Common security threats and how to protect your crypto (2024)

This article describes the layers of protection used to protect Trezor users from potential security threats.

TABLE OF CONTENTS
  • Phishing
  • Brute forcing the Trezor PIN
  • Reflashing the Trezor device with malicious firmware
  • Evil maid attack - replacing a Trezor device with a fake
  • Stealing the user's computer
  • Hacking SatoshiLabs servers
  • SatoshiLabs shutting down
  • Running the recovery process on an infected computer
  • Side channel attacks

Phishing

If you wish to make a payment to someone on the internet, you need to know their receiving address. Unlike Trezor devices, computers are not necessarily secure, and it is possible that the address displayed on your screen is maliciously modified.

To be sure, always check the receiving address on your Trezor device screen (see Receiving payments). To be extra safe, we also recommend confirming the recipient's address using an additional second channel, such as SMS, phone call, or a face-to-face meeting.

For more information about phishing attacks on Trezor Suite, check out our blog posts:

  • Phishing attacks used to steal your coins
  • Recognize and avoid phishing
  • Ongoing phishing attacks on Trezor users

Never give your recovery seed to anyone and never enter it anywhere in a straight sequence from the first word to the last one.

Brute forcing the Trezor PIN

Your Trezor device is protected by a PIN code. If a good PIN is selected, it would take hundreds of thousands of attempts to get it right.

  • Every time a wrong PIN is entered, the waiting time between the attempts increases by a power of two.
  • The device automatically wipes itself after 16 unsuccessful attempts.


Reflashing the Trezor device with malicious firmware

Official Trezor firmware is signed by the SatoshiLabs master key. Installing unofficial firmware on the Trezor device is possible, but doing so will wipe the device storage, and it will show a warning every time it starts.

To be extra careful, make sure that the Trezor package is unopened, and the tamper-evident holograms are undamaged and in place.

For more information check out our articles discussing how to check the authenticity of your Trezor Model One, Trezor Model T and Trezor Safe 3.

Evil maid attack - replacing a Trezor device with a fake

It might be possible for a malicious third party to steal your Trezor and replace it with a fake one. If embedded with a wireless transmitter, the fake device could transmit any PIN it received. The attacker would then have full access to your funds.

If you are concerned about such an attack, it is a good idea to sign the back of your Trezor with a permanent pen. Do not forget to check the signature before each use. You can also set a custom home screen with a unique picture that would be hard to copy or fake.

The device chassis is sealed using ultrasonic welding, and opening a Trezor device without destroying the case is nearly impossible.

Stealing the user's computer

If the user's computer gets stolen, it does not affect the safety of his or her funds. The Trezor device can be used with a different computer. It is not possible to access the user's funds from the stolen computer without the Trezor device itself.

Hacking Trezor servers

SatoshiLabs and Trezor take security very seriously, so this option is extremely improbable. Moreover, you can set up your own custom backends, meaning you can use Trezor Suite without having to rely on the SatoshiLabs servers.

Trezor shutting down

There are no such plans because we love cryptocurrencies, but even if we had to close down, there is nothing to worry about. Trezor is compatible with other BIP32, BIP39 and BIP44 compatible wallets. Since our code is publicly available, developers from around the world can maintain it and add new functionalities. In extreme cases (although this is not recommended), it is possible to use the recovery seed to recover your funds in a different wallet as well.

Running the recovery process on an infected computer

During the recovery process of the Trezor Model One you are asked to enter your recovery seed into the computer with the words in a random order.

Even if your computer has a key-logger installed on it and the randomly ordered words are stolen, it would take many years to crack the order of the actual seed even with the most powerful computer.

Moreover, on the Trezor Model T and Trezor Safe 3, the seed words are entered on the device itself, so there is no danger of key-logging by an infected computer. With the Trezor Model One, you can always use the advanced recovery method to avoid malicious computers.

Side channel attacks

Side channel attacks described by Jochen Hoenicke were fixed by rewriting all crypto functions to use constant time. Jochen did almost all of the fixing, and we have been collaborating ever since on various security and non-security related improvements. Furthermore, we ask for the user's PIN before every operation involving a private key (e.g., generating the public key), so even if there were some side channel attacks left, the attacker would still need to know the PIN to trigger it.

Common security threats and how to protect your crypto (2024)

FAQs

How do I protect my crypto? ›

Use 2-factor authentication (2FA)

In addition to strong passwords, where available, use two-factor authentication (2FA). And always use the strongest type of 2FA the platform allows, ideally a Yubikey or similar hardware security key.

What is the biggest threat to crypto? ›

The FTC warns that bitcoin ATM fraud is soaring. In the U.S, losses from scams via crypto ATMs exceeded $120 million in 2023.

How can I make my cryptocurrency safer? ›

Use 2 Factor Authentication (such as a password and a phrase, a fingerprint, or a confirmation text). Safeguard your passwords and do not repeat them or share them. Maintain your own private key for your digital wallet. Store your digital funds in a secure wallet.

Which security measure is most commonly used to protect users of cryptocurrency? ›

Wallet Security: Strong passwords, multi-factor authentication (MFA) and regular updates to wallet software are key to improving wallet security.

How do I store my crypto safe? ›

The safest place to store crypto is in a hardware wallet, which is a physical device that stores your private keys offline and keeps them solely under your control. A cold wallet is the most secure for long-term crypto storage. It protects against online attacks and unauthorized access.

Can crypto be stolen from a cold wallet? ›

Cold wallets cannot be hacked because they are not connected to the Internet. Hardware wallets are very effective against digital thieves, but if you lose yours after transferring your private key(s) to it, you'll never recover the cryptocurrency.

How do you avoid risk in crypto? ›

Tips for managing risk in crypto investments
  1. Conduct thorough research. ...
  2. Diversify your portfolio. ...
  3. Set realistic goals and risk tolerance. ...
  4. Stay informed and updated. ...
  5. Secure your investments. ...
  6. Use stop loss orders and take profits. ...
  7. Avoid emotional decision-making. ...
  8. Consider long-term investing.

What is the most secure crypto wallet? ›

The best software wallets
  • Guarda. ...
  • Crypto.com DeFi Wallet. ...
  • Trust Wallet. Best for Binance and Binance.US users. ...
  • Exodus. Best for customer support. ...
  • ZenGo. Best for easy account recovery. ...
  • Ledger. Best hardware wallet for hot wallet integration. ...
  • Trezor. Best hardware wallet for security. ...
  • KeepKey. Best hardware wallet for price.

What is the most secure crypto? ›

1. Bitcoin (BTC) The safest digital currency to invest in is Bitcoin. It's often referred to as digital gold.

What's the safest device to store your crypto? ›

The answer to the question “what is the safest way to store crypto” is a self-custody cold storage wallet. As covered earlier, options include hardware wallets and paper wallets. But that's not to say that holding 100% of funds in cold storage is right for everyone.

What is the most secure platform for cryptocurrency? ›

Binance is the most trusted exchange by crypto investors. Nearly two in five crypto and NFT owners are worried their accounts could be breached. On average, victims of crypto account breaches lose more than $150.

What is the most secure untraceable cryptocurrency? ›

Monero (XMR) is the undisputed king of privacy-focused cryptocurrencies. Launched in 2014, it has established itself as the most private, secure and untraceable digital currency available. Monero's advanced privacy features make it virtually impossible to trace transactions or connect them to individual users.

Does crypto have legal protection? ›

Cryptocurrency payments do not come with legal protections.

For example, if you need to dispute a purchase, your credit card company has a process to help you get your money back. Cryptocurrencies typically do not come with any such protections.

How do I stop losing money on crypto? ›

Losses are bound to occur at a point in time for someone who trades on a regular basis. However, do not despair - you can effectively stop losing money on crypto by using safe storage platforms, tracking crypto indicators, doing proper background research, and sticking to the fundamentals.

Top Articles
WinZip | Download Your Free Trial
5 Predictable Stocks With a Margin of Safety
Artem The Gambler
Libiyi Sawsharpener
855-392-7812
Dollywood's Smoky Mountain Christmas - Pigeon Forge, TN
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Shorthand: The Write Way to Speed Up Communication
Seething Storm 5E
Sportsman Warehouse Cda
Clafi Arab
Www Movieswood Com
Braums Pay Per Hour
OnTrigger Enter, Exit ...
Walgreens On Nacogdoches And O'connor
Santa Clara Valley Medical Center Medical Records
Richmond Va Craigslist Com
Cnnfn.com Markets
Beau John Maloney Houston Tx
Best Suv In 2010
Available Training - Acadis® Portal
Walmart stores in 6 states no longer provide single-use bags at checkout: Which states are next?
iZurvive DayZ & ARMA Map
The Grand Canyon main water line has broken dozens of times. Why is it getting a major fix only now?
Mj Nails Derby Ct
Pearson Correlation Coefficient
Accuweather Minneapolis Radar
Parkeren Emmen | Reserveren vanaf €9,25 per dag | Q-Park
Pioneer Library Overdrive
Egusd Lunch Menu
Skidware Project Mugetsu
Pixel Combat Unblocked
15 Downer Way, Crosswicks, NJ 08515 - MLS NJBL2072416 - Coldwell Banker
Orange Pill 44 291
Tamilrockers Movies 2023 Download
Otter Bustr
Pinellas Fire Active Calls
Tillman Funeral Home Tallahassee
2020 Can-Am DS 90 X Vs 2020 Honda TRX90X: By the Numbers
Craigslist Mexicali Cars And Trucks - By Owner
Best Restaurants West Bend
Santa Clara County prepares for possible ‘tripledemic,’ with mask mandates for health care settings next month
St Vrain Schoology
Hampton In And Suites Near Me
Lawrence E. Moon Funeral Home | Flint, Michigan
Joy Taylor Nip Slip
4Chan Zelda Totk
17 of the best things to do in Bozeman, Montana
Billings City Landfill Hours
Coldestuknow
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 6049

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.