Bitcoin advocate cracks known 12-word seed phrase in minutes

A systems architect cracked a seed phrase and won a 100,000 Satoshi bounty, or 0.001 Bitcoin (BTC), worth $29, in just under half an hour. Cointelegraph spoke to Andrew Fraser in Boston, who underscored how critical it is to keep a Bitcoin wallet seed phrase secure and offline.ย 

A seed phrase or recovery phrase is a string of random words generated when a wallet is created that can access the wallet, similar to a master key. Fraser brute forced a 12-word seed phrase that Bitcoin educator โ€œWicked Bitcoinโ€ shared on Twitter:

As shown, Wickedโ€™s Tweet challenged users to decipher the correct order of the 12-word seed phrase.

“Anyone wants to try and brute force this 12-word seed phrase securing 100,000 sats? Iโ€™ll give you all 12 words but in no particular order. Standard derivation path m/84’/0’/0’โ€ฆno fancy tricks. GL.โ€

It took just 25 minutes to unlock the 100,000 Satoshisโ€“or just under $30. The incident serves as a timely reminder for Bitcoin users and crypto enthusiasts to take crypto security seriously.

Fraser cracked the code using BTCrecover, a software application available on GitHub. The software offers a range of tools that can determine seed phrases with missing or scrambled mnemonics and passphrase-cracking utilities. Over Twitter DMs, Fraser told Cointelegraph:

“My gaming GPU was able to determine the correct order of the seed phrase in about 25 minutes. Though a more capable system would do it much faster.โ€

He noted that anyone with a basic knowledge of running Python scripts, using the Windows command shell, and understanding the Bitcoin protocolโ€“particularly BIP39 mnemonicsโ€“ should be able to replicate his success.

Cointelegraph queried Fraser about the security of 12-word seed keys. Fraser explained they are “perfectly secure if the words remain unknown to an attacker or there is a passphrase ’13th seed word’ used in the derivation path of the wallet.”

Moreover, he emphasized the superior security of 24-word seed keys.

“Even if an attacker knew the out of order words of your 24-word seed key, they would never stand a hope of discovering the correct seed.โ€

Fraser broke down the entropy calculations to explain the difference in security between the two types of seed keys. A 12-word seed has approximately 128 bits of entropy, while a 24-word seed boasts 256 bits. When an attacker knows the unordered words of a 12-word seed, there are only around half a billion possible combinations, which is relatively easy to test with a decent GPU. A 24-word seed, however, has roughly 6.24^24 possible combinationsโ€“and that’s a lot of zeros.ย 

Related:ย The worst places to keep your crypto wallet seed phrase

Even the probability of an attacker cracking a 12-word seed phrase is borderline absurd. 24-word seed phrases may be superior, but as Wicked points out in a post-mortem to the seed phrase challenge; โ€œitโ€™s not going to be hacked tbh.โ€

Ultimately, itโ€™s a timely reminder to readers to ensure seed phrases are never published or shared online. That means a seed phrase should not be stored in a password manager, a cloud storage solution, and they certainly should not be typed out into a phone.ย 

Fraser also stressed the importance of keeping seed keys secret and to take advantage of a passphrase that functions as part of the derivation path. As for the 100,000 Sats Fraser took home? Fraser tweeted that he spent them on dinner that night: Chicken Marsala. Talk about circular economy.ย 

Cointelegraph Magazine:ย Bitcoin in Senegal: Why is this African country using BTC?