• Latest
Security Researchers Break Ledger Wallets With Simple Antennae

Security Researchers Break Ledger Wallets With Simple Antennae

Dezember 28, 2018
6 Questions for Rene Reinsberg of Celo – Cointelegraph Magazine

6 Questions for Rene Reinsberg of Celo – Cointelegraph Magazine

März 31, 2023
Judge denies SEC motion to keep Hinman docs secret in Ripple case

Judge denies SEC motion to keep Hinman docs secret in Ripple case

März 31, 2023
The ultimate guide to Miami – Cointelegraph Magazine

The ultimate guide to Miami – Cointelegraph Magazine

März 31, 2023
Dr. Jane Thomason – Cointelegraph Magazine

Dr. Jane Thomason – Cointelegraph Magazine

März 31, 2023
1658007797 celsius is bankrupt with 12b balance sheet hole su zhu.jpg

Celsius is bankrupt with $1.2B balance sheet hole, Su Zhu returns to Twitter and OpenSea purges 20% of employees: Hodler’s Digest, July 10-16

März 31, 2023
6 Questions for Lisa Fridman of Quadrata – Cointelegraph Magazine

6 Questions for Lisa Fridman of Quadrata – Cointelegraph Magazine

März 31, 2023
Jed McCaleb empties XRP wallet after eight-year selloff

Jed McCaleb empties XRP wallet after eight-year selloff

März 31, 2023
Celsius has finally filed for bankruptcy: Law Decoded, July 18-25

Celsius has finally filed for bankruptcy: Law Decoded, July 18-25

März 31, 2023
The ‘godfather of crypto’ risked lifetime in jail, laying foundation for Bitcoin – Cointelegraph Magazine

The ‘godfather of crypto’ risked lifetime in jail, laying foundation for Bitcoin – Cointelegraph Magazine

März 31, 2023
SEC objects to XRP holders aiding Ripple defense

SEC objects to XRP holders aiding Ripple defense

März 31, 2023
Blockchain technology is transforming the real estate market – Cointelegraph Magazine

Blockchain technology is transforming the real estate market – Cointelegraph Magazine

März 31, 2023
1658612147 nfts banned in minecraft sec lists 9 tokens as securities.jpg

NFTs banned in Minecraft, SEC lists 9 tokens as securities and 3AC founder blames cockyness for company meltdown: Hodler’s Digest, July 17-23

März 31, 2023
  • Home
  • Coin Market Cap
  • Bitcoin
  • Ethereum
  • Ripple
  • Litecoin
  • Alt Coin
  • Business
  • Trading
  • Mining
CoinNewsDaily
  • Home
  • Coin Market Cap
  • Bitcoin
  • Ethereum
  • Ripple
  • Litecoin
  • Alt Coin
  • Business
  • Trading
  • Mining
No Result
View All Result
  • Home
  • Coin Market Cap
  • Bitcoin
  • Ethereum
  • Ripple
  • Litecoin
  • Alt Coin
  • Business
  • Trading
  • Mining
No Result
View All Result
CoinNewsDaily
No Result
View All Result
Home Business

Security Researchers Break Ledger Wallets With Simple Antennae

coinnewsdaily by coinnewsdaily
Dezember 28, 2018
in Business
0
Security Researchers Break Ledger Wallets With Simple Antennae
190
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Radio antennae are the original networking technology, and researchers presenting in Berlin Thursday showed how useful they are as hacking tools.

The hardware researchers set out to find different kinds of vulnerabilities in the most popular hardware wallets used by cryptocurrency holders, from Trezor and Leger. At the Chaos Computer Club Conference in Germany, Dmitry Nedospasov said that he and his collaborators set out to find three different kinds of vulnerabilities and said they succeeded in finding all three.

Related articles

IoTeX’s MachineFi Lab challenges Big Tech by democratizing IoT to benefit users and businesses

IoTeX’s MachineFi Lab challenges Big Tech by democratizing IoT to benefit users and businesses

Juli 26, 2022
ygg sea surpasses 10,000 scholarships in just six months of launch

YGG SEA Surpasses 10,000 Scholarships in Just Six Months of Launch

Mai 6, 2022

They presented vulnerabilities the supply chain (where the attacker gets access to the device before the consumer owns it), side channel attacks (where observations are made on the hardware itself rather than the code running the hardware) and glitch attacks (where attackers attempt to disrupt data transmission within a device).

The three collaborators were located in Russia, Germany and the U.S., so they conducted their investigations primarily over Telegram group chat. It took them 50,000 messages and 1,100 images to get all three attacks done.

“It’s a really long time we spent looking at this,” Nedospasov said during their introduction.

Simple antennae played a critical role in the two most dramatic attacks, but, for its part, Ledger does not find these demonstrations alarming.

“Anyone following these attacks needs to understand that both scenarios as portrayed are not practical in the real world and extremely unlikely,” Nicolas Bacca, CTO at Ledger, told CoinDesk via a spokesperson. “We stand by our products and are continually updating and implementing firmware countermeasures to ensure the highest standards of wallet integrity against hackers.”

The company published a detailed blog post critiquing each of the attacks presented.

Josh Datko’s new processor for remote access to a Ledger Nano S. He gave away many at the conference. (Screenshot from C3 Conference Livestream)

Supply Chain

How easy is it really to get access to a wallet before it reaches a final user?

Not that hard, it turns out, according to Josh Datko, owner of security consultancy Cryptotronix. He said:

“Supply chain attacks are easy to perform, but they are hard to perform at scale.”

Datko explained that makers of secure hardware primarily use stickers to ensure that no one has opened a box since it left a factory, but Datko found that it’s very simple to open a sticker without breaking it or leaving residue using a blow dryer or hot air gun.

So all an attacker would need to do is get some wallets, tamper with them and then get them to a retailer. For example, someone might buy them at a store, tamper with them and then put them back on the shelves.

As an example, the Ledger Nano S uses an on device function to protect users against verifying bad transactions. If users assume their computer is compromised (as most hardware wallets do), the Ledger still requires the user to verify a transaction by pushing buttons on the Nano itself.

That way, if a bad transaction shows up (for example, sending all your BTC to an unknown wallet), the user can just reject it.

However, Datko found it was possible to pop open a Ledger and install an internal receiver that enabled tampering with this function. In fact, using an antennae, he could “press” the button for yes. This would allow him to authenticate a transaction made by a compromised computer without physically touching the Ledger (though it would only work if the Ledger were attached to a computer, and presumably most of the time it is not).

Obviously, this would require getting someone to buy a bad Ledger, knowing where they lived, hacking their computer and then watching them in some way to know when the Ledger is attached to the computer.

Datko was able to send the signal from over 30 feet away, and believes with more powerful antennae he could do it from much further away.

Thomas Roth demos detecting signals while interacting with a Ledger Blue. (Screenshot from C3 Conference Livestream)

Side channel

Thomas Roth demonstrated two side channel attacks, but the one against the Ledger Blue used an antennae to read the PIN of device user.

Roth explained that they started by analysing the hardware architecture of the Blue. They noticed that there was a fairly long connection between the secure element and another processor. In other words, the wire that connected these two components was physically quite long, due to their physical distance apart on the circuit board (each on other side of the device’s relatively large battery).

Roth said:

“What is a long conductor with a fast changing current? It’s an antennae.”

So they looked to see if they could discern any kind of signal change when the device was interacted with. They found a significant signal when the touch screen was used to enter in digits for the PIN.

So they built a small robotic device to press a button over and over while their antennae listened and logged data. This was used to build up training data for an artificial intelligence system to analyze.

They were able to get a very high likelihood of identifying each digit on a PIN on the tested device.

So this would theoretically enable them to get close to a user and “listen” with an antennae to discern their code. That said, they would still then need to get their hands on the physical wallet to do anything with it, and this assumes that the user hadn’t taken additional measures.

That said, Ledger pointed out that this attack is less dramatic than it seems in their post, noting that it requires extremely controlled conditions to execute. “A better side channel would be to put a camera in the room and record the user entering his/her PIN,” the post noted.

Nevertheless, Nedospasov was surprised by how well the team did in its search for vulnerabilities. He said:

“When we set out six months ago we did not plan to have 100 percent success.”

More information about these attacks and others will be shared in an open source fashion on Github and on their new site, Wallet.Fail.

Ledger Nano S shown in a screenshot from the livestream of the Chaos Computer Club Conference in Berlin

Credit: Source link

Share76Tweet48
Previous Post

Italy Announces 30 Experts to Lead National Blockchain Strategy

Next Post

Latest Twitter Poll Indicates User’s Sentiment to Hold XRP for 10 Years

coinnewsdaily

coinnewsdaily

CoinNewsDaily.com is an online Crypto Coin News Website that aims to provide latest trendy news from market and around the world.

Related Posts

IoTeX’s MachineFi Lab challenges Big Tech by democratizing IoT to benefit users and businesses
Business

IoTeX’s MachineFi Lab challenges Big Tech by democratizing IoT to benefit users and businesses

Juli 26, 2022
ygg sea surpasses 10,000 scholarships in just six months of launch
Alt Coin

YGG SEA Surpasses 10,000 Scholarships in Just Six Months of Launch

Mai 6, 2022
5 projects enabling smart contract development on bitcoin
Alt Coin

5 Projects Enabling Smart Contract Development on Bitcoin

April 29, 2022
cross chain services play a crucial role in facilitating continued adoption of defi applications
Alt Coin

Cross-Chain Services Play a Crucial Role in Facilitating Continued Adoption of DeFi Applications

April 26, 2022
justin sun launches usdd, integrating the blockchain world and the real world with the decentralized stablecoin
Alt Coin

Justin Sun Launches USDD, Integrating the Blockchain World and the Real World with the Decentralized Stablecoin

April 25, 2022
what are wrapped tokens?
Bitcoin

What Are Wrapped Tokens?

April 23, 2022
Load More
Next Post
Latest Twitter Poll Indicates User’s Sentiment to Hold XRP for 10 Years

Latest Twitter Poll Indicates User’s Sentiment to Hold XRP for 10 Years

Kategorien

  • Alt Coin
  • Bitcoin
  • Business
  • Ethereum
  • ICO
  • Litecoin
  • Mining
  • NFT
  • Ripple
  • Tech
  • Trading

What New here?

  • 6 Questions for Rene Reinsberg of Celo – Cointelegraph Magazine
  • Judge denies SEC motion to keep Hinman docs secret in Ripple case
  • The ultimate guide to Miami – Cointelegraph Magazine
  • About Us
  • Contact Us
  • Privacy & Policy

© 2018-2021 CoinNewsDaily.com by CoinNewsDaily Inc. Crafted with Love by iFtiDev

Please enter CoinMarketCap Free Api Key to get this plugin works.
✕
No Result
View All Result
  • Home
  • Coin Market Cap
  • Bitcoin
  • Ethereum
  • Ripple
  • Litecoin
  • Alt Coin
  • Business
  • Trading
  • Mining

© 2018-2021 CoinNewsDaily.com by CoinNewsDaily Inc. Crafted with Love by iFtiDev