40,000 ETC in double spends on its exchange platform. This number was 13,000 ETC on Bitrue exchange. They were all released their statements on Twitter.

Ethereum classic developers are working closely with the SlowMist team to identify the origin of these attacks and will be meeting today during a private Discord call at 5 p.m. UTC to discuss actionable items moving forward.

In advance of this meeting, ethereum classic developers tweeted a summary of current priorities for the community, emphasizing that “we will not reorg the chain or revert the events on chain under any circumstance.”

Tags: , , , , ,