Ledger Researchers Uncover Seed Extraction Exploit on Trezor Wallets

Updated by Adam James

Donjon, a security research team at cryptocurrency firm Ledger, has publicly disclosed its attempts to evaluate the physical risks associated with products sold by its competitors. The hardware wallet manufacturer is specifically testing the Trezor One, Trezor Model T, and all other Trezor clones for potential vulnerabilities.

This evaluation was undertaken as part of a research project that aims to analyse the general security of hardware cryptocurrency wallets.

Trezor devices were chosen to be evaluated specifically because the company pairs open source firmware with closed source chips that include low-level functions hidden in the flash. Even though hardware wallets are universally regarded to be low risk, Donjon carried out the study to understand just how difficult breaching the security of a mainstream hardware wallets really is.

fake trezor

Attacking Hardware Wallets: An Inexpensive Affair?

The research team said that once a Trezor hardware wallet lands in the possession of a hypothetical attacker, they would be able to retrieve the master seed protected by the wallet quite easily unless the user had the presence of mind to set a strong passphrase. The researchers also found that the vulnerability could not be eradicated without a complete hardware overhaul of the wallet.

When the research team notified Trezor about the potential of a physical attack on their wallet, Trezor said that the attack was too specialized, unrealistic, and hard to reproduce. Part of the company’s dismissal of the claim was that disruption of the hardware security of the wallet would require expensive equipment.

The research team then set out to learn whether or not the physical security of the hardware wallet could be compromised with only limited resources. To achieve this, they redesigned the attack with inexpensive tools that can be easily obtained. A compact electrical board worth around $100 was designed to extract the master seed from the wallet within five minutes. This board can be connected to any computer with a simple USB cable.

Remedy Against Physical Attacks

The research team noted that users can prevent such attacks by adopting proper mitigation measures. This includes setting a long and complicated passphrase, making brute force attempts significantly more difficult for inexpensive homebrew hardware. The research team recommended users to set up a passphrase comprising of thirty-seven random characters to ensure complete security.

In response to the findings of the research team, Trezor added that its main focus was to protect users against remote security attacks. Trezor reaffirmed the need to set a strong passphrase to guarantee security against any physical attacks to the hardware wallet.

With the information provided by the research team at Ledger, do you think hardware wallet manufacturers should do more to protect users from physical attacks? Let us know your thoughts in the comments below. 

Disclaimer

All the information contained on our website is published in good faith and for general information purposes only. Any action the reader takes upon the information found on our website is strictly at their own risk.