The Ledger Attack: draining hardware cryptowallets (2024)

Aftermath: How The Industry Reacted

Some users expressed anger at Ledger for failing to prevent the compromise, while others cautioned against the dangers of relying on third-party libraries.

The cybersecurity industry has a niche in cybercoin. Wallet draining campaigns are well-known, which mainly use phishing sites to deceive end-users. The usual SaaS business (Scam-as-a-Service) has specialized actors for wallet draining, like the scam vendor Inferno Drainer which announced stop-of-operations in Nov 2023. This seems to be a false flag anyway, according to recent activity seen in Dune’s @scamsniffer. The scheme they follow was explained by this Group-IB post:

And Now, Lessons Learned!

It is amazing how a hardware wallet, the epitome of crypto security, was breached simply by graining access to NPM credentials of a Ledger “former employee” (probably username/password without 2FA protection, or an access token). This incident serves as a striking reminder that when you are under fire, your software infrastructure needs to be protected with the same care as your software or hardware products.

Most software supply chain attacks begin by compromising an internal account (often for a developer or devops engineer). The attackers then either move laterally to breach internal systems in the software infrastructure like the CI/CD system or the deployment tools, or manage to add malicious logic to source code repositories, which could be detected if proper handling of changes with branch protection and code reviews are in place. But attackers do not need to go so deep when the target is a popular library published in a public registry, especially if they can gain access to publish (write) credentials. And this is what happened in this attack.

2FA authentication, specifically using robust elements like security keys, limits the risk with interactive operations. For CI/CD pipelines, access tokens with limited access stored as a CI/CD secret is the usual way to go (and the access token should not be leaked). Unfortunately, it seems that the employee did not have a robust 2FA set. NPM allows organizations to enforce 2FA (but this is optional, not the default), which is probably what Ledger should have. And do not forget to add appropriate credentials revocation procedures for former employees, especially with access to resources as critical as the NPM scope owned by the organization.

Version pinning for dependencies with reviewed version bumps is a practice that mitigates the spread of malicious dependencies. In the context of the Ledger incident, the versions of the library that the connect-kit-loader took from CDN should have been pinned, and “do not trust whatever the CDN throws”. Having a checksum verification e.g. via SRI (or even a digital signature scheme also authenticating the source) should be used when pulling from a CDN for dynamic code loading.

The rest is a story.

For the more conventional phishing campaigns directed to wallet users, the question is: What makes users fall into traps set by criminals and to confirm transactions they never intended to perform? The phishing sites in this domain are well designed and convincing, imitating popular crypto brands; and they also offer free tokens, minting NFTs and other rewards. Avoiding users to fall into such traps is a problem looking for a solution.

And to not forget the related cryptohacking attacks, a more general threat, where the adversaries take over cloud infrastructures to run miners for cryptocurrency, often for privacy coins like Monero XMR and Zcash, with hidden transaction histories. Cryptojacking is relevant because it may affect ANY organization, and though the profit for the attacker could be low, the cost for the victim could be large (Sysdig mentioned in this report that it takes $53 in cost for the victim organization for every $1 mined for the attacker).

References

The Ledger Attack: draining hardware cryptowallets (2024)
Top Articles
Find your lost phone - Chipolo
The Ultimate Guide to Peer to Peer File Sharing - Clinked
Rubratings Tampa
Enrique Espinosa Melendez Obituary
Napa Autocare Locator
Dr Lisa Jones Dvm Married
Devourer Of Gods Resprite
Carter Joseph Hopf
Jessica Renee Johnson Update 2023
Mid90S Common Sense Media
Culvers Tartar Sauce
The Binding of Isaac
My.doculivery.com/Crowncork
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Help with Choosing Parts
Elbasha Ganash Corporation · 2521 31st Ave, Apt B21, Astoria, NY 11106
Les Schwab Product Code Lookup
Lake Nockamixon Fishing Report
Sound Of Freedom Showtimes Near Cinelux Almaden Cafe & Lounge
Praew Phat
Rondom Ajax: ME grijpt in tijdens protest Ajax-fans bij hoofdbureau politie
China’s UberEats - Meituan Dianping, Abandons Bike Sharing And Ride Hailing - Digital Crew
Nz Herald Obituary Notices
Riversweeps Admin Login
Dark Entreaty Ffxiv
Temu Seat Covers
Kaliii - Area Codes Lyrics
Myaci Benefits Albertsons
Best Laundry Mat Near Me
Puffin Asmr Leak
Allegheny Clinic Primary Care North
WOODSTOCK CELEBRATES 50 YEARS WITH COMPREHENSIVE 38-CD DELUXE BOXED SET | Rhino
Publix Coral Way And 147
What are the 7 Types of Communication with Examples
Taktube Irani
Devargasfuneral
Jr Miss Naturist Pageant
Pitco Foods San Leandro
American Bully Xxl Black Panther
To Give A Guarantee Promise Figgerits
Planet Fitness Santa Clarita Photos
How Many Dogs Can You Have in Idaho | GetJerry.com
Ramsey County Recordease
Rhode Island High School Sports News & Headlines| Providence Journal
Vindy.com Obituaries
'The Nun II' Ending Explained: Does the Immortal Valak Die This Time?
Europa Universalis 4: Army Composition Guide
Headlining Hip Hopper Crossword Clue
Joy Taylor Nip Slip
Epower Raley's
Vrca File Converter
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6216

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.