The Ledger Attack: draining hardware cryptowallets (2024)

Aftermath: How The Industry Reacted

Some users expressed anger at Ledger for failing to prevent the compromise, while others cautioned against the dangers of relying on third-party libraries.

The cybersecurity industry has a niche in cybercoin. Wallet draining campaigns are well-known, which mainly use phishing sites to deceive end-users. The usual SaaS business (Scam-as-a-Service) has specialized actors for wallet draining, like the scam vendor Inferno Drainer which announced stop-of-operations in Nov 2023. This seems to be a false flag anyway, according to recent activity seen in Dune’s @scamsniffer. The scheme they follow was explained by this Group-IB post:

And Now, Lessons Learned!

It is amazing how a hardware wallet, the epitome of crypto security, was breached simply by graining access to NPM credentials of a Ledger “former employee” (probably username/password without 2FA protection, or an access token). This incident serves as a striking reminder that when you are under fire, your software infrastructure needs to be protected with the same care as your software or hardware products.

Most software supply chain attacks begin by compromising an internal account (often for a developer or devops engineer). The attackers then either move laterally to breach internal systems in the software infrastructure like the CI/CD system or the deployment tools, or manage to add malicious logic to source code repositories, which could be detected if proper handling of changes with branch protection and code reviews are in place. But attackers do not need to go so deep when the target is a popular library published in a public registry, especially if they can gain access to publish (write) credentials. And this is what happened in this attack.

2FA authentication, specifically using robust elements like security keys, limits the risk with interactive operations. For CI/CD pipelines, access tokens with limited access stored as a CI/CD secret is the usual way to go (and the access token should not be leaked). Unfortunately, it seems that the employee did not have a robust 2FA set. NPM allows organizations to enforce 2FA (but this is optional, not the default), which is probably what Ledger should have. And do not forget to add appropriate credentials revocation procedures for former employees, especially with access to resources as critical as the NPM scope owned by the organization.

Version pinning for dependencies with reviewed version bumps is a practice that mitigates the spread of malicious dependencies. In the context of the Ledger incident, the versions of the library that the connect-kit-loader took from CDN should have been pinned, and “do not trust whatever the CDN throws”. Having a checksum verification e.g. via SRI (or even a digital signature scheme also authenticating the source) should be used when pulling from a CDN for dynamic code loading.

The rest is a story.

For the more conventional phishing campaigns directed to wallet users, the question is: What makes users fall into traps set by criminals and to confirm transactions they never intended to perform? The phishing sites in this domain are well designed and convincing, imitating popular crypto brands; and they also offer free tokens, minting NFTs and other rewards. Avoiding users to fall into such traps is a problem looking for a solution.

And to not forget the related cryptohacking attacks, a more general threat, where the adversaries take over cloud infrastructures to run miners for cryptocurrency, often for privacy coins like Monero XMR and Zcash, with hidden transaction histories. Cryptojacking is relevant because it may affect ANY organization, and though the profit for the attacker could be low, the cost for the victim could be large (Sysdig mentioned in this report that it takes $53 in cost for the victim organization for every $1 mined for the attacker).

References

The Ledger Attack: draining hardware cryptowallets (2024)
Top Articles
Why Uniswap Led a Crypto Crash This Week | The Motley Fool
Re: Month discount
Skigebiet Portillo - Skiurlaub - Skifahren - Testberichte
Rosy Boa Snake — Turtle Bay
San Angelo, Texas: eine Oase für Kunstliebhaber
Jackerman Mothers Warmth Part 3
Sportsman Warehouse Cda
Nm Remote Access
CSC error CS0006: Metadata file 'SonarAnalyzer.dll' could not be found
Turbocharged Cars
Gfs Rivergate
Craigslist Cars Nwi
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Discover Westchester's Top Towns — And What Makes Them So Unique
How Much Is Tj Maxx Starting Pay
Shannon Dacombe
Aucklanders brace for gales, hail, cold temperatures, possible blackouts; snow falls in Chch
Nhl Wikia
Everything you need to know about Costco Travel (and why I love it) - The Points Guy
If you bought Canned or Pouched Tuna between June 1, 2011 and July 1, 2015, you may qualify to get cash from class action settlements totaling $152.2 million
Lakers Game Summary
Amortization Calculator
How many days until 12 December - Calendarr
Free Personals Like Craigslist Nh
Yog-Sothoth
Air Quality Index Endicott Ny
If you have a Keurig, then try these hot cocoa options
THE FINALS Best Settings and Options Guide
Apparent assassination attempt | Suspect never had Trump in sight, did not get off shot: Officials
Sorrento Gourmet Pizza Goshen Photos
Encore Atlanta Cheer Competition
Best Town Hall 11
Pokémon Unbound Starters
Roseann Marie Messina · 15800 Detroit Ave, Suite D, Lakewood, OH 44107-3748 · Lay Midwife
Greyson Alexander Thorn
Imagetrend Elite Delaware
Evil Dead Rise - Everything You Need To Know
A Small Traveling Suitcase Figgerits
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
Tamil Play.com
Ducky Mcshweeney's Reviews
10 Most Ridiculously Expensive Haircuts Of All Time in 2024 - Financesonline.com
Ippa 番号
Boone County Sheriff 700 Report
Dollar Tree's 1,000 store closure tells the perils of poor acquisitions
This 85-year-old mom co-signed her daughter's student loan years ago. Now she fears the lender may take her house
From Grindr to Scruff: The best dating apps for gay, bi, and queer men in 2024
Contico Tuff Box Replacement Locks
28 Mm Zwart Spaanplaat Gemelamineerd (U999 ST9 Matte | RAL9005) Op Maat | Zagen Op Mm + ABS Kantenband
Naughty Natt Farting
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6216

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.