<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Blockchain — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/blockchain/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 21:16:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/blockchain/feed.xml" rel="self" type="application/rss+xml"/><item><title>Nimiq Blockchain Timestamp Manipulation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nimiq-timestamp-inflation/</link><pubDate>Thu, 09 Apr 2026 21:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nimiq-timestamp-inflation/</guid><description>A vulnerability in nimiq-blockchain versions 1.3.0 and earlier allows malicious validators to manipulate block timestamps, leading to inflation of the monetary supply.</description><content:encoded><![CDATA[<p>Nimiq-blockchain, which provides persistent block storage for Nimiq&rsquo;s Rust implementation, is susceptible to a critical vulnerability. In versions 1.3.0 and earlier, the block timestamp validation lacks an upper bound check against the wall clock. This flaw enables a malicious block-producing validator to set block timestamps to an arbitrarily distant future. The vulnerability directly impacts reward calculations within the blockchain, specifically through <code>Policy::supply_at()</code> and <code>batch_delay()</code> in <code>blockchain/src/reward.rs</code>. By manipulating these timestamps, attackers can inflate the monetary supply beyond the intended emission schedule. This poses a significant threat to the integrity and economic stability of the Nimiq blockchain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains control of a block-producing validator node within the Nimiq blockchain network.</li>
<li>The attacker crafts a malicious block.</li>
<li>The malicious block is created with a timestamp set arbitrarily far into the future.</li>
<li>The vulnerable timestamp validation logic in Nimiq-blockchain (versions 1.3.0 and earlier) fails to detect the out-of-bounds timestamp due to the missing upper bound check.</li>
<li>The malicious block is accepted and added to the blockchain.</li>
<li>The inflated timestamp is used in reward calculations via <code>Policy::supply_at()</code> and <code>batch_delay()</code> functions in <code>blockchain/src/reward.rs</code>.</li>
<li>The attacker receives an unfairly large block reward due to the manipulated timestamp.</li>
<li>The total monetary supply of Nimiq is inflated beyond the intended emission schedule, devaluing existing holdings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of CVE-2026-40093 can lead to a significant inflation of the Nimiq cryptocurrency supply. While the precise number of affected users or specific financial losses is currently unknown, any validator capable of producing blocks could potentially exploit this vulnerability. If successful, this attack undermines the economic model of Nimiq, potentially causing a loss of confidence in the cryptocurrency and a devaluation of existing holdings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of <code>nimiq-blockchain</code> that includes a proper upper bound check on block timestamps to address CVE-2026-40093.</li>
<li>Implement monitoring for sudden and unexpected increases in block rewards, focusing on inconsistencies with the expected emission schedule. This would require detailed knowledge of the blockchain&rsquo;s reward algorithm.</li>
<li>Review and harden the block validation logic within the Nimiq-blockchain implementation to prevent similar timestamp manipulation attacks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>blockchain</category><category>timestamp-manipulation</category><category>inflation</category></item><item><title>BSV Ruby SDK Improper ARC Response Handling</title><link>https://feed.craftedsignal.io/briefs/2024-01-bsv-ruby-sdk-vuln/</link><pubDate>Thu, 09 Apr 2026 18:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-bsv-ruby-sdk-vuln/</guid><description>BSV Ruby SDK versions before 0.8.2 improperly handle ARC responses, treating certain failure statuses as successful broadcasts, potentially tricking applications into trusting unaccepted transactions; version 0.8.2 resolves this vulnerability.</description><content:encoded><![CDATA[<p>The BSV Ruby SDK, a tool for interacting with the BSV blockchain, contains a vulnerability in versions prior to 0.8.2. Specifically, the <code>BSV::Network::ARC</code> component&rsquo;s failure detection mechanism is flawed. It only recognizes <code>REJECTED</code> and <code>DOUBLE_SPEND_ATTEMPTED</code> ARC responses as failures. Responses with <code>txStatus</code> values like <code>INVALID</code>, <code>MALFORMED</code>, <code>MINED_IN_STALE_BLOCK</code>, or any <code>ORPHAN</code>-containing string in <code>extraInfo</code> or <code>txStatus</code> are incorrectly treated as successful broadcasts. This can lead applications that rely on successful broadcast confirmations to trust transactions that were never actually accepted by the BSV network. The vulnerability is identified as CVE-2026-40069 and is patched in version 0.8.2 of the SDK. This affects any application using the vulnerable SDK to interact with the BSV blockchain where transaction confirmation is critical for subsequent actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a transaction designed to fail under specific conditions on the BSV network (e.g., invalid format, conflicts with existing transactions).</li>
<li>The attacker uses an application built with a vulnerable BSV Ruby SDK (versions &lt; 0.8.2) to broadcast the malicious transaction.</li>
<li>The BSV network responds with an ARC response indicating a failure status, such as <code>INVALID</code>, <code>MALFORMED</code>, <code>MINED_IN_STALE_BLOCK</code>, or a status containing <code>ORPHAN</code>.</li>
<li>The vulnerable <code>BSV::Network::ARC</code> component in the SDK incorrectly interprets the failure response as a successful broadcast due to inadequate error handling.</li>
<li>The application, relying on the SDK&rsquo;s flawed confirmation, proceeds with actions dependent on the transaction&rsquo;s supposed success.</li>
<li>These actions could include updating local state, triggering further transactions, or providing access to resources based on the false confirmation.</li>
<li>The attacker benefits from the application&rsquo;s misinterpretation, potentially gaining unauthorized access or manipulating the application&rsquo;s state.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40069 allows attackers to deceive applications using vulnerable BSV Ruby SDK versions into believing that a transaction has been successfully broadcast to the BSV blockchain when it has not. This can lead to incorrect application state, unauthorized actions, or other security breaches depending on the application&rsquo;s logic. While the exact number of affected applications isn&rsquo;t specified, any application relying on transaction confirmation from the BSV Ruby SDK prior to version 0.8.2 is potentially vulnerable. This could impact financial applications, supply chain management systems, or any other application using the BSV blockchain for critical operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all instances of the BSV Ruby SDK to version 0.8.2 or later to remediate CVE-2026-40069.</li>
<li>Implement additional transaction verification mechanisms independent of the BSV Ruby SDK in applications where transaction confirmation is critical.</li>
<li>Deploy the Sigma rule &ldquo;Detect BSV Ruby SDK ARC Response Errors&rdquo; to identify potentially vulnerable applications based on network traffic patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>bsv</category><category>ruby</category><category>blockchain</category><category>vulnerability</category></item><item><title>Nimiq Block Skip Block Quorum Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-nimiq-block-quorum-bypass/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nimiq-block-quorum-bypass/</guid><description>A vulnerability exists in Nimiq Block's SkipBlockProof verification process, allowing attackers to bypass quorum checks by manipulating MultiSignature signers with out-of-range indices, potentially compromising blockchain integrity, and affecting rust/nimiq-block versions 0.2.0 and earlier.</description><content:encoded><![CDATA[<p>A critical vulnerability has been identified in the Nimiq Block&rsquo;s <code>SkipBlockProof::verify</code> function within the rust-albatross core. This vulnerability stems from the way the quorum check is performed. The vulnerability lies in the ability to craft <code>MultiSignature.signers</code> that contain out-of-range indices spaced by 65536, inflating the <code>len()</code> calculation but colliding onto the same in-range <code>u16</code> slot during aggregation due to truncation. The vulnerability affects <code>rust/nimiq-block</code> versions <code>&lt;= 0.2.0</code>. Successful exploitation allows a malicious validator with significantly fewer than the required <code>2f+1</code> signer slots to pass skip block proof verification. This bypasses the intended security mechanisms, potentially undermining the blockchain&rsquo;s consensus and integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Nimiq Block instance running a vulnerable version (&lt;= 0.2.0) of the <code>rust/nimiq-block</code> package.</li>
<li>The attacker crafts a malicious <code>MultiSignature.signers</code> payload.</li>
<li>The malicious payload contains out-of-range indices spaced by 65536. These indices are specifically designed to inflate the <code>BitSet.len()</code> calculation used in the quorum check.</li>
<li>During verification within <code>SkipBlockProof::verify</code>, the <code>usize</code> indices are cast to <code>u16</code> (<code>slot as u16</code>) for slot lookup.</li>
<li>Due to the <code>u16</code> truncation, the out-of-range indices collide onto the same in-range slot. This creates an artificial aggregation of signatures.</li>
<li>The attacker multiplies a single BLS signature by a factor to match the inflated <code>len()</code> value.</li>
<li>The manipulated <code>SkipBlockProof</code> passes the quorum check due to the inflated <code>len()</code> and signature aggregation.</li>
<li>The malicious skip block is accepted, potentially leading to consensus manipulation or other attacks on the blockchain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a malicious validator to bypass the standard quorum requirements for skip block proof verification. This means that a single compromised validator or a small group of colluding validators can inject fraudulent blocks into the blockchain, potentially leading to double-spending, denial-of-service, or other attacks that compromise the integrity and availability of the Nimiq blockchain. Given the severity of these potential outcomes, this vulnerability poses a critical risk to any system relying on affected versions of Nimiq Block.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>rust/nimiq-block</code> version <code>1.3.0</code> or later, which includes the fix for <a href="https://github.com/advisories/GHSA-6973-8887-87ff">CVE-2026-33471</a>.</li>
<li>Monitor network traffic for anomalies related to skip block submissions, focusing on unusually large <code>MultiSignature.signers</code> payloads with indices spaced by multiples of 65536. Create a network monitoring rule.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>blockchain</category><category>quorum bypass</category><category>nimiq</category><category>rust</category></item></channel></rss>