15-Year-old Finds Flaw in Ledger Crypto Wallet (2024)

A 15-year-old security researcher has discovered a serious flaw in cryptocurrency hardware wallets made by Ledger, a French company whose popular products are designed to physically safeguard public and private keys used to receive or spend the user’s cryptocurrencies.

15-Year-old Finds Flaw in Ledger Crypto Wallet (1)

Ledger’s Nano-S cryptocurrency hardware wallet. Source: Amazon.

Hardware wallets like those sold by Ledger are designed to protect the user’s private keys from malicious software that might try to harvest those credentials from the user’s computer. The devices enable transactions via a connection to a USB port on the user’s computer, but they don’t reveal the private key to the PC.

Yet Saleem Rashid, a 15-year-old security researcher from the United Kingdom, discovered a way to acquire the private keys from Ledger devices. Rashid’s method requires an attacker to have physical access to the device, and normally such hacks would be unremarkable because they fall under the #1 rule of security — namely, if an attacker has physical access to your device, then it is not your device anymore.

The trouble is that consumer demand for Ledger’s products has frequently outpaced the company’s ability to produce them (it has sold over a million of its most popular Nano S models to date). This has prompted the company’s chief technology officer to state publicly that Ledger’s built-in security model is so robust that it is safe to purchase their products from a wide range of third-party sellers, including Amazon and eBay.

15-Year-old Finds Flaw in Ledger Crypto Wallet (2)

Ledger’s message to users regarding the lack of anti-tampering mechanisms on its cryptocurrency hardware wallets.

But Rashid discovered that a reseller of Ledger’s products could update the devices with malicious code that would lie in wait for a potential buyer to use it, and then siphon the private key and drain the user’s cryptocurrency account(s) when the user goes to use it.

The crux of the problem is that Ledger’s devices contain a secure processor chip and a non-secure microcontroller chip. The latter is used for a variety of non-security related purposes, from handling the USB connections to displaying text on the Ledger’s digital display, but the two chips still pass information between each other. Rashid found that an attacker could compromise the insecure processor (the microcontroller) on Ledger devices to run malicious code without being detected.

Ledger’s products do contain a mechanism for checking to ensure the code powering the devices has not been modified, but Rashid’s proof-of-concept code — being released today in tandem with an announcement from Ledger about a new firmware update designed to fix the bug — allows an attacker to force the device to sidestep those security checks.

“You’re essentially trusting a non-secure chip not to change what’s displayed on the screen or change what the buttons are saying,” Rashid said in an interview with KrebsOnSecurity. “You can install whatever you want on that non-secure chip, because the code running on there can lie to you.”

Kenneth White, director of the Open Crypto Audit Project, had an opportunity to review Rashid’s findings prior to their publication today. White said he was impressed with the elegance of the proof-of-concept attack code, which Rashid sent to Ledger approximately four months ago. A copy of Rashid’s research paper on the vulnerability is available here (PDF). A video of Rashid demonstrating his attack is below.

White said Rashid’s code subverts the security of the Ledger’s process for generating a backup code for a user’s private key, which relies on a random number generator that can be made to produce non-random results.

“In this case [the attacker] can set it to whatever he wants,” White said. “The victim generates keys and backup codes, but in fact those codes have been predicted by the attacker in advance because he controls the Ledger’s random number generator.”

Rashid said Ledger initially dismissed his findings as implausible. But in a blog post published today, Ledger says it has since fixed the flaw Rashid found — as well as others discovered and reported by different security researchers — in a firmware update that brings Ledger Nano S devices from firmware version 1.3.1 to version 1.4.1 (the company actually released the firmware update on March 6, potentially giving attackers time to reverse engineer Rashid’s method).

The company is still working on an update for its pricier Ledger Blue devices, which company chief security officerCharles Guillemet said should be ready soon. Guillemet said Nano-S devices should alert users that a firmware update is available when the customer first plugs the device into a computer.

“The vulnerability he found was based on the fact that the secure element tries to authenticate the microcontroller, and that authentication is not strong enough,” Guillemet told KrebsOnSecurity. “This update does authentication more tightly so that it’s not possible to fool the user.”

Rashid said unlike its competitors in the hardware wallet industry, Ledger includes no tamper protection seal or any other device that might warn customers that a Nano S has been physically opened or modified prior to its first use by the customer.

“They make it so easy to open the device that you can take your fingernail and open it up,” he said.

Asked whether Ledger intends to add tamper protection to its products, Guillemet said such mechanisms do not add any security.

“For us, a tamper proof seal is nothing that adds security to the device because it’s very easy to counterfeit,” Guillemet said. “You can buy some security seals on the web. For us, it’s a lie to our customers to use this kind of seal to prove the genuineness of our product.”

Guillemet said despite Rashid’s findings, he sees no reason to change his recommendation that interested customers should feel free to purchase the company’s products through third party vendors.

“As we have upgraded our solution to prove the genuineness of our product using cryptographic checks, I don’t see why we should change this statement,” he said.

Nevertheless, given that many cryptocurrency owners turn to hardware wallets like Ledger to safeguard some or all of their virtual currency, it’s probably a good idea if you are going to rely on one of these devices to purchase it directly from the source, and to apply any available firmware updates before using it.

15-Year-old Finds Flaw in Ledger Crypto Wallet (2024)

FAQs

15-Year-old Finds Flaw in Ledger Crypto Wallet? ›

Hardware wallet Ledger Nano S had a break in – teenage security expert, Saleem Rashid, found an issue with the “tamper-free” wallet. The story began on Nov. 2017, when Rashid reported a flaw to Ledger CTO, Nicolas Bacca, which could allow attackers to steal funds from wallet users.

What is the Ledger controversy? ›

In December 2023, Ledger, a renowned crypto hardware wallet manufacturer, experienced a significant security breach. This hack not only raised concerns over the safety of digital assets but also sparked debates about the security practices of companies within the crypto space.

What happened with Ledger wallets? ›

Ledger detected an exploit using Ledger Connect Kit on Thursday the 14th of December 2023. This exploit injected malicious code inside DApps that were using Ledger Connect Kit, tricking EVM DApp users into signing transactions that drain their wallets.

Can someone steal crypto from Ledger? ›

While we are confident that Ledger devices are designed to withstand all known vectors of attack, scammers are continually finding ways to use social engineering, phishing, and fraud tactics to trick crypto users to separate them from their hard-earned money.

Can Ledger be hacked physically? ›

Is the Ledger Nano S hardware wallet safe from hackers? As long as the hacker is not in possesion of the actual hardware wallet, it's not possible to hack it/obtain the private keys.

Is Ledger still trusted? ›

Ledger cold wallet is highly secure and reliable, thanks to its custom OS, SE chip, PIN code, and recovery phrase. Ledger Nano X supports a wide range of cryptocurrencies, including major ones like Bitcoin, Ethereum, and many altcoins.

How did the Ledger hack happen? ›

How was Ledger hacked? The data breach occurred due to unauthorized access to Ledger's e-commerce and marketing database through a third-party API used on Ledger's website.

Can Ledger wallets be traced? ›

Yes, you can trace crypto wallets via public transaction records on the blockchain, though identifying the actual owner may require additional information.

Is Ledger wallet a good idea? ›

Partners on this page provide us earnings. Ledger may very well be the #1 choice on the market. Both the Nano S and Nano X are sleek, affordable, user friendly and backed by tremendous support from Ledger HQ.

Does Ledger have access to my keys? ›

You must write down your 24-word recovery phrase precisely and in the correct order before storing it securely. Never enter your recovery phrase on any other device. Anyone who gets your recovery phrase can take your crypto assets. Ledger does not store your private keys, nor ever asks for it.

What happens to my crypto if Ledger goes bust? ›

How Would I Regain Access to My Crypto? In the worst-case situation where Ledger or Trezor are shut down, the retrieval process is the same as if your device had been lost or stolen. This is because neither operates in a closed system where your private keys are locked into a single device.

Is Ledger 100% secure? ›

All Ledger crypto wallets are powered by an industry-leading Secure Element chip, together with Ledger's proprietary OS that protects your crypto & NFTs from sophisticated hacks.

Can Ledger be hacked through Bluetooth? ›

Does Bluetooth affect the security of Ledger Nano X? The private keys never leave the secure chip, therefore Bluetooth communication (BLE) does not expose the Ledger Nano X to any additional security threat. The BLE connection is end-to-end encrypted to protect user privacy.

How do I make sure my Ledger is safe? ›

All Ledger devices pass the genuine check during the onboarding process and then each time when they connect to My Ledger in Ledger Live. Genuine Ledger devices hold a secret key that is set during manufacture.

Is the Ledger Nano S Plus safe? ›

How Safe is Ledger Nano S Plus? The Ledger Nano S Plus is known for its strong security features, making it a highly secure option for storing crypto. Here are some key features that highlight its security: Offline Storage (Cold Storage): The device provides cold storage, meaning it stores private keys offline.

Is Ledger update safe? ›

As long as your recovery phrase is securely stored, there is no risk to your assets. How to update a Ledger Nano?

How much does Ledger recover cost? ›

The service encrypts and splits a user's seed phrase into three parts, stored with three separate companies, ensuring safety even if one part is compromised. Ledger Recover comes with a monthly fee of $9.99 and offers up to $50,000 in compensation from Coincover if funds are stolen through the service.

What is the secret recovery phrase service Ledger wallet? ›

Ledger Recover is an ID-based key recovery service that provides a backup for your Secret Recovery Phrase. If you lose or don't have access to your Secret Recovery Phrase, the service allows you to securely restore your private keys using a Ledger device.

Top Articles
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 6491

Rating: 4.2 / 5 (73 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.