Replay Attack: A Stealthy Attack That Causes Losses
icon search
icon search

Top Performers

Replay Attack: A Stealthy Attack That Causes Losses

Home / Articles and Tutorials / judul_artikel

Replay Attack: A Stealthy Attack That Causes Losses

Replay Attack 1

Table of Contents

Imagine you just sent a crypto transaction from your personal wallet. However, without realizing it, the transaction actually happened twice.

It’s not because the system is faulty, but it could be the result of a Replay Attack—an old type of cyberattack that still haunts the blockchain and Web3 ecosystems to this day.

In this article, we’ll take a deep dive into how replay attacks work, their harmful impacts on crypto systems, and the preventive measures you can take to keep your digital assets safe.

For those of you involved in the world of DeFi, using smart contracts, or regularly transacting via crypto wallets, understanding this threat is crucial.


What is a Replay Attack?

Replay Attack 3

A replay attack is a technique where hackers intercept and record legitimate data, then illegally retransmit it to trick the system into thinking it is still valid. This attack is often used to duplicate transactions or gain unauthorized access.

Unlike phishing, which tricks users, or session hijacking, which seizes an active session, a replay attack simply repeats a message without having to expose its contents. Therefore, this attack can be carried out without high technical skills.

In the world of blockchain and Web3, replay attacks are still known to be dangerous. For example, valid transactions on one network can be copied to another compatible network, if there is no security system such as a nonce or timestamp.

Therefore, understanding replay attacks is important for wallet, DeFi, and smart contract users.

Interesting Articles For You: Clipboard Hijacking: Ancaman Tersembunyi terhadap Dompet Kripto & Cara Melindunginya!

 

How Replay Attacks Work

To understand how dangerous a replay attack is, it is important to look at how it works technically. Although it looks simple, this attack is very effective if the system does not have basic protection.

Here is an explanation of how a replay attack works, its common targets, and a comparison with blockchain-based systems.

1. Simple Work Scheme

Intercept? Save Data? Resend

1.Intercept

The attacker intercepts data that is being transmitted over the network, such as transaction requests, login credentials, or authentication tokens. This can be done through sniffing techniques or malware.

1.Save Data

After successfully capturing the data, the attacker stores it intact without having to understand its contents.

1.Resend

The stored data is then replayed to the target system. Because the data is technically valid, the system can be fooled into treating the request as a new request.

2. Common Targets of Replay Attacks

This attack is usually effective against systems that do not have the following security mechanisms:

  • Timestamp: to distinguish whether the data is still valid or has expired.
  • Nonce (Number used once): a unique random number that can only be used once.
  • Unique Digital Signature: cryptographic validation to ensure the integrity and authenticity of data.

3. Comparison: Classic Digital System vs Blockchain

Stages of Classic Digital System Blockchain System
Data Interception Easily intercepted via unencrypted networks Can occur if private key is leaked
Data Protection There is not always a timestamp or nonce Every transaction uses a nonce and signature
Relies on tokens and session IDs Relies on smart contracts & consensus
Common VulneSystem Validation rabilities Login tokens, transfer forms, public APIs Inter-chain transactions or legacy protocols

 

Stages Classic Digital System Blockchain System
Data Interception Easily intercepted via unencrypted networks Can occur if private key is leaked
Data Protection There is not always a timestamp or nonce Every transaction uses a nonce and signature
System Validation Relies on token and session ID Relies on smart contract & consensus
Common Vulnerabilities Login token, transfer form, public API Inter-chain transactions or legacy protocols

 

 

 

4. Text Scheme: Replay Attack Illustration

Sender —-(Transmission Data)—-> Receiver

      \                             ?

       \—-> [Attacker] —-> Save —-> Resend

 

 

Brief explanation:

The attacker intercepts legitimate data from the sender, stores it, and then resends the same data to the recipient. If the recipient does not have an additional verification system, the attack can be successful without having to modify the data at all.

Another interesting article for you: What is a Sybil Attack? Security Threats in Blockchain

The Dangers of Replay Attacks in the Crypto World

Although blockchain technology is designed to be secure and transparent, it does not mean that this system is immune to replay attacks.

If basic security is not implemented comprehensively, replay attacks can cause major losses, both financially and in terms of reputation. Here are some of the main risks posed by replay attacks in the crypto world:

1. Transaction Duplication on the Blockchain

In systems such as Bitcoin or Ethereum, a replay attack can occur if an attacker re-sends a previously legitimate transaction to another network.

This allows for a double-send scenario, where the same transaction is executed twice without the user’s knowledge.

Example: After making a transaction on the Ethereum mainnet, the transaction can be “replayed” on the testnet or fork chain if the system does not use a distinguisher such as a chain ID.

2. Exploiting Weak Smart Contracts

Smart contracts that do not use nonces, timestamps, or special validation mechanisms are at high risk. Attackers can replay legitimate inputs to trigger contract actions such as withdrawals or state changes, without having to compromise the code.

3. Risks in Web3 Wallets and DApps

Some wallets and decentralized applications (DApps) that do not implement EIP-155 (Ethereum Improvement Proposal) are more vulnerable to cross-chain replay attacks.
Without this protection, legitimate transactions can be inadvertently applied to other chains, especially during hard forks.

4. Potential Financial Losses and Loss of Trust

Basically, the domino effect of a replay attack can be very serious, including the following:

User funds change hands without authorization
Platforms lose credibility due to perceived negligence
DApps or protocols lose users due to a loss of sense of security

Still on this topic, also see: DNS HijacDNS Hijacking: A Cunning Attack That Makes Crypto Collapse! & How to Prevent It

 

Replay Attack vs. Other Cyber ??Attacks

Replay attacks are often considered more cunning than other types of cyber attacks because the perpetrators do not falsify or hack data, but rather use legitimate data that is recorded and replayed to trick the system.

To understand its uniqueness, here is a comparison with several other popular types of cyber attacks, namely:

1. Replay Attack vs. Man-in-the-Middle (MitM)

Replay attacks only replay legitimate communications, while MitM actively intercepts and modifies communications between two parties in real-time.

In MitM, the perpetrator can change the contents of the message, while replay attacks do not require changes, but only repetition.

2. Replay Attack vs. DNS Hijacking

DNS hijacking directs victims to fake sites by manipulating the domain system (DNS), usually to steal login data or carry out phishing.

Replay attacks do not change the communication path, but instead utilize valid data that has passed through previously.

3. Replay Attack vs. Credential Stuffing

Credential stuffing uses a combination of stolen usernames and passwords from one service to attempt to log in to another service.

Replay attacks do not rely on stolen credentials, but on repeating legitimate data, such as authentication tokens or previous transactions.

Essentially, replay attacks stand out because they don’t look suspicious on the surface—the system may treat the resent transaction or data as a new, legitimate request.

That’s what makes replay attacks dangerous, especially on systems without layers of protection like timestamps, nonces, or unique signatures.

 

Examples of Replay Attacks in the Blockchain World

A replay attack is a type of attack in the blockchain world where an attacker replays previously signed transactions to gain illegitimate benefits.

Here are some examples of significant replay attacks in the blockchain ecosystem, especially related to smart contracts, Web3 login systems, and incidents reported by security audit firms such as CertiK, Halborn, and SlowMist.

1. Smart Contract Attacks in the Early Ethereum Ecosystem

1.Ethereum Classic Hard Fork (2016)

After hard fork Ethereum fork in July 2016 to address The DAO issue, two separate networks emerged, Ethereum (ETH) and Ethereum Classic (ETC).

Since both share the same transaction structure, valid transactions on one network are also valid on the other. This allows attackers to replay transactions from ETH to ETC and vice versa.

Some exchanges such as Yunbi and BTC-e reported losses due to this attack, where users who withdrew ETH from the platform also received the same amount of ETC, allowing for double exploits.

1.0x Protocol and ENS (2020)

The 0x Protocol and the Ethereum Name Service (ENS) are both vulnerable to replay attacks.

ENS, for example, allows users to register domain names without a nonce or timestamp, allowing for the replay of previously committed commitments.

Meanwhile, 0x Protocol faces a similar issue in signature verification for off-chain orders.

In this case, an attacker can replay signatures to execute the same trade multiple times without user consent.

2. Threats to Web3 Login Systems Using Signature Reuse

1.Optimism and Wintermute (2022) In June 2022, Wintermute, a liquidity provider on Optimism, lost 20,000,000 OP tokens to a replay attack.

The attack occurred because Wintermute’s multisignature wallet on Ethereum did not comply with the EIP-155 standard, which includes the chain ID in transaction signatures.

As a result, an attacker could replay transactions from Ethereum to the Optimism network, gain control of the multisignature wallet, and steal the OP tokens.

3. Security Incidents from CertiK, Halborn, and SlowMist

1.SlowMist: Smart Contract Replay Attacks Explained

SlowMist, a blockchain security audit firm, has identified and explained several types of replay attacks in smart contracts.

They highlight the importance of using nonces, timestamps, and chain IDs in transactions to prevent replay attacks.

SlowMist also provides real-world examples of these attacks, such as those on Optimism and Wintermute, and explains the technical mechanics behind them.

1.CertiK and Halborn

While there are no specific reports from CertiK and Halborn on replay attacks in the available search results, both firms are known for their in-depth security audits of smart contracts and DeFi protocols.

Both firms routinely identify and report vulnerabilities in smart contracts, including potential replay attack risks, although no specific examples were found in the available search results.

 

How to Detect Replay Attack

Replay Attack 2

A replay attack is a type of attack in which an attacker takes a legitimate transaction or digital signature and replays it at another time or place to gain unauthorized access or gain advantage.

This attack can occur on blockchain networks, smart contracts, or Web3 login systems that use signature-based authentication mechanisms. Detecting replay attacks early is critical to keeping user assets and data safe.

1. Signs of Replay Attack

1.Technical Signs

  • A duplicate transaction with identical data or hash, even though only one transaction was made by the user
  • Reuse of a nonce by the same wallet address, even though the nonce should be unique for each transaction
  • An API command executed multiple times without re-input from the user
  • The same signature appears on different requests
  • Identical transaction hash or payload structure occurs more than once at odd times

1.Non-Technical Signs

  • A user claims to have never sent a second transaction, but the system records a duplicate transaction
  • A login to a Web3 application occurs without any explicit activity from the user
  • A token or digital asset balance decreases even though the user only made one transaction

2. Tools and Techniques to Detect Replay Attack

1.Log Analysis

Performing analysis on system logs and blockchain transactions can help detect duplication patterns.

Use tools like ELK Stack (Elasticsearch, Logstash, Kibana) or Splunk to visualize strange patterns in transaction logs, signatures, or API commands.

1.Nonce Tracker

Nonce is used to ensure the uniqueness of each transaction. By tracking the nonce per address, you can detect if there is a reuse of the nonce or an anomaly in the sequence.

This can be done through node monitoring or with tools such as Tenderly or the Web3 library.

1.Duplicate Hash and Signature Detector

A replay attack can occur if a transaction hash or signature is reused. Detection is done by scanning for duplicate signatures or hash values ??that appear on the blockchain network.

In this regard, you can use a simple script (for example in Python) to monitor this.

1.Signature Tracking Database

Creating a database to store all signatures that have ever been used, including metadata such as time, network, and destination, allows you to verify whether a new signature has been used before.

Basically, it is effective for Web3 login systems.

3. The Importance of Timestamp and Signature Validation

1.Timestamp Validation

By adding a timestamp to a signed message, the system can verify whether the signature is still within its validity period.

Typically, the system only accepts signatures created within a few minutes of the current time.

1.Signature Context

The signature must contain binding information, such as the transaction purpose and the chain ID. This is important so that the signature cannot be reused for a different purpose or on another chain.

4. Best Practices for Detection and Prevention

Practices Functional
Nonce Implementation Prevents unauthorized parties from reusing transactions
Timestamp Validation Limits the validity of the signature so that it cannot be replayed
Signature Context Binding Ensures that the signature is only valid for one function or transaction
Log Analysis and Monitoring Enables rapid detection of suspicious attack patterns
Chain ID Verification Distinguishes transactions between chains and prevents replay between chains

 

You might also like: The Important Role of Nonce in Blockchain Security

 

How to Prevent Replay Attacks (Proactive Steps)

Replay attacks are a serious threat to blockchain systems and Web3 applications. In this attack, a valid transaction or signature is replayed by a third party to gain access or funds illegally.

While detection is essential, proactive prevention measures are much more effective in securing the system from potential attacks in the first place. Here are some preventive measures, including:

1. Use Nonce and Timestamp

1.Nonce

Nonce (number used once) is a unique number used to ensure that each transaction can only be processed once. The use of nonce prevents old or duplicate transactions from being reprocessed.

1.Timestamp

A timestamp in a data structure or payload ensures that a signature is only valid for a certain period of time. This helps prevent reuse of expired signatures. Here is an example of its use:

  • In a Web3 login system, add a timestamp field to the message signed by the user
  • In a smart contract, validate that the block.timestamp is within a specified time limit

2. Implement One-Time Signature and EIP-155

1.One-Time Signature

Ensure that each signature is used only once and cannot be reused for other requests. Store the hash of the used signature and reject it if it is reused.

1.EIP-155 (Ethereum Improvement Proposal 155)

EIP-155 adds a chain ID to the signature structure so that transaction signatures are only valid on a specific network. This prevents replay attacks between networks (e.g. between Ethereum and a testnet or another chain).

3. Implement Secure Protocols

Use additional layers of security on the communication between the user and the backend.

TLS + Token per Session

  • Use HTTPS/TLS to encrypt traffic
  • Add a session token or CSRF token to each login request or transaction
  • Limit session duration and ensure tokens are only valid for a single request

4. Regularly Audit Smart Contracts

Perform security audits to find potential replay attack vulnerabilities, especially in contracts that handle signatures, off-chain transactions, or interchain bridging.

Here are some recommended tools for auditing:

 

Tools Use
Slither Static analysis to find vulnerabilities in Solidity code
Certora Formal verification tools to verify smart contract logic
Chainalysis Real-time monitoring of blockchain activity to detect threats

Also, working with an audit firm such as CertiK, SlowMist, or Halborn is highly recommended.

Below is a summary table of proactive steps to prevent replay attacks:

Step Goal
Use nonce and timestamp Ensure the uniqueness and validity of each transaction/signature
Implement EIP-155 and one-time signature Prevent reuse of signatures on chain or other contexts
Use HTTPS/TLS and session tokens Protect communication between clients and servers
Regularly audit smart contract code Detect technical vulnerabilities before they are exploited
Use tools like Slither, Certora, and others Help automate the detection and verification process

 

What to Do if You Become a Victim?

If you become a victim of a replay attack, it is important to immediately take recovery steps to prevent greater losses. The following actions should be taken quickly and in a structured manner, including:

1. Stop Compromised Wallet or Smart Contract Activity

Immediately stop all activities related to the wallet or smart contract that is suspected of being compromised.

If the smart contract has an emergency pause or circuit breaker feature, activate it to prevent further interaction that could worsen the loss.

2. Reset Session Token or Change Private Key (if Necessary)

If the attack occurred due to misuse of signatures in the authentication process (such as Web3 login), reset the session token and authorization system.

If the wallet private key is suspected of being exposed, migrate assets immediately to a new wallet with a secure key.

3. Audit Transaction History and Validate Last Nonce

Perform a thorough search of the transaction history in a blockchain explorer (such as Etherscan, Arbiscan, etc.).

Check if there are any transactions using the same nonce or replicated signature. Validate the last valid nonce to ensure there are no anomalies.

4. Report to the Relevant Wallet Service Provider or Exchange

Contact the wallet service provider (such as MetaMask, Trust Wallet, Ledger) or the exchange where the asset is stored to report the incident.

Some platforms provide security support or can help limit suspicious activity.

5. Check for Potential Asset Duplication and Advanced Security Risks

Check if the same signature or transaction is used on another network (example: from Ethereum to Optimism).

Evaluate the backend system and smart contract to ensure there are no other replay loopholes. If necessary, conduct an internal audit to assess the full impact of the attack.

Conclusion

That’s interesting information about Replay Attacks that you can explore more deeply in the Crypto Academy article on INDODAX. In addition to expanding your investment insights, you can also stay updated with the latest crypto news and monitor the price movements of digital assets directly on the INDODAX Market. don’t forget to activate notifications so you always get the latest information about digital assets and blockchain technology only at INDODAX Academy.

You can also follow our latest news via Google News or faster and more reliable access to information. For an easy and safe trading experience, download the best crypto application from INDODAX on the App Store or Google Play Store.

Also maximize your crypto assets with the INDODAX Earn feature, a practical way to earn passive income from the assets you store.


Follow IG Indodax

 

Also follow our social media here: Instagram, X, Youtube & Telegram

In conclusion, replay attacks are not just old, forgotten threats. In the increasingly open crypto era, these attacks are actually rife again because they exploit simple loopholes such as the lack of revalidation in the system.

Signature reuse, transactions without nonce, and weak context restrictions are entry points that are often overlooked.

Therefore, it is important for every actor in the blockchain ecosystem—both developers, users, and service providers—to understand how replay attacks work, their potential risks, and to implement preventive measures consistently.

Therefore, don’t wait until the system is infiltrated. Basically, acting early means avoiding big losses later.

 

FAQ

1.What is a Replay Attack?
A replay attack is a cyberattack where legitimate data is resent by an attacker to trick the system into thinking it is valid.

2.Can a replay attack happen on a blockchain?
Yes. If there is no nonce or unique transaction validation, the blockchain system is vulnerable to replay.

3.Is a replay attack the same as a man-in-the-middle?
No. A replay only repeats legitimate data, while a man-in-the-middle manipulates or inserts new data.

4.How to detect it in crypto?
Look for duplicate transactions, re-executed commands, and identical transaction hashes.

5.What is the best way to prevent a replay attack?
Use a nonce system, validate signatures, and ensure smart contracts are audited and follow the latest security standards such as EIP-155.

DISCLAIMER: All forms of crypto asset transactions have risks and the potential for loss. Keep investing according to independent research so that you can minimize the level of loss of crypto assets traded (Do Your Own Research/ DYOR). The information contained in this publication is provided generally without obligation and is for informational purposes only. This publication is not intended to be, and should not be considered as, an offer, recommendation, invitation or advice to buy or sell any investment product and should not be sent, disclosed, copied or relied upon by anyone for any purpose.

Author: BOY

More From Tutorial

New Coin on the Block

Basic Lesson

Calculate Staking Rewards with INDODAX earn

Select an option
dot Polkadot 10.78%
bnb BNB 0.3%
sol Solana 5.27%
eth Ethereum 1.84%
ada Cardano 1.53%
pol Polygon Ecosystem Token 1.94%
trx Tron 2.39%
DOT
0
Based on current & APY price
Stake Now

Market

Name Price 24H Chg
ACS/IDR
Access Pro
30
67.3%
VIDYX/IDR
VidyX
3
50%
POLS/IDR
Polkastart
4.099
35.41%
ONT/IDR
Ontology
3.160
26.45%
EVER/IDR
Everscale
169
16.55%
Name Price 24H Chg
KOK/IDR
Kok
2
-33.33%
NEON/IDR
Neon EVM
2.414
-28.73%
DCT/IDR
Degree Cry
98.895
-24.51%
BIO/IDR
Bio Protoc
3.297
-20.52%
TROLLSOL/IDR
TROLL (SOL
3.250
-19.15%
Was this article helpful?

Rate this article

You already voted!
Related Articles

Find more articles based on your favourite topics.

INDODAX Market Signal 25 Agustus 2025
25/08/2025
INDODAX Market Signal 25 Agustus 2025

This week, the bullish crypto lineup is led by Ethereum(ETH) in

25/08/2025
Long Squeeze Strategy: Your Portfolio Can Be Destroyed in an Instant!
25/08/2025
Long Squeeze Strategy: Your Portfolio Can Be Destroyed in an Instant!

Imagine a cryptocurrency price that was initially stable suddenly plummeting

25/08/2025
Krea AI: Making Crypto Analysis More Visual & Engaging

To date, many traders and investors still focus solely on