Anatomy of an Attack - Bad and Blind Ledger Nano X (2024)

This the another in a (possibly never ending) series of examinations into the various types of attacks and scams in the crypto world. If this piece is helpful to you, please let me know on twitter: @CryptoCoinBen.

Yesterday Kraken Security Labs published a new supply chain vulnerability to the Ledger X hardware wallet. It allows an attacker to modify the way the device behaves and possibly compromise the users computer or affect the display of the hardware wallet itself. Ledger have already released a patch and usage suggestions to mitigate against this attack. Lets take a look at what this all means.

Background on Ledger and the Ledger Nano X

Ledger have been making hardware crypto wallets since 2014. They were one of the first to market with the concept of a hardware wallet and vey quickly became synonymous for it. They sold over a million units of their earlier model, the Ledger Nano S, and were able to raise over $150 Million in investment funding because of this success. The Ledger Nano X was released last year, after a troubled release due to manufacturing issues. It offers support for additional cryptocurrencies, bluetooth connectivity for mobiles, as well as an improved screen and battery for on the go payments. It is currently priced at A$199, or double the cost of the previous Ledger Nano S model.

What is a ‘Supply chain’ attack?

A supply chain attack generally means the compromise of a device before it arrives in your hands. One of the best exmaples of this occured last year, when it was claimed China was installing malcious integrated circuits in the Super Micro servers being manufactured there. This cast doubt into the security of every Super Micro server sold.

It is critical to be absolutely clear here. Kraken are not claiming that the supply and manufacture of Ledger devices is compromised. Instead this is better described as a ‘late stage supply attack’. That is, the device is still considered safe at the point it leaves the Ledger distribution centre. Kraken Labs are highlighting that there is an opportunity after it has been shipped, but before the end user installs their first app. It is a very small window in the scheme of things, but it is there.

What is the ‘Bad Ledger’ vulnerability?

Ledger leaves the device in ‘testing mode’ when it is shipped. This allows the end user to run a verification test to ensure that the device is functioning correctly and that it hasn’t been modified. Once the end user installs their first app on the deivce, ‘testing mode’ is then disabled.

If someone were to intercept the device in transit, they will be able to modify the microprocessor in the device to perform actions not intended by the manufacturer. The example given turns the device into an automatic keyboard, ala the ’rubber ducky’. Once plugged into your PC, the Ledger Nano X would type out whatever commands it was programmed with. As it is fully automated, it could run its payload within milliseconds.

What is the ‘Blind Ledger’ vulnerability?

It relies on the Ledger Nano X being in test mode still. While in this mode, a malicious user could use the unsecure microprocessor to disable the screen. In theory, they could then attempt to socially engineer the user to press confirmations buttons, without the user seeing what they are confirming.

While I do see the threat for new users, any knowledgable users should instantly see that something is wrong, and NOT confirm anything unless it is displayed on the screen.

Is the Ledger Nano X wallet compromised?

No. The secure enclave that stores the private key for your wallet has remained secure at all times. Even with the device in ‘test mode’ and physically intercepted by a very skilled adversary, the wallet remained secured. I would suggest that every other digital device you have would not survive that type of attack. So kudos to Ledger here (or more specifically, the ST31H320 secure microcontroller)

If you have a device, you are encouraged to update to the latest firmware.

A firmware update, 1.2.4-2, has been released. It fixes the vulnerability by checking the integrity of the whole MCU by the Secure Element at each boot, like on the Nano S. —Ledger

This firmware now checks the integrity of the microprocessor, as well as the secure element.

How to avoid this style of attack.

  1. Always order hardware wallets from the official source or an authorised reseller.
  2. Always use a trusted brand and support organisations which operate bug bounties. These encourage vulnerabilities like this to be responsibly disclosed.
  3. When you first receive the device, connect it to an isolated PC and update the firmware immediately.
  4. Read the manual or other material to understand how the device operates. If it displays unusual behaviour, do not use it.
Anatomy of an Attack - Bad and Blind Ledger Nano X (2024)
Top Articles
What is data sharing? Everything you need to know
How To Use Blockchain To Store Data [Multiple Options Available] | upGrad blog
Fort Morgan Hometown Takeover Map
How To Fix Epson Printer Error Code 0x9e
Joliet Patch Arrests Today
Kevin Cox Picks
Chicago Neighborhoods: Lincoln Square & Ravenswood - Chicago Moms
Team 1 Elite Club Invite
Google Sites Classroom 6X
Sprague Brook Park Camping Reservations
Jesus Revolution Showtimes Near Chisholm Trail 8
Elle Daily Horoscope Virgo
Simple Steamed Purple Sweet Potatoes
Hope Swinimer Net Worth
1Win - инновационное онлайн-казино и букмекерская контора
Regal Stone Pokemon Gaia
Chris Hipkins Fue Juramentado Como El Nuevo Primer Ministro De...
Premier Reward Token Rs3
Jvid Rina Sauce
Lima Funeral Home Bristol Ri Obituaries
Mbta Commuter Rail Lowell Line Schedule
Destiny 2 Salvage Activity (How to Complete, Rewards & Mission)
Spergo Net Worth 2022
Everything We Know About Gladiator 2
Craigslist Pinellas County Rentals
Earl David Worden Military Service
Pokemon Unbound Shiny Stone Location
The Weather Channel Local Weather Forecast
Contracts for May 28, 2020
Ice Dodo Unblocked 76
Uncovering The Mystery Behind Crazyjamjam Fanfix Leaked
Wics News Springfield Il
Ihub Fnma Message Board
Utexas Iot Wifi
WRMJ.COM
Kristy Ann Spillane
Obsidian Guard's Skullsplitter
Metro By T Mobile Sign In
Leland Nc Craigslist
Hermann Memorial Urgent Care Near Me
A Man Called Otto Showtimes Near Amc Muncie 12
Andhra Jyothi Telugu News Paper
Ukg Dimensions Urmc
Craigslist Jobs Brownsville Tx
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
60 X 60 Christmas Tablecloths
511Pa
Big Reactors Best Coolant
Deezy Jamaican Food
Room For Easels And Canvas Crossword Clue
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 5905

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.