The Ledger hack could have been much worse. But it also could have been easily prevented (2024)

Last week saw one of the more terrifying crypto industry hacks in recent memory, threatening not just a single protocol or application, but an untold number of apps that depended on one piece of infrastructure. And it could have been prevented with security practices that are second nature in more mature industries.

It happened in the dead of night U.S. time on Dec. 14. That’s when an attacker injected malicious “drainer” code into Ledger’s Connect Kit, a widely used software component maintained by the hardware wallet maker. For a few hours before it was patched, the malicious code snatched digital assets right out of wallets connected to services through Connect Kit. One commentator, only slightly hyperbolically, described the hack as compromising “all web3 websites in the world.”

Luckily, the damage to crypto users hasn’t been as catastrophic as it easily could have been. But the hack has devastating implications for Ledger itself, above all because it was 100% preventable—if only a painfully simple code-update-monitoring process had been in place. The fact that the compromised code was first detected by the third-party firm Blockaid, using a version of that update-monitoring process, rather than by Ledger itself, makes the failure even more damaging.

But similar failures are common across cryptocurrency and blockchain projects—and for similar reasons. Specifically, many crypto projects have immature or underfunded security stances, usually overwhelmingly focused on searching specific pieces of code for vulnerabilities.

The Ledger hack shows just how limited this approach is, since the vulnerability was not in the code at all. Instead, it was in the process of managing the code. To prevent such internal process failures, crypto projects need to reorient their security standards around more robust security reviews common in—to pick a particularly ironic example—the banking sector.

Plumbing problem

Connect Kit acts as a kind of plumbing for an extended universe of distributed apps. In theory, Connect Kit allows Ledger wallet users to carefully control third-party apps’ access to cryptocurrency stored using Ledger’s hardware dongles. Compromising Connect Kit amounted to compromising all of those connected services.

It was a new iteration of a classic “supply-chain attack,” which gained notoriety with the Russian-backed Solarwinds hack, which similarly compromised behind-the-scenes infrastructure software and may have caused as much as $100 billion in damage to a broad array of businesses and entities in 2020. The Ledger Connect Kit hack was caught and fixed within hours, and now seems to have cost users less than half a million dollars in crypto.

But autopsies of the attack have exposed deep problems with how Ledger managed its software—software with which the overriding pitch to users is that it’s hyper-secure.

Here’s what happened, at least as far as we know right now. According to Ledger, the initial compromise was a phishing attack that gained access to the accounts of a former Ledger employee. While it’s impossible to say for sure, it seems that offering better anti-phishing training might have prevented this first apparent process failure.

But far worse, the former employee still had access to a Ledger JavaScript package managed using a third-party service called NPM. That’s the second process failure: All former employees’ access to code should, obviously, be immediately revoked upon their departure.

But even that wasn’t the truly cardinal sin. It was apparently routine for changes to that NPM-hosted Javascript package to be used to update the Connect Kit code in real time, with seemingly no human review or sign-off. That’s the third process failure—and it’s particularly dire.

Automatic updating from a live database of code is often referred to as “load from CDN [content delivery network]”. It allows an application to be updated rapidly, frequently, and without needing a user’s interaction. But the method also, at least as implemented for Connect Kit, created a major vulnerability, because there was no human check to make sure changes were intended and official.

Once the hacker was inside the JavaScript package on NPM, there was effectively nothing at all between them and the code controlling users’ wallets. Ethereum developer Lefteris Karapetsas of Rotki pulled no punches, describing the use of this live update method as “insane.”

(Notably, however, some observers have laid blame at the feet of NPM itself for its failure to implement better version control natively.)

These are precisely the kinds of failures that a security review focused exclusively on code would not catch—because they’re not in the code.

Auditing audits

That’s why the language of security “audits,” so frequently invoked by blockchain firms, can sometimes be misleading.

A formal financial audit is not just a matter of making sure all of a firm’s money is where it’s supposed to be at one particular moment. Rather, an accounting audit is a complete, end-to-end review of a firm’s overall money-handling practices. A CPA performing a financial audit doesn’t just look at bank statements and revenue numbers: They are also required, as laid out by the AICPA, to evaluate “a business’s internal controls, and assess fraud risk.”

But an audit in cybersecurity doesn’t have the same comprehensive, formal meaning as it does in accounting. Many security audits amount mostly to point-in-time code reviews—the equivalent of a financial audit that merely reviewed current bank balances. Code reviews are obviously crucial, but they are only the beginning of real security, not the end.

To truly match the rigor of a financial audit, a cybersecurity review needs to assess a firm’s entire development lifecycle through a formal, structured process that makes sure nothing falls through the cracks. That includes reviewing the various phases of the development lifecycle, including quality assurance, and it means developing a threat analysis that identifies likely risks. It includes internal security reviews, on things like phishing prevention. And it includes a review of change-management processes—particularly relevant in the Ledger case.

If there’s a silver lining here, it’s that it doesn’t mean crypto is inherently or fundamentally impossible to properly secure. It can certainly seem that way, with the constant drumbeat of hacks, vulnerabilities, and collapses. But the problem isn’t blockchain’s unusual architecture—it was a series of compromises on rigorous and standardized security.

As the crypto industry matures, the companies that invest in meeting those standards will reap the benefits through providing trust and longevity. And the rest will be left behind, stained by avoidable failures.

David Schwed, a foremost expert on digital asset security, is COO of the blockchain security firm Halborn and the former global head of digital asset technology at BNY Mellon. The opinions expressed in Fortune.com commentary pieces are solely the views of their authors and do not necessarily reflect the opinions and beliefs ofFortune.

Learn more about all things crypto with short, easy-to-read lesson cards. Click here for Fortune's Crypto Crash Course.

The Ledger hack could have been much worse. But it also could have been easily prevented (2024)

FAQs

Is it possible for Ledger to get hacked? ›

The breach originated when a hacker accessed the NPMJS account of a former Ledger employee through a phishing attack. NPMJS is a platform for hosting code packages for developers. The crypto community raised concerns over why a former employee retained access to such critical company data​​.

Is Ledger recovery safe? ›

Does Ledger Recover compromise the security of my private key? No, it doesn't. Ledger Recover service follows the same principle as signing the transaction on a blockchain—securely and only with your permission. No access to your private key was made to enable Ledger Recover to work.

What is happening with Ledger? ›

Ledger says some $600,000 in assets were stolen from users' blind signing on EVM DApps, and it will ensure all victims are “made whole,” while blind signing will be disallowed by June 2024.

How do you keep a Ledger secure? ›

All you need to do to protect yourself is double-check that the receiving address on your Ledger device's secure screen matches the one on your internet-connected device before signing any transaction. Your Ledger device will handle the rest!

Is Ledger 100% secure? ›

Your entire experience on a Ledger device is driven by a Secure Element chip, the same kind of SmartCard technology that is in your credit card or your passport. These Secure Elements have been hardened over tens of years and dozens of billions made and used across a variety of secure hardware.

How do I know if my Ledger is safe? ›

Alternatively, you can initiate a genuine check for any existing or new Ledger device after Ledger Live has been set up by navigating to Settings> Help> Device setup in Ledger Live. Advanced users additionally can check the hardware integrity of the Ledger device to check that it has not been tampered with.

Is my money safe with Ledger? ›

Your Ledger is protecting an encrypted copy of your 24-word Secret Recovery Phrase inside of it with military-grade cryptographic hardware, and remember that it's your job to make sure your 24-word Secret Recovery Phrase stays offline and is never entered into a computer, into a phone, or shared with anyone or any ...

Can I lose my crypto on Ledger? ›

Even if your Ledger device is lost, your crypto is still safe in your account. However, you will need the secret recovery phrase (also known as a seed phrase) to recover your accounts.

What happens to my crypto if Ledger goes bust? ›

A: All you'd need is your original seed phrase you save when setting up your ledger. With that seed phrase you can recreate all wallets your ledger device creates. Ledger is giving ease of use with this but by no means are you reliant on them for your money if they went bankrupt one day. That's the beauty of crypto!

Can Ledger block your crypto? ›

Don't worry, losing your Ledger doesn't mean losing your crypto. Your assets are stored on the blockchain, which you can access using your Ledger. You can access, manage, and retrieve your assets as long as your secret recovery phrase is safe and accessible only to you.

Does Ledger have access to my keys? ›

Ledger does not store your private keys, nor ever asks for it.

What is the most secure Ledger? ›

Ledger Stax™

The most premium secure touchscreen hardware wallet to protect and manage crypto and NFTs.

Can you get scammed with a Ledger? ›

While we are confident that Ledger devices are designed to withstand all known vectors of attack, scammers are continually finding ways to use social engineering, phishing, and fraud tactics to trick crypto users to separate them from their hard-earned money.

Can my crypto be stolen from my Ledger? ›

Segregate Your Assets

Ledger devices can only protect you so far. If you sign a malicious transaction with your Ledger, your funds will still be at risk. To avoid someone stealing your crypto, the best thing you can do is segregate your assets correctly.

Has the XRP Ledger ever been hacked? ›

The incident was initially flagged by Blockchain sleuth ZachXBT, who claimed on X that 213 million XRP tokens had been siphoned out of a large wallet on the XRP Leger blockchain. The funds were subsequently laundered through multiple exchanges including Binance, Kraken and OKX.

Can Ledger Bluetooth be hacked? ›

The BLE connection is end-to-end encrypted to protect user privacy. In the unlikely case, the BLE transport was to be compromised, an attacker would never be able to extract private keys or make users sign a transaction they do not wish to sign. Read more about Bluetooth security in our blog post.

Top Articles
Selling on Mercari vs eBay: 2024 Easy Review
Best Credit Default Swap (CDS) Data Providers & Companies [2024]
55Th And Kedzie Elite Staffing
It's Official: Sabrina Carpenter's Bangs Are Taking Over TikTok
Minooka Channahon Patch
Palm Coast Permits Online
Odawa Hypixel
<i>1883</i>'s Isabel May Opens Up About the <i>Yellowstone</i> Prequel
Women's Beauty Parlour Near Me
How Far Is Chattanooga From Here
Espn Expert Picks Week 2
Baseball-Reference Com
Premier Boating Center Conroe
Vichatter Gifs
Conduent Connect Feps Login
De Leerling Watch Online
Walthampatch
The most iconic acting lineages in cinema history
Lima Funeral Home Bristol Ri Obituaries
Eka Vore Portal
Most McDonald's by Country 2024
Skyward Login Jennings County
Fsga Golf
Holiday Gift Bearer In Egypt
Gotcha Rva 2022
Drift Hunters - Play Unblocked Game Online
Breckiehill Shower Cucumber
Renfield Showtimes Near Paragon Theaters - Coral Square
Craftsman Yt3000 Oil Capacity
Darktide Terrifying Barrage
Gideon Nicole Riddley Read Online Free
Ket2 Schedule
Msnl Seeds
Latest Nigerian Music (Next 2020)
Main Street Station Coshocton Menu
Uc Santa Cruz Events
Dollar Tree's 1,000 store closure tells the perils of poor acquisitions
Myanswers Com Abc Resources
Leena Snoubar Net Worth
Hireright Applicant Center Login
What Is A K 56 Pink Pill?
11526 Lake Ave Cleveland Oh 44102
2132815089
SF bay area cars & trucks "chevrolet 50" - craigslist
Post A Bid Monticello Mn
Valls family wants to build a hotel near Versailles Restaurant
Iman Fashion Clearance
Tyco Forums
Horseneck Beach State Reservation Water Temperature
Coleman Funeral Home Olive Branch Ms Obituaries
Bumgarner Funeral Home Troy Nc Obituaries
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 5894

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.