Digging the Deep Web: Exploring the dark side of the web
During the 35c3 conference held in Leipzig, Germany, the researchers
Dmitry Nedospasov, Thomas Roth, ad Josh Datko demonstrated that cryptocurrency wallets Trezor and Ledger are vulnerable to several
The group of researchers presented called “
“The sad reality is there is just not a lot of security in cryptocurrency [development]. And that is painful to hear,” said Nedospasov during his speech.
Vendors claimed that the attacks devised by the researchers were impractical.
Hacking the Supply Chain
The researchers demonstrated that it was simple to carry out a supply chain attack by altering the cryptocurrency wallets before it was sold to the end user. The experts demonstrated how to tamper with the packaging of a cryptocurrency wallet, They removed the anti-tampering holographic seal using a hair drier.
The operation was very simple for the Trezor One, Ledger Nano S, and Ledger Blue wallets.
Once removed the stickers the attackers can replace the microcontroller with their own chip with a customized bootloader. Attackers can also install a hardware implant, the experts implanted an RF transmitter that used to trigger a transaction in the proximity of the cryptocurrency wallets.
Hacking the Bootloader
Experts discovered a flaw in the Ledger Nano S that is based on the STM32 microcontroller. The vulnerability could be exploited by an attacker to flash the chip with custom firmware, the experts flashed the device with a version of the game Snake.
The hack was possible because developers left a programming port open and enabled on the Ledger Nano S circuit board. In this
Experts pointed out that the wallet has built-in mitigations to prevent this type of attack (i.e. Blacklisting memory regions), but they found a way to bypass them and flash the microchip with their own firmware.
The researcher Thomas Roth discovered that inside the Ledger Blue there is a long conductor that transfer the signal from the screen to the hardware. It works as an antenna and when the device is connected to a USB cable the signal is amplified.
Roth created radio equipment that used to capture the radio waves and analyze the signals associated with entered PIN digits patterns. In this was it was able to
Roth’s model obtained an accuracy that was high over 90%, he only failed one prediction.
In the attack scenario devised by the expert, the attacker needs to be in close proximity to the device.
Trezor One Chip-level flaw
Experts exploited a vulnerability in the Trezor One that was found in 2017 and patched by the vendor. The issue is a fault injection via a microcontroller used in the wallet, the experts targeted a different microcontroller (STM32F2) in the attacker using a new technique. The experts discovered that a persistent threat actor could steal the wallet’s private key and PIN from the device’s Random Access Memory (RAM), in this was it is possible to take over the device.
(SecurityAffairs – Cryptocurrency wallets, hacking)