TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Case study: fake hardware cryptowallet

206 pointsby freerkabout 2 years ago

29 comments

TacticalCoderabout 2 years ago
Another nasty supply chain attack exists, way simpler (unlikely to work on knowledgeable users though)... A legit hardware wallet is shipped, but with fake documentation accompanying it. Some evil people working for delivery companies would swap legit hardware wallet for the exact same model, but with documentation using the official company&#x27;s logo and font and saying, basically:<p><i>&quot;Here&#x27;s your hardware wallet, initialize it with the seed written on this piece of paper, it&#x27;s the only one that&#x27;s going to work for this hardware wallet. Do not lose this seed or you&#x27;ll lose access to your funds!&quot;</i>.<p>Several unsuspecting users, not aware that a random seed is supposed to be generated by the hardware wallet (or by throwing dice, or whatever) have been pwned this way.
评论 #35955538 未加载
评论 #35956269 未加载
评论 #35955788 未加载
评论 #35957598 未加载
themagicianabout 2 years ago
Incredible. This is so sophisticated and takes so much effort it makes you wonder just how many other wallets are compromised from before you even use them. There are so many other low effort attacks you can run that the fact that people are doing THIS really makes me wonder just how many wallets out there are 100% compromised.<p>It would be trivial for any iOS-based software wallet to compromise your seed before your private key before is even created. You don&#x27;t even need fancy spyware that calls home. If the seed is generated from a method that isn&#x27;t random you&#x27;d never know. It will appear random to you, but the author of the software could simply increment on a known value and be able to recreate every private key ever created with that app. No one would ever know. The attacker could sit silent for years or even decades, and if they DID drain a wallet there would be no way to prove it and no one would believe the victim. It would just be a case of, &quot;Well, you must have leaked your seed, it&#x27;s your fault.&quot;<p>I can even see something like Coinbase Wallet being 100% compromised. The apology post is probably already written in a draft somewhere.
评论 #35955312 未加载
评论 #35956445 未加载
评论 #35955894 未加载
评论 #35957590 未加载
dborehamabout 2 years ago
Title seems misleading (and isn&#x27;t the article title). It implies that Trezor is a fake wallet. The article is actually about a wallet that purports to be made by Trezor but is in fact not (hardware supply chain attack).
评论 #35957065 未加载
评论 #35955237 未加载
somatabout 2 years ago
&quot;choose models with special versions of protected microcontrollers&quot;<p>I don&#x27;t see how this is helpful advice.<p>The whole point of the article was how the look and feel of a legitimate hardware wallet was cloned.<p>Under these circumstances there is no way to tell what is in the device(clear housing perhaps?). all it has to do is act like the real device. It does not matter how good your security chip actually is if all I have to do is copy the correct interface.<p>Unrelated: the use of that particular version is a strangely shoddy mistake. It should have been very easy to use a version string that exists. In which case that version would never have been skipped??? perhaps at one point that was a real version and trezor pulled it due to it&#x27;s use in a batch of clone units.
评论 #35958194 未加载
评论 #35956953 未加载
lisperabout 2 years ago
I foresaw this years ago, which prompted me to build this:<p><a href="https:&#x2F;&#x2F;sc4.us&#x2F;hsm&#x2F;" rel="nofollow">https:&#x2F;&#x2F;sc4.us&#x2F;hsm&#x2F;</a><p>It&#x27;s an HSM which you can flash yourself. Unfortunately, it never generated much interest and so I had to fold up the tent. But maybe it was just ahead of its time.
评论 #35956031 未加载
评论 #35957215 未加载
评论 #35955793 未加载
munificentabout 2 years ago
<i>&gt; The bootloader checks the digital signature of the firmware and, if an anomaly is detected, displays an unoriginal firmware message and deletes all the data in the wallet.</i><p>This seems like a horrendous design, like a safe that burns the money inside if you try to tamper with it. Sure, it might protect a malicious thief from absconding with the funds, but it is also an <i>attack vector</i> for any bad actor that simply wishes to cause you harm.
评论 #35955713 未加载
评论 #35955673 未加载
评论 #35955723 未加载
评论 #35955751 未加载
评论 #35956396 未加载
评论 #35958943 未加载
Scoundrellerabout 2 years ago
&gt; The housing was difficult to open: its two halves were held together with liberal quantities of glue and double-sided adhesive tape instead of the ultrasonic bonding used on factory-made Trezors.<p>Other than having x-ray vision, one easy (but by no means perfect) verification to thwart these types of attacks is to weigh your devices.<p>Manufacturing should be consistent enough that resealing a device like this would be adding some grams that shouldn’t be there. And unlike something like a cisco router, nothing to cut out to make up for the added weight.
评论 #35955452 未加载
gnatmanabout 2 years ago
I’m far from an expert and don’t own any cryptocurrency but I can’t imagine buying a hardware wallet from a “popular classifieds website”, i.e. ebay.
评论 #35955906 未加载
评论 #35958672 未加载
roland35about 2 years ago
This just is another example to me how absurd it is to use crypto as a practical currency. There is no recourse for compromising your private key, and no way to know for sure that only you have a private key.
doolsabout 2 years ago
&gt; The main safeguard is to buy your wallet directly from the official vendor and choose models with special versions of protected microcontrollers (even original Trezors aren’t ideal in this sense: there are other brands’ wallets with better protected chips and extra protection mechanisms).<p>Yet another hilarious example of where a the solution to security in an alledgedly trustless system designed to subvert authority comes down to ... trust and authority.
评论 #35955767 未加载
lxgrabout 2 years ago
For physically hardened devices, this attack vector can be mitigated quite efficiently by including an attestation key with each device and validating that after taking possession (or ideally before any interaction). At least one competitor does that.<p>To my knowledge, current Trezor devices are unfortunately not (sufficiently) key extraction proof, though; in that scenario, attackers might be able to extract the private attestation key of a legitimate device and then go on to impersonate it in their own version.<p>This again could be mitigated by e.g. making the attestation key device-unique and offering an online validation service (which could keep track of unusual verification patterns and alert users), but it&#x27;s not an easy problem to solve.
评论 #35956382 未加载
monero-xmrabout 2 years ago
If you want a hardware wallet, I recommend software in an air-gapped machine. Unless you can buy the hardware directly from the manufacturer, and ideally you walked into the factory and bought it at the source, the risk of compromise is too great.
评论 #35955740 未加载
评论 #35955256 未加载
评论 #35955816 未加载
评论 #35955485 未加载
mrbabout 2 years ago
I would be immune to this attack because I <i>always</i> generate my own seeds, on a trusted computer. So I set up hardware wallets to import my seed, instead of trusting their seed generation algo. Of course this procedure doesn&#x27;t protect against other hardware attacks, for example the wallet exfiltrating the private key somehow (R&#x2F;F signal), but it certainly raises the bar for hackers.
评论 #35959401 未加载
评论 #35956383 未加载
评论 #35958604 未加载
drexlspiveyabout 2 years ago
What would have prevented this attack is the following:<p>Use a little bit of python (there are libraries for this or you can do it yourself) to make sure that the addresses generated in the HW wallet by the 12 word mnemonic are indeed the correct addresses. For example the first segwit address using your private key and the derivation path 49h&#x2F;0h&#x2F;0h&#x2F;0&#x2F;0 should be deterministic. This way you know your 12 words are the ones used and the wallet is using known standards and not some homebrew crypto.<p>In fact you should always do that anyway in case the HW stops working and&#x2F;or the company goes under. This way you can be sure that you can recreate your private keys from your mnemonic and access your funds no matter what.
评论 #35962429 未加载
dyejeabout 2 years ago
It seems kinda foolish to buy a second hand crypto wallet.
barbazooabout 2 years ago
Somewhat related, I was recently pointed to a cool video about someone hacking a Trezor One. Very enjoyable watch.<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=dT9y-KQbqi4&amp;pp=ygULdHJlem9yIGhhY2s%3D">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=dT9y-KQbqi4&amp;pp=ygULdHJlem9yI...</a><p>&gt; I was contacted to hack a Trezor One hardware wallet and recover $2 million worth of cryptocurrency (in the form of THETA).
kosherhurricaneabout 2 years ago
My #1 argument against the feasibility of cryptocurrency: Can my parents not their get money stolen?
评论 #35957217 未加载
评论 #35959374 未加载
KryDosabout 2 years ago
Does it mean that at the moment of releasing 2.0.4 the Trezor team already knew there is a fake firmware circling around?<p>I wonder if Trezor team communicated that in some maybe different way than that line in the CHANGELOG. Not blaming them of course, just wondering.
评论 #35955862 未加载
评论 #35955398 未加载
paulpauperabout 2 years ago
<i>Easy to steal and cash out, сryptocurrency is one of the most attractive digital assets for attackers.</i><p>Has the author tried cashing out crypto? KYC anyone? It&#x27;s harder than ever to cash out ,especially large sums. So many restrictions due to fraud.<p>Hardware wallets are never safe. the only safe way is to generate your own entropy, key derivation. Why would you ever trust a 3rd party to generate your keys?
hgsgmabout 2 years ago
With crypto, you get to cut out the middle man and be your own bank.<p>You have fraud team and IT security team on your staff, right?
magnatabout 2 years ago
What if each genuine unit would have entire PCB covered in glitter nail polish at factory? Based on a serial number of your device, you could check if a pattern on your device matches the one taken by manufacturer right after assembling the device.
stevageabout 2 years ago
Would someone be able to spell out how this attack works after initialisation? I don&#x27;t really understand hardware wallets. How does the information about the user and their key make its way back to the people who created the device?
评论 #35956691 未加载
评论 #35957622 未加载
lisbon44about 2 years ago
&gt; Intentionally skipped this version due to fake devices<p>uh oh! does this imply something is up that the trezor developers know of?
评论 #35956281 未加载
garyfirestormabout 2 years ago
Would the firmware update fail? if the user had decided to update it? Wouldn&#x27;t that raise a suspicion?
评论 #35955093 未加载
评论 #35955850 未加载
MagicMoonlightabout 2 years ago
And how is this better than just using regular money?
hamzatahaabout 2 years ago
Casa
BobTheDestroyerabout 2 years ago
Trezor has additional checks that aren&#x27;t covered here. I&#x27;d really like to know how those were defeated. Especially:<p>&gt; All Trezor devices are distributed without firmware installed - you will need to install it during setup. This setup process will check if firmware is already installed on the device. If firmware is detected then the device should not be used.<p>&gt;The bootloader verifies the firmware signature each time you connect your Trezor to a computer. Trezor Suite will only accept the device if the installed firmware is correctly signed by SatoshiLabs. If unofficial firmware has been installed, your device will flash a warning sign on its screen upon being connected to a computer.<p><a href="https:&#x2F;&#x2F;trezor.io&#x2F;learn&#x2F;a&#x2F;authenticate-model-one" rel="nofollow">https:&#x2F;&#x2F;trezor.io&#x2F;learn&#x2F;a&#x2F;authenticate-model-one</a><p>There seems to be an element of user carelessness and naivety here. Anyone who follows Trevor&#x27;s hardware verification checks surely needn&#x27;t worry about these attacks.
评论 #35955692 未加载
评论 #35955717 未加载
评论 #35955639 未加载
评论 #35956450 未加载
评论 #35956569 未加载
RadixDLTabout 2 years ago
does Kaspersky still work for the Russian government?
LarsDu88about 2 years ago
Nice article, but are we sure we want to elevate the status of FSB founded and funded Kapersky labs on the front page of HN?
评论 #35955412 未加载