Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
The battle of the hardware wallets is heating up. At this weekendâs MIT Bitcoin Expo in Boston, Charles Guillmet, Chief Security Officer of Ledger, presented a number of physical attacks that could be executed against Trezor hardware wallets. He also outlined an attack on their rivalâs device that Ledger has refrained from making public because it is not patchable.
Also read: How the Worldâs Leading Banks Help Launder $2 Trillion a Year
Ledger CSO Runs a Train on Trezor
Like any self-respecting hardware wallet (HW) manufacturer, Ledger rigorously pen tests its own devices in search of potential vulnerabilities. The French firmâs Paris hacking lab, known as the âLedger Donjon,â doesnât just dissect its own wares: it also thoroughly attacks those of its fiercest rival, Trezor. While identifying and disclosing a competitorâs vulnerabilities might seem counterintuitive, it yields a brace of benefits, highlighting potential weaknesses in the opposition and emphasizing Ledgerâs offensive prowess.
Within hours of Ledger CSO Charles Guillmet presenting at MIT Bitcoin Expo 2019, where he described the Trezor One, Trezor T, Keepkey, and B Wallet as âcompletely broken,â insisting there was âno way to fixâ their security flaws, his employer published âOur Shared Security: Responsibly Disclosing Competitor Vulnerabilities.â The article explains how âabout four months ago we contacted Trezor to share five vulnerabilities our Attack Lab uncovered. As always, we gave Trezor a responsible disclosure period to work on these vulnerabilities, even granting them two extensions.â
With the disclosure period having now expired, Ledger proceeds to gleefully reveal what it found upon pen testing its rivalâs devices.
4 Vulnerabilities Fully Disclosed
In total, Ledger claims to have found four major vulnerabilities in Trezorâs flagship wallets. The first of these concerns the âgenuinenessâ of the device. Trezor HWs have previously been shown to be susceptible to cloning, prompting the company to improve its tamper-proof stickers and to provide guidelines on how to detect ersatz devices. Trezorâs response to this âvulnerabilityâ was to point out that users will not be exposed to this risk provided they purchase devices directly from the Trezor website.
Fake Trezor on the left, authentic Trezor on the right
The second attack identified involved a weakness in the PIN number used to secure Trezor HWs. Ledger explained: âOn a found or stolen device, it is possible to guess the value of the PIN using a Side Channel Attack.â This entails entering a random PIN and then measuring the power consumption of the device when it compares this code with the actual value of the PIN. âThis measurement allows an attacker to retrieve the correct value of the PIN within only a few tries (less than 5 in our case),â reported Ledger. âWe found that the PIN does not protect the funds against an attacker with physical access to the device.â
The final two vulns involve the confidentiality of the data stored within the devices, primarily the private key and the seed. This exploit, involving the flash memory, was deemed the most serious since âit can only be circumvented by overhauling the design of the Trezor One / Trezor T, and replacing one of its core components to incorporate a Secure Element chip, as opposed to the general purpose chip currently used.â Ledger continued:
This vulnerability can not be patched â for this reason, we have elected not to disclose its technical details. It could also be mitigated by users adding a strong passphrase to their device.
A fifth, less serious, vulnerability was also disclosed. Trezor released firmware security updates last week, which it acknowledged to have been discovered by Charles Guillemet and the Ledger Donjon team. It stressed that exploiting the vulnerabilities required physical access to the device, adding that there is no evidence to suggest âany of these vulnerabilities have ever been exploited outside of the lab to extract any data.â Last week, Twitter and Square CEO Jack Dorsey revealed that he had purchased a Trezor hardware wallet.
What are your thoughts on Ledger pen testing its rivalâs devices? Let us know in the comments section below.
Image credits: Ledger, Pixabay, and Trezor.
Need to calculate your bitcoin holdings? Check our tools section.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.