The Ledger hack could have been much worse. But it also could have been easily prevented (2024)

Last week saw one of the more terrifying crypto industry hacks in recent memory, threatening not just a single protocol or application, but an untold number of apps that depended on one piece of infrastructure. And it could have been prevented with security practices that are second nature in more mature industries.

It happened in the dead of night U.S. time on Dec. 14. That’s when an attacker injected malicious “drainer” code into Ledger’s Connect Kit, a widely used software component maintained by the hardware wallet maker. For a few hours before it was patched, the malicious code snatched digital assets right out of wallets connected to services through Connect Kit. One commentator, only slightly hyperbolically, described the hack as compromising “all web3 websites in the world.”

Luckily, the damage to crypto users hasn’t been as catastrophic as it easily could have been. But the hack has devastating implications for Ledger itself, above all because it was 100% preventable—if only a painfully simple code-update-monitoring process had been in place. The fact that the compromised code was first detected by the third-party firm Blockaid, using a version of that update-monitoring process, rather than by Ledger itself, makes the failure even more damaging.

But similar failures are common across cryptocurrency and blockchain projects—and for similar reasons. Specifically, many crypto projects have immature or underfunded security stances, usually overwhelmingly focused on searching specific pieces of code for vulnerabilities.

The Ledger hack shows just how limited this approach is, since the vulnerability was not in the code at all. Instead, it was in the process of managing the code. To prevent such internal process failures, crypto projects need to reorient their security standards around more robust security reviews common in—to pick a particularly ironic example—the banking sector.

Plumbing problem

Connect Kit acts as a kind of plumbing for an extended universe of distributed apps. In theory, Connect Kit allows Ledger wallet users to carefully control third-party apps’ access to cryptocurrency stored using Ledger’s hardware dongles. Compromising Connect Kit amounted to compromising all of those connected services.

It was a new iteration of a classic “supply-chain attack,” which gained notoriety with the Russian-backed Solarwinds hack, which similarly compromised behind-the-scenes infrastructure software and may have caused as much as $100 billion in damage to a broad array of businesses and entities in 2020. The Ledger Connect Kit hack was caught and fixed within hours, and now seems to have cost users less than half a million dollars in crypto.

But autopsies of the attack have exposed deep problems with how Ledger managed its software—software with which the overriding pitch to users is that it’s hyper-secure.

Here’s what happened, at least as far as we know right now. According to Ledger, the initial compromise was a phishing attack that gained access to the accounts of a former Ledger employee. While it’s impossible to say for sure, it seems that offering better anti-phishing training might have prevented this first apparent process failure.

But far worse, the former employee still had access to a Ledger JavaScript package managed using a third-party service called NPM. That’s the second process failure: All former employees’ access to code should, obviously, be immediately revoked upon their departure.

But even that wasn’t the truly cardinal sin. It was apparently routine for changes to that NPM-hosted Javascript package to be used to update the Connect Kit code in real time, with seemingly no human review or sign-off. That’s the third process failure—and it’s particularly dire.

Automatic updating from a live database of code is often referred to as “load from CDN [content delivery network]”. It allows an application to be updated rapidly, frequently, and without needing a user’s interaction. But the method also, at least as implemented for Connect Kit, created a major vulnerability, because there was no human check to make sure changes were intended and official.

Once the hacker was inside the JavaScript package on NPM, there was effectively nothing at all between them and the code controlling users’ wallets. Ethereum developer Lefteris Karapetsas of Rotki pulled no punches, describing the use of this live update method as “insane.”

(Notably, however, some observers have laid blame at the feet of NPM itself for its failure to implement better version control natively.)

These are precisely the kinds of failures that a security review focused exclusively on code would not catch—because they’re not in the code.

Auditing audits

That’s why the language of security “audits,” so frequently invoked by blockchain firms, can sometimes be misleading.

A formal financial audit is not just a matter of making sure all of a firm’s money is where it’s supposed to be at one particular moment. Rather, an accounting audit is a complete, end-to-end review of a firm’s overall money-handling practices. A CPA performing a financial audit doesn’t just look at bank statements and revenue numbers: They are also required, as laid out by the AICPA, to evaluate “a business’s internal controls, and assess fraud risk.”

But an audit in cybersecurity doesn’t have the same comprehensive, formal meaning as it does in accounting. Many security audits amount mostly to point-in-time code reviews—the equivalent of a financial audit that merely reviewed current bank balances. Code reviews are obviously crucial, but they are only the beginning of real security, not the end.

To truly match the rigor of a financial audit, a cybersecurity review needs to assess a firm’s entire development lifecycle through a formal, structured process that makes sure nothing falls through the cracks. That includes reviewing the various phases of the development lifecycle, including quality assurance, and it means developing a threat analysis that identifies likely risks. It includes internal security reviews, on things like phishing prevention. And it includes a review of change-management processes—particularly relevant in the Ledger case.

If there’s a silver lining here, it’s that it doesn’t mean crypto is inherently or fundamentally impossible to properly secure. It can certainly seem that way, with the constant drumbeat of hacks, vulnerabilities, and collapses. But the problem isn’t blockchain’s unusual architecture—it was a series of compromises on rigorous and standardized security.

As the crypto industry matures, the companies that invest in meeting those standards will reap the benefits through providing trust and longevity. And the rest will be left behind, stained by avoidable failures.

David Schwed, a foremost expert on digital asset security, is COO of the blockchain security firm Halborn and the former global head of digital asset technology at BNY Mellon. The opinions expressed in Fortune.com commentary pieces are solely the views of their authors and do not necessarily reflect the opinions and beliefs ofFortune.

Learn more about all things crypto with short, easy-to-read lesson cards. Click here for Fortune's Crypto Crash Course.

The Ledger hack could have been much worse. But it also could have been easily prevented (2024)

FAQs

Is it possible for Ledger to get hacked? ›

The breach originated when a hacker accessed the NPMJS account of a former Ledger employee through a phishing attack. NPMJS is a platform for hosting code packages for developers. The crypto community raised concerns over why a former employee retained access to such critical company data​​.

Is Ledger recovery safe? ›

Does Ledger Recover compromise the security of my private key? No, it doesn't. Ledger Recover service follows the same principle as signing the transaction on a blockchain—securely and only with your permission. No access to your private key was made to enable Ledger Recover to work.

What is happening with Ledger? ›

Ledger says some $600,000 in assets were stolen from users' blind signing on EVM DApps, and it will ensure all victims are “made whole,” while blind signing will be disallowed by June 2024.

How do you keep a Ledger secure? ›

All you need to do to protect yourself is double-check that the receiving address on your Ledger device's secure screen matches the one on your internet-connected device before signing any transaction. Your Ledger device will handle the rest!

Is Ledger 100% secure? ›

Your entire experience on a Ledger device is driven by a Secure Element chip, the same kind of SmartCard technology that is in your credit card or your passport. These Secure Elements have been hardened over tens of years and dozens of billions made and used across a variety of secure hardware.

How do I know if my Ledger is safe? ›

Alternatively, you can initiate a genuine check for any existing or new Ledger device after Ledger Live has been set up by navigating to Settings> Help> Device setup in Ledger Live. Advanced users additionally can check the hardware integrity of the Ledger device to check that it has not been tampered with.

Is my money safe with Ledger? ›

Your Ledger is protecting an encrypted copy of your 24-word Secret Recovery Phrase inside of it with military-grade cryptographic hardware, and remember that it's your job to make sure your 24-word Secret Recovery Phrase stays offline and is never entered into a computer, into a phone, or shared with anyone or any ...

Can I lose my crypto on Ledger? ›

Even if your Ledger device is lost, your crypto is still safe in your account. However, you will need the secret recovery phrase (also known as a seed phrase) to recover your accounts.

What happens to my crypto if Ledger goes bust? ›

A: All you'd need is your original seed phrase you save when setting up your ledger. With that seed phrase you can recreate all wallets your ledger device creates. Ledger is giving ease of use with this but by no means are you reliant on them for your money if they went bankrupt one day. That's the beauty of crypto!

Can Ledger block your crypto? ›

Don't worry, losing your Ledger doesn't mean losing your crypto. Your assets are stored on the blockchain, which you can access using your Ledger. You can access, manage, and retrieve your assets as long as your secret recovery phrase is safe and accessible only to you.

Does Ledger have access to my keys? ›

Ledger does not store your private keys, nor ever asks for it.

What is the most secure Ledger? ›

Ledger Stax™

The most premium secure touchscreen hardware wallet to protect and manage crypto and NFTs.

Can you get scammed with a Ledger? ›

While we are confident that Ledger devices are designed to withstand all known vectors of attack, scammers are continually finding ways to use social engineering, phishing, and fraud tactics to trick crypto users to separate them from their hard-earned money.

Can my crypto be stolen from my Ledger? ›

Segregate Your Assets

Ledger devices can only protect you so far. If you sign a malicious transaction with your Ledger, your funds will still be at risk. To avoid someone stealing your crypto, the best thing you can do is segregate your assets correctly.

Has the XRP Ledger ever been hacked? ›

The incident was initially flagged by Blockchain sleuth ZachXBT, who claimed on X that 213 million XRP tokens had been siphoned out of a large wallet on the XRP Leger blockchain. The funds were subsequently laundered through multiple exchanges including Binance, Kraken and OKX.

Can Ledger Bluetooth be hacked? ›

The BLE connection is end-to-end encrypted to protect user privacy. In the unlikely case, the BLE transport was to be compromised, an attacker would never be able to extract private keys or make users sign a transaction they do not wish to sign. Read more about Bluetooth security in our blog post.

Top Articles
15 Practical Uses of Artificial Intelligence in Daily Life
The Future of Telemedicine: How Technology is Transforming Healthcare
Friskies Tender And Crunchy Recall
Live Basketball Scores Flashscore
9192464227
Produzione mondiale di vino
Santa Clara Valley Medical Center Medical Records
Conduent Connect Feps Login
OSRS Dryness Calculator - GEGCalculators
Pittsburgh Ultra Advanced Stain And Sealant Color Chart
Spartanburg County Detention Facility - Annex I
Playgirl Magazine Cover Template Free
Curtains - Cheap Ready Made Curtains - Deconovo UK
Xxn Abbreviation List 2023
Sport-News heute – Schweiz & International | aktuell im Ticker
25Cc To Tbsp
Voy Boards Miss America
Pekin Soccer Tournament
Officialmilarosee
CDL Rostermania 2023-2024 | News, Rumors & Every Confirmed Roster
Dover Nh Power Outage
Puss In Boots: The Last Wish Showtimes Near Cinépolis Vista
Heart Ring Worth Aj
Raz-Plus Literacy Essentials for PreK-6
Nesb Routing Number
Essence Healthcare Otc 2023 Catalog
Relaxed Sneak Animations
Stockton (California) – Travel guide at Wikivoyage
Mumu Player Pokemon Go
Kokomo Mugshots Busted
Everstart Jump Starter Manual Pdf
Puerto Rico Pictures and Facts
Craigslist In Myrtle Beach
Goodwill Thrift Store & Donation Center Marietta Photos
Pensacola 311 Citizen Support | City of Pensacola, Florida Official Website
Mta Bus Forums
Labyrinth enchantment | PoE Wiki
Trivago Myrtle Beach Hotels
What Does Code 898 Mean On Irs Transcript
Thelemagick Library - The New Comment to Liber AL vel Legis
Wayne State Academica Login
VDJdb in 2019: database extension, new analysis infrastructure and a T-cell receptor motif compendium
Powerspec G512
2Nd Corinthians 5 Nlt
The Many Faces of the Craigslist Killer
A rough Sunday for some of the NFL's best teams in 2023 led to the three biggest upsets: Analysis
Kaamel Hasaun Wikipedia
Aurora Southeast Recreation Center And Fieldhouse Reviews
300 Fort Monroe Industrial Parkway Monroeville Oh
Strange World Showtimes Near Century Federal Way
Southwind Village, Southend Village, Southwood Village, Supervision Of Alcohol Sales In Church And Village Halls
Craigs List Sarasota
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 5894

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.