We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in SHMWW contains columns coming part from identity matrix random matrix. existence of two types leads to strong bias distribution set bits produced signatures. Our exploits such recover bunch collected provide theoreti...