Back to KB
Difficulty
Intermediate
Read Time
6 min

Claude just recovered $400K from a forgotten Bitcoin wallet. That's a security warning, not a magic trick.

By Codcompass Team··6 min read

Context-Aware Dictionary Attacks: Why Your Digital Footprint is Now a Cryptographic Liability

Current Situation Analysis

The foundational assumption of password-based encryption has historically been that the search space for a human-generated password is large enough to render brute-force attacks computationally infeasible. This model relies on the separation between human cognition and machine speed: humans create passwords that are hard to guess, and machines are too slow to try every combination.

This separation is collapsing. The recent recovery of a dormant 2014 Bitcoin wallet containing approximately $400,000 demonstrates a paradigm shift in attack vectors. The wallet was not compromised by breaking elliptic-curve cryptography or SHA-256. Instead, an LLM generated a context-aware dictionary attack script. By ingesting biographical data, notes, and hints associated with the owner, the model produced a targeted candidate list of a few million variations. A GPU cluster then exhausted this reduced search space in hours.

This incident highlights a critical vulnerability that is often overlooked in threat modeling: Semantic Entropy. Traditional entropy measures randomness. Semantic entropy measures how predictable a password is given the owner's context. As LLMs improve at correlating public and private data points, the semantic entropy of human-chosen keys approaches zero. Attackers no longer need to search the entire keyspace; they only need to search the distribution of choices a specific human is likely to make.

The risk extends beyond cryptocurrency. Any long-lived encrypted asset—backups, password vaults, archived customer data, or local keystores—protected by a password derived from personal context is now vulnerable. The cost of executing these attacks is dropping, and the capability to correlate OSINT (Open Source Intelligence) with brute-force infrastructure is becoming accessible to non-state actors.

WOW Moment: Key Findings

The following comparison illustrates the efficiency gap between traditional brute-force methods and LLM-contextual attacks. The data underscores why the "strong password" definition must evolve from "unpredictable to humans" to "unreconstructible by models with access to your footprint."

Attack VectorEffective Search SpaceSuccess Probability (Contextual)Time to CompromiseCompute Cost
Random Brute Force$2^{128}$+Near ZeroMillenniaProhibitive
Public Dictionary$10^8$ entriesLow (<1%)Hours/DaysLow
LLM-Contextual Targeted$10^6$ – $10^7$ candidatesHigh (>80%)Minutes/HoursModerate

Why this matters: The LLM-contextual approach reduces the search space by orders of magnitude while maintaining a high success rate. It transforms an impossible cryptographic problem into a manageable computational task. This enables attackers to target assets tha

🎉 Mid-Year Sale — Unlock Full Article

Base plan from just $4.99/mo or $49/yr

Sign in to read the full article and unlock all 635+ tutorials.

Sign In / Register — Start Free Trial

7-day free trial · Cancel anytime · 30-day money-back