Improving the Ecosystem: Disclosing KeepKey’s PIN Vulnerability

2020-5-19 16:05

In the world of cryptocurrencies, we all have a responsibility to ensure the highest level of security for these valuable assets. Our main goal at Ledger is to provide this for our own devices. However, we equally try to do our part in elevating the overall level of security for the entire cryptocurrency market.

Our Shared Responsibility

We all have a shared responsibility in keeping the cryptocurrency ecosystem secure. When a major hack or theft takes place, it affects everyone who participates in the cryptocurrency market. In order to push crypto adoption and gain the trust of critics, the security level in the market needs to continuously be challenged and increased.

In our aim to establish the highest security standard, our team of world-class security experts first and foremost try to break into our own devices and enhance the level of protection that Ledger devices bring. As a secondary objective, we also review the security of other actors in the cryptosphere to help elevate their level of security as well. Naturally, this is disclosed responsibly to allow the vendors time to fix the vulnerability. This has previously resulted in several companies in the cryptocurrency market such as Ellipal and HTC to have patched vulnerabilities and enhanced the security of their devices.

Unfortunately, however, if a fix for a vulnerability is not found, we do carry the burden of having to inform users of potential risks. By informing them, they can follow certain best practices to prevent becoming a victim of theft. Equally, it could limit the amount of potential victims.

The Vulnerability

While indeed KeepKey devices are equally vulnerable to recovery phrase extraction in a similar fashion as Trezor, in this article we’ll be instead focusing on a different vulnerability concerning PIN verification.

Before getting into it, do be reassured that it concerns a physical vulnerability. ShapeShift, the company behind KeepKey, has stated in a response that “KeepKey’s job is to protect your keys against remote attacks”. That’s fair, and indeed this is still the case to our knowledge.

That said, we do have to conclude that aside from the recovery phrase being vulnerable to extraction, it is equally possible to extract a KeepKey’s PIN code through a physical vulnerability. This means that if someone manages to take your device, they could unlock your device without needing your PIN code. 

The Details

The following explanation of this vulnerability is a more simplified version. You can find the Donjon’s full work with high-level technical details in this article. That said, hold onto your hats, the following part will still get a tad bit technical.

The type of attack used for this vulnerability is called a Side Channel Attack. This is an attack path that requires physical access to your device. In a nutshell, Side Channel Attacks look at physical changes based on the action the device is trying to process. For example, entering the number 9 for your PIN code might give a different voltage output on a specific circuit versus entering the number 4.

For the analysis part, the Donjon team has used their self-developed Lascar. This highly advanced tool is used to analyse the code that is running on the chip. Then for the actual Side Channel Attack, the Donjon team connected the KeepKey device to their equally self-created evaluation board called Scaffold. Both of these expertly designed tools are completely open-sourced.

The PIN number is cryptographically mixed with secret data stored inside KeepKey’s memory. For each secret value, the voltage inside the KeepKey’s chip differs. Having tested each possible secret data multiple times, the Donjon team was able to establish a database that shows how each of these secret values compares to its voltage output.

After this, the database can be used to recover the secret data of any KeepKey device. One can connect the KeepKey device to read the chip’s voltage and compare the output to that of the database. This secret data can then be used to reliably recover the PIN code.

The Workaround

Thankfully, ShapeShift was able to enhance KeepKey’s security and has since released firmware version 6.4.1, which has patched this vulnerability. So long as you have updated your KeepKey’s firmware, you should be fine in regards to the PIN extraction vulnerability. 

Equally if using an older firmware version, there are still two things that you can do. Firstly, you could make sure that your KeepKey device is out of anyone’s reach at all times. Physical attacks can simply not be performed if no one has access to your device. For another, using a strong passphrase (preferably over 37 characters) is recommended. This way, even if one were to unlock your KeepKey hardware wallet, they’d still not be able to access the cryptocurrencies secured behind the passphrase.

Unfortunately, entering the passphrase is done in a similar fashion as the Trezor One: it’s entered through a computer. This means that if your computer is compromised, an attacker could spy on you entering your passphrase. 

At any rate, it does provide additional security to protect against physical attacks on your KeepKey device, so it is recommended to use a passphrase. This equally helps protect the assets on your KeepKey further against the recovery phrase extraction vulnerability. While the recovery phrase extraction vulnerability seems to be completely unfixable, the PIN code Side Channel Attack vulnerability has thankfully since been fixed in the latest firmware version.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

Level Up Coin (LUC) на Currencies.ru

$ 7.53E-5 (+0.68%)
Объем 24H $0
Изменеия 24h: 1.94 %, 7d: 12.29 %
Cегодня L: $7.53E-5 - H: $7.53E-5
Капитализация $75.097k Rank 1896
Цена в час новости $ 2.48E-5 (203.63%)

level security devices ledger provide however own

level security → Результатов: 126


Statizex ICO

We defined our development strategy based on empirically acquired knowledge and on the analysis of the work of existing platforms. We spent a lot of time, effort and money developing the statizex platform, faced many challenges and solved many technological issues during its creation, this allowed us to develop a trading platform that fully meets the modern market requirements and high modern technological standards of speed and safety.

2019-10-24 21:03


Ledger continues its security certification program with Ledger Nano X

The Ledger Nano X receives CSPN (First Level Security Certificate) certification issued by ANSSI (National Agency for Information Systems Security).  Following the Ledger Nano S announcement a few months ago, this makes both Ledger Nano X and S the only hardware wallets to be certified, according to the security requirements specified in the CSPN security […]

2019-12-12 16:59


Cybercriminals are targeting healthcare companies with phishing campaigns to steal sensitive data

Healthcare providers are facing an unprecedented level of social engineering-driven malware threats, according to new research. The findings — disclosed by California-based enterprise security solutions provider Proofpoint US — discovered at least 77 percent of email attacks on the medical sector during the first three months of 2019 involved the use of malicious links.

2019-10-9 19:00


Liberty ICO

Liberty ERC20 Token is a cryptocurrency designed to be extremely rare and thus hold a larger store of value per unit than conventional cryptocurrencies such as Bitcoin. Liberty ERC20 Token was designed to be a storage of wealth in the same way Bitcoin and another level of Security was added.

2019-10-3 18:03


Gominer ICO

Gominer Token is a Peer-to-Peer token that has a sophisticated level of security for a multi-functional digital currency and for all future use expansion. The token is created to help our user to interact and expand the way of their earning in Cloud mining.

2019-7-28 17:33


Dash CEO reveals latest strategies to improve much needed mainstream adoption

Some cryptocurrencies are technically superior on the back end. Some are based on a blockchain network that attains a high level of security and privacy. Another virtual asset facilitates rapid transactions but none of these factors would translate to the digital currency’s success if their adoption rates do not reach a widespread userbase.

2019-7-22 01:00


Dash’s Ryan Taylor reveals latest strategies to improve much needed mainstream adoption

Some cryptocurrencies are technically superior on the back end. Some are based on a blockchain network that attains a high level of security and privacy. Another virtual asset facilitates rapid transactions but none of these factors would translate to the digital currency’s success if their adoption rates do not reach a widespread userbase.

2019-7-22 01:00


SEC Looks for Enterprise Level Blockchain Data Subscription to Counter Risk

The US Security and Exchange Commission (SEC) is looking for Enterprise Level blockchain data subscription to provide clarity to a number of businesses operating in the blockchain space and many who are looking to start a business, but the lack of transaprency on the guidelines deter them from doing so. The SEC has surely made […]

2019-7-6 21:42


[Security Alert] Update Firefox Browser Now as Hackers Exploit a Serious Bug Targeting Major Crypto Exchanges Users

Mozilla has issued a security alert warning that hackers are taking advantage of a serious bug in their Firefox browser, which can be used to take over the entire computer. The company has warned that crypto owners face the highest level of an imminent attack, the Next Web reports. Firefox users have been asked to […]

2019-6-19 21:03


Sidechains vs Plasma vs Sharding

Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions.

2019-6-14 04:03


Bitcoin [BTC] needs to convince nations that adoption rewards outweigh risk of attacking BTC, claims analyst

Bitcoin [BTC] does not have a physical form, making the virtual currency both an efficient and vulnerable asset. The vulnerability and security aspect of Bitcoin has been debated in the past, with many speculating what would happen to it in the face of a nation-state level attack that could possibly jeopardize the network.

2019-6-11 08:55


Фото:

Bitfinex Scraps Its $10,000 Minimum Balance Rule

Bitfinex is now open to every trader as the Hong Kong-based cryptocurrency exchange has removed its $10,000 minimum balance rule. Citing a rising demand from retail traders who couldn't trade on the platform due to the requirement, Bitfinex CEO Jean-Louis van der Velde said the platform is now ready for a “new wave of customer accounts,” according to a company Medium post.

2019-4-11 21:50


Universal, Multi Token Wallet Announced by Midas Protocol – Integrates IDEX and Kyber Network

Like any currency, cryptos need a place to be stored by people. As the technical equivalent of fiat personal storage, these digital and hardware storages are aptly called e-wallets. With a large number of wallets for cryptocurrencies in the market, the selection process for users relies on the level of security, ease of access and use case.

2019-3-25 09:29


First Level Security Certificate (CPSN) Given To Crypto Wallet Ledger Nano S By France’s ANSSI

First Level Security Certificate (CPSN) Given To Ledger Nano S By France’s ANSSI Ledger Nano S was originally developed by the French crypto hardware wallet Ledger. Having already planned on fixing issues with the firmware update for this product, impacting the storage capacity of the device, it looks like the Ledger Nano S is making […]

2019-3-19 22:45