{"id":19915460,"url":"https://github.com/demining/vector76-attack","last_synced_at":"2025-05-03T05:32:17.758Z","repository":{"id":248643054,"uuid":"829283836","full_name":"demining/Vector76-Attack","owner":"demining","description":"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data","archived":false,"fork":false,"pushed_at":"2024-10-30T05:04:03.000Z","size":33761,"stargazers_count":5,"open_issues_count":0,"forks_count":3,"subscribers_count":1,"default_branch":"main","last_synced_at":"2024-10-30T07:29:08.493Z","etag":null,"topics":["attack","bitcoin","bitcoin-hacking","bitcoin-transaction","blockchain","cryptanalysis","cryptocurrency","cryptography","double-spending","vector76","vector76-attack","vulnerability"],"latest_commit_sha":null,"homepage":"https://cryptodeeptech.ru/vector76-attack","language":"Jupyter Notebook","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/demining.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-07-16T06:08:24.000Z","updated_at":"2024-10-30T05:04:07.000Z","dependencies_parsed_at":"2024-07-16T08:39:19.906Z","dependency_job_id":null,"html_url":"https://github.com/demining/Vector76-Attack","commit_stats":null,"previous_names":["demining/vector76-attack"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/demining%2FVector76-Attack","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/demining%2FVector76-Attack/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/demining%2FVector76-Attack/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/demining%2FVector76-Attack/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/demining","download_url":"https://codeload.github.com/demining/Vector76-Attack/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":224354384,"owners_count":17297403,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["attack","bitcoin","bitcoin-hacking","bitcoin-transaction","blockchain","cryptanalysis","cryptocurrency","cryptography","double-spending","vector76","vector76-attack","vulnerability"],"created_at":"2024-11-12T21:40:08.675Z","updated_at":"2024-11-12T21:40:09.431Z","avatar_url":"https://github.com/demining.png","language":"Jupyter Notebook","readme":"\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/055-1024x576.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5539\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003eWith the development of cryptocurrency technologies and the increasing popularity of Bitcoin, various software such as\u0026nbsp;\u003cstrong\u003eFlash Bitcoin Software\u003c/strong\u003e\u0026nbsp;and\u0026nbsp;\u003cstrong\u003eFake BTC Software\u003c/strong\u003e\u0026nbsp;have appeared in the market . These programs can lead to disastrous consequences on the\u0026nbsp;\u003cstrong\u003eBitcoin\u003c/strong\u003e\u0026nbsp;ecosystem . In this article, we will look at what these softwares are, how they work and what impact they have on the\u0026nbsp;\u003cstrong\u003eBitcoin\u003c/strong\u003e\u0026nbsp;cryptocurrency using real data , as well as how these various softwares use the\u0026nbsp;\u003ca href=\"https://cryptodeeptech.ru/vector76-attack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003eVector76 Attack\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;mechanism , which is a type of \u003ca href=\"https://en.wikipedia.org/wiki/Double-spending\" target=\"_blank\" rel=\"noreferrer noopener\"\u003edouble-spending\u003c/a\u003e\u0026nbsp;attack , in which an attacker tries to conduct the same transaction twice. Unlike the classic double-spending attack, Vector76 exploits vulnerabilities in transaction confirmation mechanisms and time delays in the propagation of blocks across the Bitcoin network.\u003c/p\u003e\n\n\n---\n\n* Tutorial: https://youtu.be/Mk_BPBCXd3I\n* Tutorial: https://cryptodeeptech.ru/vector76-attack\n* Google Colab: https://github.com/demining/CryptoDeepTools/blob/main/34Vector76Attack/Vector76_Attack.ipynb\n\n---\n\n\n\u003cp\u003eIn a Vector76 attack, the attacker first creates two transactions: one to send funds to their Bitcoin address and one to send the same funds to the merchant’s Bitcoin address. They then try to convince the merchant to accept the unconfirmed transaction while simultaneously broadcasting the other transaction to the network. If the attacker manages to complete their transaction before the merchant receives confirmation, the funds will be sent to the attacker’s address rather than the merchant’s.\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter size-full is-resized\"\u003e\u003ca href=\"https://youtu.be/Mk_BPBCXd3I\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cimg decoding=\"async\" width=\"666\" height=\"385\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-2.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-2940\" style=\"width:838px;height:auto\" srcset=\"https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-2.png 666w, https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-2-300x173.png 300w\" sizes=\"(max-width: 666px) 100vw, 666px\"\u003e\u003c/a\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cfigure class=\"wp-block-embed is-type-rich\"\u003e\u003cdiv class=\"wp-block-embed__wrapper\"\u003e\nhttps://youtube.com/watch?v=Mk_BPBCXd3I%3Fsi%3DYeJcsqeJKlbmKF-U\n\u003c/div\u003e\u003c/figure\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch2 class=\"wp-block-heading has-text-align-center\"\u003eSoftware\u003c/h2\u003e\n\n\n\n\u003cp\u003eSoftware makes it easy for an attacker to time-slot the time between a transaction being confirmed on the local network and being propagated to the entire Bitcoin network. The attacker creates two transactions: one that is sent to the local network and one that is sent to the main network. If the attacker manages to send the first transaction before the second is confirmed, they can trick the recipient into believing that the first transaction is genuine. Let’s look at some of the most well-known software that uses time-slotting to successfully confirm a Bitcoin transaction.\u003c/p\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-001.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eFlash Bitcoin Software\u003c/a\u003e\u003c/h3\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eFlash Bitcoin Software\u003c/strong\u003e\u0026nbsp;is a software that allows users to temporarily increase their Bitcoin wallet balance. This is done by creating transactions that appear legitimate but are not actually confirmed on the blockchain. Such transactions can be used to deceive users and services that accept Bitcoin.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-009.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eFake BTC Software\u003c/a\u003e\u003c/h3\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eFake BTC Software\u003c/strong\u003e\u0026nbsp;, in turn, is designed to create fake Bitcoin transactions. These transactions can be used for fraud, as they create the appearance of a transfer of funds, although in reality no funds are transferred. This software can be used to deceive sellers and buyers in cryptocurrency transactions.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003e\u003ca href=\"https://dockeyhunt.com/dockeyhunt-vector76-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eDockeyhunt Vector76 Attack\u003c/a\u003e\u003c/h3\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eDockeyhunt Vector76 Attack\u003c/strong\u003e\u0026nbsp;is designed to create two or more Raw transactions with the purpose of confirmation via Broadcast Bitcoin Transaction for a double-spend scenario with the same Bitcoin. The essence of the attack is that the attacker sends the same transaction to two different parts of the network, creating a temporary discrepancy in the Bitcoin blockchain. This software can also be used to deceive sellers and buyers in cryptocurrency transactions and operations where different tokens and various well-known cryptocurrencies are accepted Bitcoin, Etherium, etc.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-004.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eCGMiner и BFGMiner\u003c/a\u003e\u003c/h3\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eCGMiner\u003c/strong\u003e\u0026nbsp;and\u0026nbsp;\u003cstrong\u003eBFGMiner\u003c/strong\u003e\u0026nbsp;these software are designed for mining and can be used to implement\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://cryptodeeptech.ru/selfish-mining/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eSelfish Mining\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;attacks , as they allow miners to control the process of mining blocks.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-002.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eWireshark\u003c/a\u003e\u003c/h3\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eWireshark\u003c/strong\u003e\u0026nbsp;is a network analysis software and can be used to analyze network traffic and implement\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://cryptodeeptech.ru/sybil-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eSybil Attack\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;and\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://cryptodeeptech.ru/eclipse-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eEclipse Attack\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;. Fraudsters can use modified versions of the Bitcoin Core client to perform various attacks on the consensus mechanism.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003e\u003ca href=\"https://cryptodeep.ru/doc/Bitcoin_Will_Bite_the_Dust.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eBlockSci\u003c/a\u003e\u003c/h3\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eBlockSci\u003c/strong\u003e\u0026nbsp;– This software allows you to analyze the blockchain and can be used to conduct transaction analysis and\u0026nbsp;\u003ca href=\"https://cryptodeeptech.ru/dustattack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eDusting Attack\u0026nbsp;\u003cstrong\u003e(DUST ATTACK)\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003eImpact of the attack on the Bitcoin network\u003c/h3\u003e\n\n\n\n\u003cp\u003eVector76 Attack was first described in 2011 and is a combination of\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://dockeyhunt.com/dockeyhunt-finney-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eFinney\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;and\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://cryptodeeptech.ru/race-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eRace\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;attacks . The attack exploits vulnerabilities in the Bitcoin network transaction confirmation process. The basic idea is to create two conflicting transactions and run them through different nodes in the network, allowing the attacker to trick the recipient into double spending.\u003c/p\u003e\n\n\n\n\u003cp\u003eIn\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://cryptodeeptech.ru/race-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ea Race Attack\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;, an attacker attempts to conduct two transactions simultaneously, one of which he attempts to reverse.\u003c/p\u003e\n\n\n\n\u003cp\u003eIn\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://cryptodeeptech.ru/finney-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ea Finney Attack\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;, an attacker pre-mines a block with a transaction and then attempts to conduct another transaction with the same coins.\u003c/p\u003e\n\n\n\n\u003cp\u003eIn\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/vector76-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ethe Vector76 Attack\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;, the attacker uses elements of both attacks to create a double spending attack.\u003c/p\u003e\n\n\n\n\u003cp\u003eThe Vector76 attack could have serious consequences for the Bitcoin network. It undermines trust in the system, as users could lose funds due to double spending. In addition, the attack could cause delays in transaction confirmations and increase network congestion.\u003c/p\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003eAttack stages:\u003c/h3\u003e\n\n\n\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eCreate two transactions:\u003c/strong\u003e\u0026nbsp;The attacker creates two transactions with the same amount but different recipients. One transaction is sent to the network, and the other is held in an isolated part of the Bitcoin network.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eSending the first transaction:\u003c/strong\u003e\u0026nbsp;The first transaction is sent to the local network, where it is quickly confirmed.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eSending the second transaction:\u003c/strong\u003e\u0026nbsp;The second transaction is sent to the Bitcoin main network.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eFirst Transaction Confirmation:\u003c/strong\u003e\u0026nbsp;The recipient of the first transaction believes it is genuine and provides the product or service.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eSecond transaction confirmation:\u003c/strong\u003e\u0026nbsp;The second transaction is confirmed on the main network and the first transaction becomes invalid.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eConflict and Double Spend\u003c/strong\u003e\u0026nbsp;: As a result, a conflict occurs and one of the transactions may be included in the blockchain, resulting in a double spend.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eNetwork Merge\u003c/strong\u003e\u0026nbsp;: When an isolated part of the network merges with the main network, a conflict occurs and one of the transactions is cancelled.\u003c/li\u003e\n\u003c/ol\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003eVector76 Attack Detection and Prevention Mechanisms:\u003c/h3\u003e\n\n\n\n\u003cp\u003eTo protect the Bitcoin network from Vector76 attacks, various mechanisms for detecting and preventing attacks are used, and effective algorithms and systems for detecting suspicious transactions must be implemented.\u0026nbsp;\u003cem\u003eLet’s consider several approaches\u003c/em\u003e\u0026nbsp;:\u003c/p\u003e\n\n\n\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eBlock and transaction analysis:\u003c/strong\u003e\u0026nbsp;Mining software and network nodes analyze blocks and transactions for conflicts and anomalies.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eIncrease the number of confirmations:\u003c/strong\u003e\u0026nbsp;It is recommended to wait for a larger number of confirmations (e.g. 6 or more) before considering a transaction as finally confirmed. Increasing the time to wait for a transaction to be confirmed can reduce the likelihood of a successful attack.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eUsing\u0026nbsp;\u003c/strong\u003e\u003cem\u003e\u003ca href=\"https://bitcoinchatgpt.org/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003eMachine Learning Algorithms:\u003c/strong\u003e\u003c/a\u003e\u003c/em\u003e\u0026nbsp;Modern machine learning techniques can be used to detect suspicious patterns in transactions and blocks.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eNetwork Monitoring\u003c/strong\u003e\u0026nbsp;: Using specialized\u0026nbsp;\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://github.com/demining/CryptoDeepTools/tree/main/33FuzzingBitcoin\" target=\"_blank\" rel=\"noreferrer noopener\"\u003esoftware to monitor the network\u003c/a\u003e\u003c/strong\u003e\u003c/em\u003e\u0026nbsp;for suspicious transactions and behavior.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eMulti-Level Confirmation:\u003c/strong\u003e\u0026nbsp;Using multiple levels of transaction confirmation can improve security.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eAnomaly Analysis:\u003c/strong\u003e\u0026nbsp;Implementation of anomaly analysis systems to identify suspicious transactions and blockchains.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eUpdating Protocols\u003c/strong\u003e\u0026nbsp;: Regularly updating security protocols and implementing new security methods can improve the network’s resilience to attacks.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eStrengthening the consensus mechanism\u003c/strong\u003e\u0026nbsp;: Implementing additional checks and confirmations for transactions, which will make it more difficult to carry out attacks.\u003c/li\u003e\n\u003c/ol\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003eDistribution of an alternative block for carrying out Vector76 Attack:\u003c/h3\u003e\n\n\n\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eCreating Two Conflicting Transactions:\u003c/strong\u003e\u0026nbsp;An attacker creates two transactions that use the same inputs but have different recipients.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eFirst Transaction Propagation:\u003c/strong\u003e\u0026nbsp;The first transaction is sent to the network and included in a block that miners begin to confirm.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eCreating an alternative block:\u003c/strong\u003e\u0026nbsp;The attacker uses their own mining software to create an alternative block containing the second transaction.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003ePropagation of an alternative block:\u003c/strong\u003e\u0026nbsp;At a time when the first transaction has already received several confirmations, the attacker propagates an alternative block that may be accepted by the network if it contains more confirmations.\u003c/li\u003e\n\u003c/ol\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading\"\u003eStructure of Vector76 Attack:\u003c/h3\u003e\n\n\n\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eSetup\u003c/strong\u003e\u0026nbsp;: The attacker creates two transactions: one for the victim\u0026nbsp;\u003cstrong\u003e(T1)\u003c/strong\u003e\u0026nbsp;and one for himself\u0026nbsp;\u003cstrong\u003e(T2)\u003c/strong\u003e\u0026nbsp;.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eBlock mining\u003c/strong\u003e\u0026nbsp;: An attacker mines a block that includes\u0026nbsp;\u003cstrong\u003eT2\u003c/strong\u003e\u0026nbsp;but does not publish it.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eT1 execution\u003c/strong\u003e\u0026nbsp;: The attacker sends\u0026nbsp;\u003cstrong\u003eT1\u003c/strong\u003e\u0026nbsp;to the network and the victim accepts it after one confirmation.\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003eBlock Publishing\u003c/strong\u003e\u0026nbsp;: The attacker publishes a block with\u0026nbsp;\u003cstrong\u003eT2\u003c/strong\u003e\u0026nbsp;, which cancels\u0026nbsp;\u003cstrong\u003eT1\u003c/strong\u003e\u0026nbsp;.\u003c/li\u003e\n\u003c/ol\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/diagramRUS2-1024x486-1.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5417\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch2 class=\"wp-block-heading\"\u003ePractical part\u003c/h2\u003e\n\n\n\n\u003cp\u003eLet’s look at an example of this attack using the\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://dockeyhunt.com/dockeyhunt-vector76-attack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eDockeyhunt Vector76 Attack software.\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003eDownload the software from the official website:\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://dockeyhunt.com/dockeyhunt-vector76-attack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ewww.dockeyhunt.com\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003ca href=\"https://dockeyhunt.com/dockeyhunt-vector76-attack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-1024x372.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5427\"\u003e\u003c/a\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eWe will install all the necessary packages and libraries and run the\u0026nbsp;\u003cstrong\u003esetup.exe file.\u003c/strong\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-3.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5432\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-4.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5433\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eTo carry out a successful attack, it is very important for us to create a second transaction (\u0026nbsp;\u003cem\u003efor ourselves\u0026nbsp;\u003c/em\u003e\u003cstrong\u003eT2\u003c/strong\u003e\u0026nbsp;) for this, we need to prepare a Bitcoin Wallet in advance where we will send all our\u0026nbsp;\u003cstrong\u003eBTC\u003c/strong\u003e\u0026nbsp;coins for further storage in a cold wallet. Open the folder and run\u0026nbsp;\u003cstrong\u003eCold Bitcoin Wallet.exe\u003c/strong\u003e\u0026nbsp;to generate a new Bitcoin Address\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-9.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5443\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp class=\"has-medium-font-size\"\u003eClick\u0026nbsp;\u003cstrong\u003eGenerate Address\u003c/strong\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-8-1024x719.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5441\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp class=\"has-medium-font-size\"\u003eOur new Bitcoin Address details for further storage in a cold wallet.\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-8734171eb7337244eb99693e59cab360\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eCold Bitcoin Wallet: \n\n             Private Key HEX: 7b774f968a0eff26bb645fa91830a17a749e685ca4fab58b98bc03fd6a48405c\n             Private Key WIF: 5JkfMchWKeVh5nUmbTHPhFTpMPmWjn5a9JtrR8iBQqPCCmonapz\n             Private Key WIF compressed: L1MiHzZnRJVdv7jZq51MAeqN11VUFoyBHfys7X2kxCYxSxT9GWRx \n           \nPublic Key: 04addd5a1ced91a6364c486cbc95cde195108657d1eabb86bf97e5dfa3f099b2ba2b7c42c09f8d7d12c6f68a4d1750ac6abbf1379802b9501d9cc1c51b6dcbc87d \n                      Public Key compressed: 03addd5a1ced91a6364c486cbc95cde195108657d1eabb86bf97e5dfa3f099b2ba\n\n                      Public Address 1: 1KivXGdoDVPZCZLHpAe8rCztEirdrWuR4Y   \n                      Public Address 1 compressed: 1qqQcZbZNvsZoF5x3VcnEcJbzPeXncfKq   \n                      Public Address 3: 36QRQhDUdaufqTJYfgV76CTor6Nix8Zvz3  \n                      Public Address bc1 P2WPKH: bc1qpy79lkrlls0jhva93llvq6tkchrkp5zfgq5ned    \n                      Public Address bc1 P2WSH: bc1q3j88twpmde2rwz5tnecdezxsxtxje0cswfjkcfcckq3mx4d3hm2stuw0ss  \n\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter size-full is-resized\"\u003e\u003ca href=\"https://youtu.be/VCeQpYsh-Ts\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cimg decoding=\"async\" width=\"664\" height=\"384\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-3(1).png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-2944\" style=\"width:839px;height:auto\" srcset=\"https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-3.png 664w, https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-3-300x173.png 300w\" sizes=\"(max-width: 664px) 100vw, 664px\"\u003e\u003c/a\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003e\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-embed is-type-rich\"\u003e\u003cdiv class=\"wp-block-embed__wrapper\"\u003e\nhttps://youtube.com/watch?v=VCeQpYsh-Ts%3Fsi%3DZ6YV233mXvbY-SIt\n\u003c/div\u003e\u003c/figure\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp class=\"has-medium-font-size\"\u003eNow we establish a connection with the recipient, in our case the pseudo-recipient is a user of the\u0026nbsp;\u003cstrong\u003eHuobi crypto exchange\u003c/strong\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-11-1024x707.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5447\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003eBitcoin Pseudo-recipient address:\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-image\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-10.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5446\"\u003e\u003c/figure\u003e\n\n\n\n\u003cp\u003e\u003ca href=\"https://bitinfocharts.com/bitcoin/address/143gLvWYUojXaWZRrxquRKpVNTkhmr415B\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ehttps://bitinfocharts.com/bitcoin/address/143gLvWYUojXaWZRrxquRKpVNTkhmr415B\u003c/a\u003e\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/diagramRUS5-1024x486-5.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5496\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003ch2 class=\"wp-block-heading\"\u003eCreating Raw Transaction T1 (Victim)\u003c/h2\u003e\n\n\n\n\u003cp\u003e\u003cem\u003eThe pseudo-recipient\u0026nbsp;\u003c/em\u003e\u003cstrong\u003e(victim)\u003c/strong\u003e\u0026nbsp;is a user of the\u0026nbsp;\u003cstrong\u003eHuobi\u003c/strong\u003e\u0026nbsp;crypto exchange and expects from\u0026nbsp;\u003cem\u003ethe sender\u0026nbsp;\u003c/em\u003e\u003cstrong\u003e(attacker)\u003c/strong\u003e\u0026nbsp;an amount of:\u0026nbsp;\u003ccode\u003e\u003cstrong\u003e1.17506256 BTC\u003c/strong\u003e\u003c/code\u003e\u0026nbsp;\u003cem\u003e(in\u0026nbsp;\u003cstrong\u003eBitcoin\u003c/strong\u003e\u0026nbsp;cryptocurrency )\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003eSender’s Bitcoin Wallet for the amount:\u0026nbsp;\u003cstrong\u003e1.17521256 BTC\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-image\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-14.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5451\"\u003e\u003c/figure\u003e\n\n\n\n\u003cp\u003e\u003ca href=\"https://btc1.trezor.io/address/1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ehttps://btc1.trezor.io/address/1888dvSYUx23z2N\u003c/a\u003eNow let’s use the\u0026nbsp;\u003cem\u003e\u003cstrong\u003ePython\u003c/strong\u003e\u003c/em\u003e\u0026nbsp;script:\u0026nbsp;\u003ca href=\"https://github.com/smartibase/Broadcast-Bitcoin-Transaction/blob/main/pushtx.py\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003epushtx.py\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;to send\u0026nbsp;\u003cstrong\u003eBitcoin Transaction RawTX\u003c/strong\u003e\u003ca href=\"https://btc1.trezor.io/address/1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eF79NyCaYQ8dxcWCjHDz\u003c/a\u003e\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eLet’s open a new notebook in\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://colab.research.google.com/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eGoogle Colab\u003c/a\u003e\u0026nbsp;:\u0026nbsp;\u003ca href=\"https://colab.research.google.com/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ehttps://colab.research.google.com\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003eClone the\u0026nbsp;\u003ca href=\"https://github.com/smartibase/Broadcast-Bitcoin-Transaction.git\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003eBroadcast-Bitcoin-Transaction repository\u003c/strong\u003e\u003c/a\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-d633e6909fcf462f03472795674f3879\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003e!git clone https://github.com/smartibase/Broadcast-Bitcoin-Transaction.git\n\ncd Broadcast-Bitcoin-Transaction/\n\nls\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-21-1024x528.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5474\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eRun\u0026nbsp;\u003cstrong\u003e\u003cem\u003ePython\u003c/em\u003e\u003c/strong\u003e\u0026nbsp;script\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://github.com/smartibase/Broadcast-Bitcoin-Transaction/blob/main/bitcoin_info.py\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ebitcoin_info.py\u003c/a\u003e\u0026nbsp;\u003c/strong\u003e\u003cem\u003e(to check the Bitcoin sender address)\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-96129a8a28ef05d0010bfc887e367faa\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003e!python3 bitcoin_info.py\n\n1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-23-1024x353.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5476\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eTo create a\u0026nbsp;\u003cstrong\u003eRaw\u003c/strong\u003e\u0026nbsp;transaction\u0026nbsp;\u003cstrong\u003eT1,\u003c/strong\u003e\u0026nbsp;we need\u0026nbsp;\u003cem\u003eto copy\u003c/em\u003e\u0026nbsp;from Bitcoin Address:\u0026nbsp;\u003ca href=\"https://btc1.trezor.io/address/1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003e1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;\u003cstrong\u003eUTXO\u003c/strong\u003e\u0026nbsp;(\u0026nbsp;\u003cem\u003eUnspent Transaction Output\u003c/em\u003e\u0026nbsp;) the last\u0026nbsp;\u003cstrong\u003eTXID\u003c/strong\u003e\u0026nbsp;as an output of unspent transactions for the sender’s wallet.\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003ca href=\"https://btc1.trezor.io/tx/3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\"\u003ehttps://btc1.trezor.io/tx/3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\u003c/a\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-15-1024x203.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5454\"\u003e\u003cfigcaption class=\"wp-element-caption\"\u003e\u003cstrong\u003eTXID:\u0026nbsp;\u003ca href=\"https://btc1.trezor.io/tx/3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\u003c/a\u003e\u003c/strong\u003e\u003c/figcaption\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp class=\"has-medium-font-size\"\u003e\u003cstrong\u003e\u003ca href=\"https://dockeyhunt.com/dockeyhunt-vector76-attack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eLet’s go back to the root directory and run the Dockeyhunt Vector76 Attack\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;software\u003cstrong\u003e\u003ca href=\"https://dockeyhunt.com/dockeyhunt-vector76-attack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-16.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5456\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch4 class=\"wp-block-heading\"\u003eOption:\u003c/h4\u003e\n\n\n\n\u003cp\u003eWhen creating a transaction, we need to sign a digital signature with the\u0026nbsp;\u003cstrong\u003eECDSA\u003c/strong\u003e\u0026nbsp;algorithm , insert the private key of the Bitcoin Wallet sender into the field:\u0026nbsp;\u003ca href=\"https://btc1.trezor.io/address/1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003e1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;(\u0026nbsp;\u003cem\u003efor verification, we can use\u0026nbsp;\u003c/em\u003e\u003ca href=\"https://cryptodeep.ru/bitaddress.html\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003ebitaddress\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;)\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-f0cce6dad65146b53d67ccb25f28fc00\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003ePrivate Key: KwoqiXXrWkurxSazHJtmxKstB7g4HX247q7JoKcFDtHpFujKNSiD\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eCopy\u0026nbsp;\u003cstrong\u003eTXID:\u0026nbsp;\u003c/strong\u003e\u003cstrong\u003e\u003ca href=\"https://btc1.trezor.io/tx/3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;and paste it into the field. This is necessary to ensure that transactions are fully verified for all Bitcoin network nodes, as all transaction inputs are valid\u0026nbsp;\u003cem\u003e(this is very important and necessary for a successful\u0026nbsp;\u003cstrong\u003eVector76\u003c/strong\u003e\u0026nbsp;attack to ensure that the sender’s\u0026nbsp;\u003cstrong\u003eBTC\u003c/strong\u003e\u0026nbsp;coins are not spent in advance)\u003c/em\u003e\u0026nbsp;.\u0026nbsp;\u003cstrong\u003eUTXO\u003c/strong\u003e\u0026nbsp;allows for more efficient transaction processing, as each transaction output can only be used once\u0026nbsp;\u003cem\u003e(this simplifies the management of the Bitcoin network state and reduces the complexity of verifying Raw transactions)\u003c/em\u003e\u0026nbsp;.\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-2697599ef8559ea4756d7961455dbe7e\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003ePrev TXID: 3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eCopy the Bitcoin Address of the pseudo-recipient of the\u0026nbsp;\u003cstrong\u003eHuobi\u003c/strong\u003e\u0026nbsp;crypto exchange :\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://bitinfocharts.com/bitcoin/address/143gLvWYUojXaWZRrxquRKpVNTkhmr415B\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e143gLvWYUojXaWZRrxquRKpVNTkhmr415B\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;and paste it into the field.\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-1ddb6b572a01e74f4641379f989bb217\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eSend Address: 143gLvWYUojXaWZRrxquRKpVNTkhmr415B\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eCopy the total amount of Bitcoin coins and paste it into the field\u0026nbsp;\u003cem\u003e(for this sender this amount is:\u0026nbsp;\u003cstrong\u003e1.17521256 BTC\u003c/strong\u003e\u0026nbsp;the amount must be specified in Satoshi in the amount of:\u0026nbsp;\u003cstrong\u003e117521256\u003c/strong\u003e\u0026nbsp;)\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-71b23149970e6a226f9e49e7ccf387bc\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eTotal Received: 1.17521256 BTC (117521256 sat/vByte)\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eLet’s specify our own amount in the amount of:\u0026nbsp;\u003cstrong\u003e15000 sat/vByte\u003c/strong\u003e\u0026nbsp;this amount is a commission for the process of processing transactions by the miner. In Bitcoin, when we send a transaction, we pay a commission to the miners for including our created\u0026nbsp;\u003cstrong\u003eRaw\u003c/strong\u003e\u0026nbsp;transaction in the blockchain\u0026nbsp;\u003cem\u003e(this commission stimulates miners to process and confirm transactions).\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-fa8112fc1c3c9dcf46de58f23ff4ed10\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eFee: 0.00015000 BTC (15000 sat/vByte)\u003c/strong\u003e\n\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eLet’s specify the amount for sending BTC coins in our case when extracting from the total amount of\u0026nbsp;\u003cstrong\u003e117521256 sat/vByte\u003c/strong\u003e\u0026nbsp;and the size of the commission:\u0026nbsp;\u003cstrong\u003e15000 sat/vByte\u003c/strong\u003e\u0026nbsp;the amount to send will be\u0026nbsp;\u003cem\u003ein Satoshi\u003c/em\u003e\u0026nbsp;:\u0026nbsp;\u003cstrong\u003e117506256\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-27325846ffa1b6ef5bfba788748a8f1b\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eSent: 1.17506256 BTC (117506256 sat/vByte)\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eAfter we have added all the options, click\u0026nbsp;\u003cstrong\u003eCreate Transaction\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-image\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-20.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5460\"\u003e\u003c/figure\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch4 class=\"wp-block-heading\"\u003eResult:\u003c/h4\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-f8fdcd38dd6074c7fed01056b9870718\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eYour Bitcoin Address: 1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\nBitcoin Address for sending BTC: 143gLvWYUojXaWZRrxquRKpVNTkhmr415B\nBitcoin Transaction RawTX:\n010000000161e8e6fbe03bb2ea5508067c270ff878bccccefa37e80d1a5b5eac321abd4131000000006b483045022100dff55be52be07900dd4d2d04473c93249ca78e37955e466437c26f06322f01bc02205ed04a2a4201e8c2b3035de7edfa972e1f7da57dbcca3eaa4fbd4db4cd8ad507012102650afad13f8fb85925ba6765dc5416bad623cdfce3f104191964253a12ed0cddffffffff01d0000107000000001976a914216a0d339ab6ddc696b1b239b9b65810c0bf73d588ac00000000\n\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter size-full is-resized\"\u003e\u003ca href=\"https://youtu.be/qjcFNV90p8I\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cimg decoding=\"async\" width=\"668\" height=\"381\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-4(1).png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-2949\" style=\"width:838px;height:auto\" srcset=\"https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-4.png 668w, https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-4-300x171.png 300w\" sizes=\"(max-width: 668px) 100vw, 668px\"\u003e\u003c/a\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003e\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-embed is-type-rich\"\u003e\u003cdiv class=\"wp-block-embed__wrapper\"\u003e\nhttps://youtube.com/watch?v=qjcFNV90p8I%3Fsi%3DjlnG-yg3Od3XH2bX\n\u003c/div\u003e\u003c/figure\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eNow let’s use the\u0026nbsp;\u003cem\u003e\u003cstrong\u003ePython\u003c/strong\u003e\u003c/em\u003e\u0026nbsp;script:\u0026nbsp;\u003ca href=\"https://github.com/smartibase/Broadcast-Bitcoin-Transaction/blob/main/pushtx.py\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003epushtx.py\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;to send\u0026nbsp;\u003cstrong\u003eBitcoin Transaction RawTX\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-6ece010cbbeb4264d151e612001449d1\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003e!python3 pushtx.py\u003c/strong\u003e\n\n\u003cstrong\u003e010000000161e8e6fbe03bb2ea5508067c270ff878bccccefa37e80d1a5b5eac321abd4131000000006b483045022100dff55be52be07900dd4d2d04473c93249ca78e37955e466437c26f06322f01bc02205ed04a2a4201e8c2b3035de7edfa972e1f7da57dbcca3eaa4fbd4db4cd8ad507012102650afad13f8fb85925ba6765dc5416bad623cdfce3f104191964253a12ed0cddffffffff01d0000107000000001976a914216a0d339ab6ddc696b1b239b9b65810c0bf73d588ac00000000\u003c/strong\u003e\n\u003c/code\u003e\u003c/pre\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-24-1024x251.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5477\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003ch4 class=\"wp-block-heading\"\u003eResult:\u003c/h4\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-932293e522a5359210723454962178ff\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eEnter your raw transaction: 010000000161e8e6fbe03bb2ea5508067c270ff878bccccefa37e80d1a5b5eac321abd4131000000006b483045022100dff55be52be07900dd4d2d04473c93249ca78e37955e466437c26f06322f01bc02205ed04a2a4201e8c2b3035de7edfa972e1f7da57dbcca3eaa4fbd4db4cd8ad507012102650afad13f8fb85925ba6765dc5416bad623cdfce3f104191964253a12ed0cddffffffff01d0000107000000001976a914216a0d339ab6ddc696b1b239b9b65810c0bf73d588ac00000000\nTX: e129cd4257b2c9f5061dfb80d8b7a59e62cbaf3cdfba8d3fde2953759e63bcf0\nTransaction successfully broadcasted!\nBroadcasting Transactions into the Bitcoin Network: https://broad-casts.ru/bitcoin-network\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eA pseudo-recipient user of the\u0026nbsp;\u0026nbsp;\u003cstrong\u003eHuobi\u003c/strong\u003e\u0026nbsp;crypto exchange sees a payment on the Bitcoin\u0026nbsp;\u003cstrong\u003eTX network: e129cd4257b2c9f5061dfb80d8b7a59e62cbaf3cdfba8d3fde2953759e63bcf0\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003eNow the attacker proceeds to the second stage, creating a\u0026nbsp;\u003cstrong\u003eT2 transaction\u0026nbsp;\u003c/strong\u003e\u003cem\u003e(for himself)\u003c/em\u003e\u0026nbsp;to take all the coins for the sent amount of\u0026nbsp;\u003cstrong\u003e1.17506256 BTC (117506256 sat/vByte)\u003c/strong\u003e\u0026nbsp;from the Bitcoin network to the balance of his cold wallet.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/diagramRUS1-1024x486-1-1.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5497\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003ch2 class=\"wp-block-heading\"\u003eCreate Raw transaction T2 (for yourself)\u003c/h2\u003e\n\n\n\n\u003cp\u003ePreviously we created a cold Bitcoin Wallet, we did this in advance specifically to create the second transaction (\u0026nbsp;\u003cem\u003efor ourselves\u0026nbsp;\u003c/em\u003e\u0026nbsp;\u003cstrong\u003eT2\u003c/strong\u003e\u0026nbsp;) to prepare the Bitcoin Wallet:\u0026nbsp;\u003cstrong\u003e\u003ca href=\"https://btc1.trezor.io/address/1qqQcZbZNvsZoF5x3VcnEcJbzPeXncfKq\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e1qqQcZbZNvsZoF5x3VcnEcJbzPeXncfKq\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;where we will send from the Bitcoin network all coins in the amount of:\u0026nbsp;\u003cstrong\u003e1.17506256 BTC (117506256 sat/vByte)\u003c/strong\u003e\u0026nbsp;for further storage in a cold wallet).\u003cstrong\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-8-COLD_BITCOIN_WALLET.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5479\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp class=\"has-medium-font-size\"\u003eCopy the Bitcoin Address of the new cold wallet:\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-1ce65b29baac9dfe016c13fb31a21c25\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eCold Bitcoin Wallet:\n\nPublic Address 1 compressed: 1qqQcZbZNvsZoF5x3VcnEcJbzPeXncfKq\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp class=\"has-medium-font-size\"\u003e\u003cstrong\u003eLet’s re-launch the Dockeyhunt Vector76 Attack\u003c/strong\u003e\u0026nbsp;software.\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-16.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5456\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003eLet’s add a new option with new data\u003c/p\u003e\n\n\n\n\u003ch4 class=\"wp-block-heading\"\u003eOption:\u003c/h4\u003e\n\n\n\n\u003cp\u003eAll the same, to create a transaction, we need to sign a digital signature with the\u0026nbsp;\u003cstrong\u003eECDSA\u003c/strong\u003e\u0026nbsp;algorithm , insert the private key of the Bitcoin Wallet sender into the field:\u0026nbsp;\u003ca href=\"https://btc1.trezor.io/address/1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003e1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;(\u0026nbsp;\u003cem\u003efor verification, we can use\u0026nbsp;\u003c/em\u003e\u003ca href=\"https://cryptodeep.ru/bitaddress.html\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003ebitaddress\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;)\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-f0cce6dad65146b53d67ccb25f28fc00\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003ePrivate Key: KwoqiXXrWkurxSazHJtmxKstB7g4HX247q7JoKcFDtHpFujKNSiD\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eCopy\u0026nbsp;\u003cstrong\u003eTXID:\u0026nbsp;\u003c/strong\u003e\u003cstrong\u003e\u003ca href=\"https://btc1.trezor.io/tx/3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;and paste it into the field. This is necessary to ensure that transactions are fully verified for all Bitcoin network nodes, as all transaction inputs are valid\u0026nbsp;\u003cem\u003e(this is very important and necessary for a successful\u0026nbsp;\u003cstrong\u003eVector76\u003c/strong\u003e\u0026nbsp;attack to ensure that the sender’s\u0026nbsp;\u003cstrong\u003eBTC\u003c/strong\u003e\u0026nbsp;coins are not spent in advance)\u003c/em\u003e\u0026nbsp;.\u0026nbsp;\u003cstrong\u003eUTXO\u003c/strong\u003e\u0026nbsp;allows for more efficient transaction processing, as each transaction output can only be used once\u0026nbsp;\u003cem\u003e(this simplifies the management of the Bitcoin network state and reduces the complexity of verifying Raw transactions)\u003c/em\u003e\u0026nbsp;.\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-2697599ef8559ea4756d7961455dbe7e\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003ePrev TXID: 3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eLet’s copy the new Bitcoin Address of the new cold wallet where we will transfer all\u0026nbsp;\u003cstrong\u003eBTC\u003c/strong\u003e\u0026nbsp;coins :\u0026nbsp;\u003ca href=\"https://btc1.trezor.io/address/1qqQcZbZNvsZoF5x3VcnEcJbzPeXncfKq\"\u003e\u003cstrong\u003e1qqQcZbZNvsZoF5x3VcnEcJbzPeXncfKq\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;and paste it into the field.\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-f9fd4bf6c63272747b41a33397d78afd\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eSend Address: 1qqQcZbZNvsZoF5x3VcnEcJbzPeXncfKq\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eCopy the total amount of Bitcoin coins and paste it into the field\u0026nbsp;\u003cem\u003e(for this sender this amount is:\u0026nbsp;\u003cstrong\u003e1.17521256 BTC\u003c/strong\u003e\u0026nbsp;the amount must be specified in Satoshi in the amount of:\u0026nbsp;\u003cstrong\u003e117521256\u003c/strong\u003e\u0026nbsp;)\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-71b23149970e6a226f9e49e7ccf387bc\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eTotal Received: 1.17521256 BTC (117521256 sat/vByte)\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eLet’s specify our own amount in the amount of:\u0026nbsp;\u003cstrong\u003e15000 sat/vByte\u003c/strong\u003e\u0026nbsp;this amount is a commission for the process of processing transactions by the miner. In Bitcoin, when we send a transaction, we pay a commission to the miners for including our created\u0026nbsp;\u003cstrong\u003eRaw\u003c/strong\u003e\u0026nbsp;transaction in the blockchain\u0026nbsp;\u003cem\u003e(this commission stimulates miners to process and confirm transactions).\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-fa8112fc1c3c9dcf46de58f23ff4ed10\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eFee: 0.00015000 BTC (15000 sat/vByte)\u003c/strong\u003e\n\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eLet’s specify the amount for sending BTC coins in our case when extracting from the total amount of\u0026nbsp;\u003cstrong\u003e117521256 sat/vByte\u003c/strong\u003e\u0026nbsp;and the size of the commission:\u0026nbsp;\u003cstrong\u003e15000 sat/vByte\u003c/strong\u003e\u0026nbsp;the amount to send will be\u0026nbsp;\u003cem\u003ein Satoshi\u003c/em\u003e\u0026nbsp;:\u0026nbsp;\u003cstrong\u003e117506256\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-27325846ffa1b6ef5bfba788748a8f1b\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eSent: 1.17506256 BTC (117506256 sat/vByte)\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003cp\u003eAfter we have added all the options, click\u0026nbsp;\u003cstrong\u003eCreate Transaction\u003c/strong\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-25-BTC.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5487\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch4 class=\"wp-block-heading\"\u003eResult:\u003c/h4\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-f004176122be2e8676f59622059754c9\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eYour Bitcoin Address: 1888dvSYUx23z2NF79NyCaYQ8dxcWCjHDz\nBitcoin Address for sending BTC: 1qqQcZbZNvsZoF5x3VcnEcJbzPeXncfKq\nBitcoin Transaction RawTX:\n010000000161e8e6fbe03bb2ea5508067c270ff878bccccefa37e80d1a5b5eac321abd4131000000006a473044022027033ea1c9df979fe39b016ee9ef446fab3e87dd4514623ad8a655e8eab31f0002201b58688b9949a8b9b05cb74b3bd829f6c134c5bef132e9df0eafeea9585abc45012102650afad13f8fb85925ba6765dc5416bad623cdfce3f104191964253a12ed0cddfdffffff01d0000107000000001976a914093c5fd87ffc1f2bb3a58ffec06976c5c760d04988ac00000000\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter size-full is-resized\"\u003e\u003ca href=\"https://youtu.be/HboBRmiCfIQ\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cimg loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"383\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-5.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-2951\" style=\"width:839px;height:auto\" srcset=\"https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-5.png 667w, https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-5-300x172.png 300w\" sizes=\"(max-width: 667px) 100vw, 667px\"\u003e\u003c/a\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003e\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-embed is-type-rich\"\u003e\u003cdiv class=\"wp-block-embed__wrapper\"\u003e\nhttps://youtube.com/watch?v=HboBRmiCfIQ%3Fsi%3D8RXJPtmeZSKhEdhb\n\u003c/div\u003e\u003c/figure\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eNow let’s use the\u0026nbsp;\u003cem\u003e\u003cstrong\u003ePython\u003c/strong\u003e\u003c/em\u003e\u0026nbsp;script:\u0026nbsp;\u003ca href=\"https://github.com/smartibase/Broadcast-Bitcoin-Transaction/blob/main/pushtx.py\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003epushtx.py\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;to send\u0026nbsp;\u003cstrong\u003eBitcoin Transaction RawTX\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-aa630af5614f0f56e55e12fb4b9523bc\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003e!python3 pushtx.py\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-26-1024x261.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5491\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003ch4 class=\"wp-block-heading\"\u003eResult:\u003c/h4\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-951a774bb9fc03117399919369e44828\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eEnter your raw transaction: 010000000161e8e6fbe03bb2ea5508067c270ff878bccccefa37e80d1a5b5eac321abd4131000000006a473044022027033ea1c9df979fe39b016ee9ef446fab3e87dd4514623ad8a655e8eab31f0002201b58688b9949a8b9b05cb74b3bd829f6c134c5bef132e9df0eafeea9585abc45012102650afad13f8fb85925ba6765dc5416bad623cdfce3f104191964253a12ed0cddfdffffff01d0000107000000001976a914093c5fd87ffc1f2bb3a58ffec06976c5c760d04988ac00000000\nTX: d7b2f7279687abd3abf0367ac31223359dc8b53b32b7adbdfc2d0ada2a8015bc\nTransaction successfully broadcasted!\nBroadcasting Transactions into the Bitcoin Network: https://broad-casts.ru/bitcoin-network\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eNow we have received\u0026nbsp;\u003cstrong\u003eTX: d7b2f7279687abd3abf0367ac31223359dc8b53b32b7adbdfc2d0ada2a8015bc\u003c/strong\u003e\u0026nbsp;all that remains is to mine the block and publish the block to the main blockchain which includes the\u0026nbsp;\u003cstrong\u003eT2 transaction\u0026nbsp;\u003c/strong\u003e\u003cem\u003e(for ourselves)\u003c/em\u003e\u0026nbsp;.\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-image\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/diagramRUS3-1024x486-3-1.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5494\"\u003e\u003c/figure\u003e\n\n\n\n\u003ch2 class=\"wp-block-heading\"\u003eMining and publishing a block to the Bitcoin network main chain\u003c/h2\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eLet’s go back to the root directory, open the folder and run the Block Bitcoin Mining\u003c/strong\u003e\u0026nbsp;software\u003cstrong\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-27.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5502\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/001-1024x768.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5606\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003eTo add an option to an empty field, we need to get input data for certain values ​​to configure the mining block. To do this, run the\u0026nbsp;\u003cstrong\u003e\u003cem\u003ePython\u003c/em\u003e\u003c/strong\u003e\u0026nbsp;script:\u0026nbsp;\u003ca href=\"https://github.com/smartibase/Broadcast-Bitcoin-Transaction/blob/main/block_header.py\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003eblock_header.py\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e\u0026nbsp;and enter the UTXO\u003c/strong\u003e\u0026nbsp;value we know,\u0026nbsp;which we previously added to the\u0026nbsp;\u003cstrong\u003ePrev TXID\u003c/strong\u003e\u0026nbsp;option hash when creating\u0026nbsp;\u003cstrong\u003ethe Raw\u003c/strong\u003e\u0026nbsp;transaction\u0026nbsp;\u003cstrong\u003ePrev TXID\u0026nbsp;: 3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eUTXO\u003c/strong\u003e\u0026nbsp;allows for more efficient transaction processing, as each transaction output can only be used once\u0026nbsp;\u003cem\u003e(this simplifies the management of the Bitcoin network state and reduces the complexity of verifying Raw transactions)\u003c/em\u003e\u0026nbsp;.\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-568e0915b69f5d36815d13c2330e0ff4\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003e!python3 block_header.py\u003c/strong\u003e\n\n\u003cstrong\u003e3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\u003c/strong\u003e\n\u003c/code\u003e\u003c/pre\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-28-1024x346.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5503\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003eLet’s copy the received data:\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-cdd14122eab9f6ab64b9a6e232c9649d\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eEnter TXID: 3141bd1a32ac5e5b1a0de837faceccbc78f80f277c060855eab23be0fbe6e861\nBlock Header:\nBlock: 00000000000000000003e5557c14e955f2c88465bb8c02a4d694a3657a40d79e\nBlock Height: 808875\nMined Time: 2023-09-22T17:29:25Z\nPrev Block: 000000000000000000048e0643366b7c0129d2dd8d2cf758ca6273ed81c765d8\nMerkle Root: c1fc30413e984cdd90dc1ac91a69add6c138af950e1c6388cb20759494073d2c\nNonce: 1098256692\nBits: 386198911\nVersion: 536903680\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eLet’s add\u0026nbsp;\u003cstrong\u003eRawTX for\u0026nbsp;\u003c/strong\u003e\u003cstrong\u003eT2\u003c/strong\u003e\u0026nbsp;transaction\u0026nbsp;\u003cem\u003e(for ourselves)\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-089fb6e931373c542abe0366dd8b97b0\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eBitcoin Transaction RawTX:\n010000000161e8e6fbe03bb2ea5508067c270ff878bccccefa37e80d1a5b5eac321abd4131000000006a473044022027033ea1c9df979fe39b016ee9ef446fab3e87dd4514623ad8a655e8eab31f0002201b58688b9949a8b9b05cb74b3bd829f6c134c5bef132e9df0eafeea9585abc45012102650afad13f8fb85925ba6765dc5416bad623cdfce3f104191964253a12ed0cddfdffffff01d0000107000000001976a914093c5fd87ffc1f2bb3a58ffec06976c5c760d04988ac00000000\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003ca href=\"https://dockeyhunt.com/dockeyhunt-vector76-attack/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/mining.gif\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\"\u003e\u003c/a\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp class=\"has-medium-font-size\"\u003eOnce the block for the\u0026nbsp;\u003cstrong\u003eT2 transaction\u0026nbsp;\u003c/strong\u003e\u003cem\u003e(for yourself)\u003c/em\u003e\u0026nbsp;is mined using the\u0026nbsp;\u003cstrong\u003eBlock Bitcoin Mining software, we will receive a file in\u0026nbsp;\u003c/strong\u003e\u003cstrong\u003e\u003ca href=\"https://keyhunters.ru/bitcoinjson/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eJSON\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;format\u003cstrong\u003e\u003ca href=\"https://keyhunters.ru/bitcoinjson/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-29.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5508\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eOur mined block for confirmation in the general blockchain chain is located in the file:\u0026nbsp;\u003cstrong\u003eblock_hash_mining.json\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003eLet’s open the file:\u0026nbsp;\u003cstrong\u003eblock_hash_mining.json\u003c/strong\u003e\u0026nbsp;using\u0026nbsp;\u003ca href=\"https://keyhunters.ru/the-benefits-of-the-popular-notepad-program/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003eNotepad++\u003c/strong\u003e\u003c/a\u003e\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-30.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5511\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp class=\"has-medium-font-size\"\u003eIn line\u0026nbsp;\u003cstrong\u003e#875\u003c/strong\u003e\u0026nbsp;we see a new block.\u003c/p\u003e\n\n\n\n\u003cpre class=\"wp-block-code has-text-color has-link-color wp-elements-487fd86cfa02319cd6a4049a845db9f9\" style=\"color:#4092c2\"\u003e\u003ccode\u003e\u003cstrong\u003eblock_hash: 00000000000000000004401ea0694af9c89564d76bc5462577e312eea5d23fa2\u003c/strong\u003e\u003c/code\u003e\u003c/pre\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter size-full is-resized\"\u003e\u003ca href=\"https://youtu.be/Qa0FQJaOrKM\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cimg loading=\"lazy\" decoding=\"async\" width=\"670\" height=\"382\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-6.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-2955\" style=\"width:839px;height:auto\" srcset=\"https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-6.png 670w, https://cryptodeeptech.ru/wp-content/uploads/2024/07/image-6-300x171.png 300w\" sizes=\"(max-width: 670px) 100vw, 670px\"\u003e\u003c/a\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003cp\u003e\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-embed is-type-rich\"\u003e\u003cdiv class=\"wp-block-embed__wrapper\"\u003e\nhttps://youtube.com/watch?v=Qa0FQJaOrKM%3Fsi%3D__2O5roSMYlQ5sNM\n\u003c/div\u003e\u003c/figure\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp class=\"has-medium-font-size\"\u003eLet’s go back to\u0026nbsp;\u003cstrong\u003eGoogle Cola\u003c/strong\u003e\u0026nbsp;b and run\u0026nbsp;\u003cstrong\u003ethe\u0026nbsp;\u003c/strong\u003e\u003cstrong\u003e\u003cem\u003ePython\u003c/em\u003e\u003c/strong\u003e\u0026nbsp;script, enter\u0026nbsp;\u003cstrong\u003ethe TXID of\u0026nbsp;\u003c/strong\u003e\u003cstrong\u003ethe T2\u003c/strong\u003e\u0026nbsp;transaction\u0026nbsp;\u003cem\u003e(for ourselves)\u003c/em\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-32-1024x335-1.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5517\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003ch1 class=\"wp-block-heading has-text-color has-link-color wp-elements-200a1def5c42cd6541b6a99fe799accc\" style=\"color:#008000\"\u003eEVERYTHING IS CORRECT!!!\u003c/h1\u003e\n\n\n\n\u003cp\u003eThe block confirms the authenticity of transaction\u0026nbsp;\u003cstrong\u003eT2\u0026nbsp;\u003c/strong\u003e\u003cem\u003e(to itself)\u003c/em\u003e\u0026nbsp;.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eLet’s also check\u0026nbsp;\u003cem\u003e\u003ca href=\"https://btc1.trezor.io/tx/d7b2f7279687abd3abf0367ac31223359dc8b53b32b7adbdfc2d0ada2a8015bc\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ethe link\u003c/a\u003e\u003c/em\u003e\u0026nbsp;in the blockchain:\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003ca href=\"https://btc1.trezor.io/tx/d7b2f7279687abd3abf0367ac31223359dc8b53b32b7adbdfc2d0ada2a8015bc\"\u003ehttps://btc1.trezor.io/tx/d7b2f7279687abd3abf0367ac31223359dc8b53b32b7adbdfc2d0ada2a8015bc\u003c/a\u003e\u003c/p\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-31-1.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5516\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003ch1 class=\"wp-block-heading has-text-align-center has-text-color has-link-color wp-elements-9e5ce25207bf5e863792e5ea6587b0e5\" style=\"color:#008000\"\u003ePayment confirmed by miners\u003c/h1\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/diagramRUS4-1024x486-4.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5519\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003ch2 class=\"wp-block-heading\"\u003eTransaction T1 (victim) is cancelled\u003c/h2\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eHuobi\u003c/strong\u003e\u0026nbsp;crypto exchange user pseudo-recipient payment\u0026nbsp;\u0026nbsp;\u0026nbsp;automatically canceled on Bitcoin\u0026nbsp;\u0026nbsp;\u003cstrong\u003eTX network: e129cd4257b2c9f5061dfb80d8b7a59e62cbaf3cdfba8d3fde2953759e63bcf0\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cfigure class=\"wp-block-image\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/image-33.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5521\"\u003e\u003c/figure\u003e\n\n\n\n\u003cp\u003e\u003ca href=\"https://btc1.trezor.io/tx/e129cd4257b2c9f5061dfb80d8b7a59e62cbaf3cdfba8d3fde2953759e63bcf0\"\u003e\u003cstrong\u003ehttps://btc1.trezor.io/tx/e129cd4257b2c9f5061dfb80d8b7a59e62cbaf3cdfba8d3fde2953759e63bcf0\u003c/strong\u003e\u003c/a\u003e\u003c/p\u003e\n\n\n\n\u003ch3 class=\"wp-block-heading has-text-align-center has-text-color has-link-color wp-elements-d518333090bc2a498a1a2c571684b586\" style=\"color:#b00000\"\u003eTransaction not found due to not being in the general block chain\u003c/h3\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch2 class=\"wp-block-heading\"\u003eConclusion:\u003c/h2\u003e\n\n\n\n\u003cp\u003e\u003cem\u003eAll these software and tools facilitate the creation of fraudulent schemes, which can lead to an increase in the number of victims and losses of\u0026nbsp;\u003cstrong\u003eBTC\u003c/strong\u003e\u0026nbsp;and\u0026nbsp;\u003cstrong\u003eETH\u003c/strong\u003e\u0026nbsp;coins among users. This, in turn, can cause a negative attitude towards cryptocurrencies and the crypto community as a whole.\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eDamage to Business:\u0026nbsp;\u003c/strong\u003e\u003cem\u003eMany companies and services that accept\u0026nbsp;\u003cstrong\u003eBitcoin\u003c/strong\u003e\u0026nbsp;may suffer significant losses due to the use of fake transactions. This may lead to the refusal to accept\u0026nbsp;\u003cstrong\u003eBitcoin\u003c/strong\u003e\u0026nbsp;as a means of payment, which will also negatively affect its adoption.\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eIncreased complexity of regulation:\u0026nbsp;\u003c/strong\u003e\u003cem\u003eThe use of such software complicates the work of regulators and law enforcement agencies who are trying to combat fraud and money laundering. This may lead to stricter regulations and restrictions on the use of cryptocurrencies.\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003eNeed for improved security\u003c/strong\u003e\u0026nbsp;:\u0026nbsp;\u003cem\u003eConstant threats require developers and users to implement new security measures and improve existing protection mechanisms. The Bitcoin developer community can take steps to combat fraudulent transactions. This may include improving transaction confirmation algorithms and introducing new security protocols. However, such measures may require significant resources and time.\u003c/em\u003e\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003ch2 class=\"wp-block-heading\"\u003eReferences:\u003c/h2\u003e\n\n\n\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003e[1]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-001.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eBitcoin’s Security Model Revisited\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;(Yonatan Sompolinsky and Aviv Zohar School of Engineering and Computer Science, The Hebrew University of Jerusalem, Israel Microsoft Research, Herzliya, Israel\u003c/em\u003e)\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[2]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-002.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003eSecurity Threats Classification in Blockchains\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;(Jamal Hayat Mosakheil St. Cloud State University\u003c/em\u003e)\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[3]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-003.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eThe Balance Attack or Why Forkable Blockchains Are Ill-Suited for Consortium\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;(Christopher Natoli Vincent Gramoli School of IT University of Sydney Sydney, Australia\u003c/em\u003e)\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[4]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-004.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eBlockchain Vulnerabilities and Recent Security Challenges: A Review Paper\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;(Aysha AlFaw, Wael Elmedany, Mhd Saeed Sharif, College of Information Technology University of Bahrain Sakhir, Bahrain)\u003c/em\u003e\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[5]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/doc/How%20Much%20Vulnerable%20is%20a%20Cryptocurrency%20-%20BitcoinAttack4487962.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eHow Much Vulnerable is a Cryptocurrency?\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;Mario Arturo Ruiz Estrada Econographication Virtual Laboratory (EVL)\u003c/em\u003e\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[6]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-006.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eA SURVEY ON SECURITY ATTACKS AND CHALLENGES IN BITCOIN\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;(Viji Priya .G, Krishna Priya .G, Vivek .M and Ashwini .R Department of Computer Science \u0026amp; Engineering, Jansons Institute of Technology, Coimbatore, Tamilnadu, India)\u003c/em\u003e\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[7]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-007.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003e\u003cstrong\u003eThe BOOK of JARGON ®\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;Cryptocurrency \u0026amp; Blockchain Technology The Latham \u0026amp; Watkins Glossary Acronyms, Slang, and Terminology\u003c/em\u003e\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[8]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-008.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eThe Blockchain Anomaly\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;(Christopher Natoli Vincent Gramoli NICTA/Data61-CSIRO University of Sydney)\u003c/em\u003e\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[9]\u003c/strong\u003e\u0026nbsp;\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-009.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eExploring Sybil and Double-Spending Risks in Blockchain Systems\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;(MUBASHAR IQBAL AND RAIMUNDAS MATULEVIČIUS Institute of Computer Science, University of Tartu, 51009 Tartu, Estonia)\u003c/em\u003e\u003c/li\u003e\n\n\n\n\u003cli\u003e\u003cstrong\u003e[10]\u0026nbsp;\u003c/strong\u003e\u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeep.ru/doc/bitcoin-vector76-attack-010.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eA Review on Attacks on Blockchain Technology\u003c/a\u003e\u003c/strong\u003e\u0026nbsp;(Literature Article/Review Article Oğuzhan TAŞ, Farzad KİANI Computer Engineering, Istanbul Sabahattin Zaim University, Faculty of Engineering and Natural Sciences, Istanbul, Turkey)\u003c/em\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003eThis material was created for the\u0026nbsp;\u0026nbsp;\u003ca href=\"https://cryptodeep.ru/\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eCRYPTO DEEP TECH\u003c/a\u003e\u0026nbsp;portal \u0026nbsp;to ensure financial data security and cryptography on elliptic curves\u0026nbsp;\u0026nbsp;\u003ca href=\"https://www.youtube.com/@cryptodeeptech\" target=\"_blank\" rel=\"noreferrer noopener\"\u003esecp256k1 against weak\u0026nbsp;\u003c/a\u003e\u003ca href=\"https://github.com/demining/CryptoDeepTools\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eECDSA\u003c/a\u003e\u0026nbsp;\u0026nbsp;signatures\u0026nbsp;\u0026nbsp;\u0026nbsp;in the\u0026nbsp;\u003ca href=\"https://t.me/cryptodeeptech\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eBITCOIN\u003c/a\u003e\u0026nbsp;cryptocurrency. The creators of the software are not responsible for the use of materials.\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003e\u003ca href=\"https://github.com/demining/CryptoDeepTools/tree/main/34Vector76Attack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eSource\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003e\u003ca href=\"https://t.me/cryptodeeptech\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eTelegram: https://t.me/cryptodeeptech\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003e\u003ca href=\"https://youtu.be/Mk_BPBCXd3I\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eVideo material: https://youtu.be/Mk_BPBCXd3I\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003e\u003ca href=\"dzen:\"\u003eDZEN:\u003c/a\u003e\u0026nbsp;\u003ca href=\"https://dzen.ru/video/watch/669558eb4bbd297f7d375e06\" target=\"_blank\" rel=\"noreferrer noopener\"\u003ehttps://dzen.ru/video/watch/669558eb4bbd297f7d375e06\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003cp\u003e\u003cstrong\u003e\u003ca href=\"https://cryptodeeptech.ru/vector76-attack\" target=\"_blank\" rel=\"noreferrer noopener\"\u003eSource: https://cryptodeeptech.ru/vector76-attack\u003c/a\u003e\u003c/strong\u003e\u003c/p\u003e\n\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\n\n\u003cdiv class=\"wp-block-image\"\u003e\n\u003cfigure class=\"aligncenter\"\u003e\u003cimg decoding=\"async\" src=\"./Vector76 Attack Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data - CRYPTO DEEP TECH_files/055-1024x576.png\" alt=\"Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data\" class=\"wp-image-5539\"\u003e\u003c/figure\u003e\u003c/div\u003e\n\n\n\u003chr class=\"wp-block-separator has-alpha-channel-opacity\"\u003e\n\t\u003c/div\u003e\u003c!-- .entry-content --\u003e\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdemining%2Fvector76-attack","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdemining%2Fvector76-attack","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdemining%2Fvector76-attack/lists"}