What Are ‘Digital Signatures’ That Were Accessed by WazirX Hackers?

A mathematical tool for authentication, digital signatures carry several details related to any transaction.

Advertisement
Written by Radhika Parashar, Edited by Manas Mitul | Updated: 6 August 2024 19:29 IST
Highlights
  • Digital signatures are used to verify commands in Web3 protocol
  • They provide proof of authenticity
  • Deploying digital signatures could be an expensive process
What Are ‘Digital Signatures’ That Were Accessed by WazirX Hackers?

A recent WazirX blog claimed that digital signatures enhance the authentication of transactions

Photo Credit: Pixabay/ Mohamed_Hassan

The WazirX hacker, who stole over $230 million (roughly Rs. 1,900 crore) from a multi-signature wallet, managed to access the digital signatures required to process the transaction to facilitate the hack attack. But what are these digital signatures? Unlike the text scribble we generally identify a signature to be, digital signatures are virtual signing algorithms. Like human signatures, these digital signatures prove the authenticity of any command linked to a crypto transaction.

How do Digital Signatures Work?

A mathematical tool for authentication, digital signatures carry multiple details related to any transaction. These details include proof of origin, time of initiation, and the status of any digital document.

Based on asymmetric cryptography, a digital signature is created to verify information or a command. A pair of private and public keys need to be created to make for a digital signature. While the private key is used to create the signature, the public key is utilised to verify the signature.

Overall, digital signatures are dependent on the Public Key Infrastructure (PKI). In order to generate mathematically linked private key and public key, public key algorithms such as Rivest-Shamir-Adleman can be used. Like all human signatures are unique, these software also generate unique digital signatures different from all others generated so far.

Advertisement

Back in March this year, WazirX had published a blog detailing how crucial these digital signatures are in the blockchain sector. As per the Indian exchange, digital signatures enhance the security and authentication of transactions. The exchange also said digital signing provides precise timestamping, eliminates the need for a centralised authority, and makes the verification process more time efficient.

“If the signature is completely valid, it confirms that the user initiating the transaction is the rightful owner of the data,” the blog said. “The widespread adoption of blockchain, alongside the ongoing use of digital signatures, is shaping a future where decentralisation, security, and transparency redefine online transaction dynamics.”

Advertisement

Shortcomings of Implementing Digital Signatures

Deploying digital signatures on smart contracts or for transaction verifications could make for an expensive process given that both the senders and receivers linked to the transaction will have to purchase digital certificates and verification software.

While digital signatures can be seen as a more secure option to implement 2-FA for crypto transactions, they are clearly not a foolproof security measure in the crypto arena.

Advertisement

In WazirX's case, the hacker exploited a multi-sig wallet of WazirX kept under Liminal Custody's oversight. The hacker, highly suspected to be from North Korea's notorious Lazarus Group, managed to get the access to the signatures needed by both the parties to approve the transaction and facilitated the attack.

Affiliate links may be automatically generated - see our ethics statement for details.
 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo V60: Everything We Know Ahead of Launch in India
  2. ChatGPT Users Are Not Impressed With GPT-5 as OpenAI Retires Older Models
  1. Samsung Galaxy S26 Ultra to Reportedly Offer Faster Performance With Upgraded RAM
  2. ChatGPT Users Find GPT-5 to Be Worse Than Older GPT-4o, Sam Altman Promises Fix
  3. James Webb Telescope Detects Potential Gas Giant Exoplanet Just 4 Light-Years Away
  4. Earliest Known Black Hole Found Just 500 Million Years After the Big Bang
  5. Yaadhum Ariyaan Now Streaming on Aha Tamil: Everything You Need to Know About This Thriller Movie
  6. Platonic Season 2 Now Streaming on AppleTV+: Know Everything about Cast, Crew, Plot and more
  7. Apple Intelligence’s ChatGPT Integration to Reportedly Get Support for GPT-5 Soon
  8. Xbox Halts Development on Co-Op Game From Just Cause Studio, Kojima's OD Reportedly Still in the Works
  9. Global Tablet Shipments Surge 13.1 Percent YoY in Q2, Apple Maintains Lead: IDC
  10. Apple Must Allow Alternative Browser Engines on iOS by December Under Japan's New Mobile Software Competition Act
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.