Anatomy of an Attack - Bad and Blind Ledger Nano X (2024)

This the another in a (possibly never ending) series of examinations into the various types of attacks and scams in the crypto world. If this piece is helpful to you, please let me know on twitter: @CryptoCoinBen.

Yesterday Kraken Security Labs published a new supply chain vulnerability to the Ledger X hardware wallet. It allows an attacker to modify the way the device behaves and possibly compromise the users computer or affect the display of the hardware wallet itself. Ledger have already released a patch and usage suggestions to mitigate against this attack. Lets take a look at what this all means.

Background on Ledger and the Ledger Nano X

Ledger have been making hardware crypto wallets since 2014. They were one of the first to market with the concept of a hardware wallet and vey quickly became synonymous for it. They sold over a million units of their earlier model, the Ledger Nano S, and were able to raise over $150 Million in investment funding because of this success. The Ledger Nano X was released last year, after a troubled release due to manufacturing issues. It offers support for additional cryptocurrencies, bluetooth connectivity for mobiles, as well as an improved screen and battery for on the go payments. It is currently priced at A$199, or double the cost of the previous Ledger Nano S model.

What is a ‘Supply chain’ attack?

A supply chain attack generally means the compromise of a device before it arrives in your hands. One of the best exmaples of this occured last year, when it was claimed China was installing malcious integrated circuits in the Super Micro servers being manufactured there. This cast doubt into the security of every Super Micro server sold.

It is critical to be absolutely clear here. Kraken are not claiming that the supply and manufacture of Ledger devices is compromised. Instead this is better described as a ‘late stage supply attack’. That is, the device is still considered safe at the point it leaves the Ledger distribution centre. Kraken Labs are highlighting that there is an opportunity after it has been shipped, but before the end user installs their first app. It is a very small window in the scheme of things, but it is there.

What is the ‘Bad Ledger’ vulnerability?

Ledger leaves the device in ‘testing mode’ when it is shipped. This allows the end user to run a verification test to ensure that the device is functioning correctly and that it hasn’t been modified. Once the end user installs their first app on the deivce, ‘testing mode’ is then disabled.

If someone were to intercept the device in transit, they will be able to modify the microprocessor in the device to perform actions not intended by the manufacturer. The example given turns the device into an automatic keyboard, ala the ’rubber ducky’. Once plugged into your PC, the Ledger Nano X would type out whatever commands it was programmed with. As it is fully automated, it could run its payload within milliseconds.

What is the ‘Blind Ledger’ vulnerability?

It relies on the Ledger Nano X being in test mode still. While in this mode, a malicious user could use the unsecure microprocessor to disable the screen. In theory, they could then attempt to socially engineer the user to press confirmations buttons, without the user seeing what they are confirming.

While I do see the threat for new users, any knowledgable users should instantly see that something is wrong, and NOT confirm anything unless it is displayed on the screen.

Is the Ledger Nano X wallet compromised?

No. The secure enclave that stores the private key for your wallet has remained secure at all times. Even with the device in ‘test mode’ and physically intercepted by a very skilled adversary, the wallet remained secured. I would suggest that every other digital device you have would not survive that type of attack. So kudos to Ledger here (or more specifically, the ST31H320 secure microcontroller)

If you have a device, you are encouraged to update to the latest firmware.

A firmware update, 1.2.4-2, has been released. It fixes the vulnerability by checking the integrity of the whole MCU by the Secure Element at each boot, like on the Nano S. —Ledger

This firmware now checks the integrity of the microprocessor, as well as the secure element.

How to avoid this style of attack.

  1. Always order hardware wallets from the official source or an authorised reseller.
  2. Always use a trusted brand and support organisations which operate bug bounties. These encourage vulnerabilities like this to be responsibly disclosed.
  3. When you first receive the device, connect it to an isolated PC and update the firmware immediately.
  4. Read the manual or other material to understand how the device operates. If it displays unusual behaviour, do not use it.
Anatomy of an Attack - Bad and Blind Ledger Nano X (2024)
Top Articles
If You Invested $4K in These Companies With Elon Musk, You Would Be Worth $623K
Cash Deposit Limit in Saving Account
WALB Locker Room Report Week 5 2024
Tiny Tina Deadshot Build
Riverrun Rv Park Middletown Photos
Hotels
Uihc Family Medicine
Santa Clara College Confidential
EY – все про компанію - Happy Monday
Aiken County government, school officials promote penny tax in North Augusta
Gameplay Clarkston
Full Range 10 Bar Selection Box
Weekly Math Review Q4 3
Spelunking The Den Wow
Skylar Vox Bra Size
Truth Of God Schedule 2023
Wal-Mart 140 Supercenter Products
Comics Valley In Hindi
Bj Alex Mangabuddy
Kiddle Encyclopedia
Tamilyogi Proxy
Palm Springs Ca Craigslist
MLB power rankings: Red-hot Chicago Cubs power into September, NL wild-card race
Morristown Daily Record Obituary
Violent Night Showtimes Near Century 14 Vallejo
The Boogeyman (Film, 2023) - MovieMeter.nl
Belledelphine Telegram
Preggophili
Danielle Moodie-Mills Net Worth
His Only Son Showtimes Near Marquee Cinemas - Wakefield 12
Neteller Kasiinod
Happy Shuttle Cancun Review
Chadrad Swap Shop
Was heißt AMK? » Bedeutung und Herkunft des Ausdrucks
Ofw Pinoy Channel Su
Solve 100000div3= | Microsoft Math Solver
Exploring TrippleThePotatoes: A Popular Game - Unblocked Hub
RUB MASSAGE AUSTIN
Weekly Math Review Q4 3
Supermarkt Amsterdam - Openingstijden, Folder met alle Aanbiedingen
Facebook Marketplace Marrero La
Easy Pigs in a Blanket Recipe - Emmandi's Kitchen
M Life Insider
Firestone Batteries Prices
Beaufort SC Mugshots
Craigslist Rooms For Rent In San Fernando Valley
Go Nutrients Intestinal Edge Reviews
Mejores páginas para ver deportes gratis y online - VidaBytes
Rétrospective 2023 : une année culturelle de renaissances et de mutations
Room For Easels And Canvas Crossword Clue
Dr Seuss Star Bellied Sneetches Pdf
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 5905

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.