'Malleability' attacks not to blame for Mt. Gox's missing bitcoins, study says
Fewer than 400 bitcoins could have been stolen from the Mt. Gox Bitcoin exchange using so-called transaction malleability attacks, according to a Swiss study—far less than the hundreds of thousands of bitcoins the company reported.
The findings cast doubt on the failed exchange’s explanation of how it lost nearly half a billion dollars’ worth of the digital currency when it applied for bankruptcy protection in Tokyo on Feb. 28.
The study was written by Christian Decker and Roger Wattenhofer of the Distributed Computing Group at the Swiss Federal Institute of Technology Zurich (ETH). It was uploaded to the academic prepress site ArXiv.org and has not been published by a peer-reviewed journal.
“In February 2014 MtGox, once the largest Bitcoin exchange, closed and filed for bankruptcy claiming that attackers used malleability attacks to drain its accounts,” the authors, who have authored several papers on Bitcoin and distributed systems, write.
“In this work we use traces of the Bitcoin network for over a year preceding the filing to show that, while the problem is real, there was no widespread use of malleability attacks before the closure of MtGox.”
The study looks into the plausibility of the claim that transaction malleability brought down Mt. Gox. The Tokyo-based exchange had said that a bug in the Bitcoin software could be used to fraudulently alter the records of how bitcoins change hands.
When Mt. Gox collapsed with liabilities of ¥6.5 billion ($63.6 million), it said that it had lost about 850,000 bitcoins, which would have been worth some $474 million. It cited exploitation of a bug in the Bitcoin system, saying it believed “that there is a high probability that these bitcoins were stolen as a result of an abuse of this bug.”
Before trading stopped at the exchange on Feb. 25, Mt. Gox had blamed the transaction malleability issue when it suspended withdrawals of bitcoin to outside addresses.
In their study, the ETH researchers describe how they created specialized nodes that could trace, from January 2013, all transactions on the Bitcoin network including double-spending attacks, of which malleability attacks are described as a variant.
They found that only 302,700 bitcoins were involved in malleability attacks.
“Of these, only 1,811 bitcoins were in attacks before MtGox stopped users from withdrawing bitcoins,” they wrote. “Even more, 78.64 percent of these attacks were ineffective. As such, barely 386 bitcoins could have been stolen using malleability attacks from MtGox or from other businesses. Even if all of these attacks were targeted against MtGox, MtGox needs to explain the whereabouts of 849,600 bitcoins.”
Mt. Gox CEO Mark Karpeles did not respond to an email seeking comment on the study.
In an email, Wattenhoffer said the study has not been submitted to a peer-reviewed journal, adding “We will do this eventually, but reviewing takes time, and in this case we felt that some people might be eager to hear the news before the usual several-months peer-review cycle is over.”
While observers on the Bitcointalk.org forum welcomed the study, they also cautioned that it only went back as far as January 2013.
“It’s possible Gox was hit much harder in previous years,” one commentator wrote. “Although that would also mean the amount of time they spent oblivious to the problem increases.”
Software developer Mike Hearn, who works on bitcoin-related projects, welcomed the study’s findings. “People were raising the alarm about this claim almost as soon as it was made by Mt Gox. Although in theory their explanation could have worked (if we assume really bad decisions on their part like not investigating failed withdrawals and just repeating them), the vast sums of money being talked about stretched credulity. And nobody else had reported observing lots of mutated transactions. Now we have data to prove this was correct,” he said via email.