Close Menu
    X (Twitter)
    Blockchain Journal
    • News
      • Blockchain News
      • Bitcoin News
      • Ethereum News
      • NFT
      • DeFi News
      • Polkadot News
      • Chainlink News
      • Ripple News
      • Cardano News
      • EOS News
      • Litecoin News
      • Monero News
      • Stellar News
      • Tron News
      • Press Releases
      • Opinion
      • Sponsored
    • Price Analisys
    • Learn Crypto
    • Contact
    • bandera
    Facebook X (Twitter) Instagram
    Blockchain Journal
    Home » The company Ledger announced a number of vulnerabilities in hardware wallets Trezor

    The company Ledger announced a number of vulnerabilities in hardware wallets Trezor

    0
    By BlockchainJournal on March 11, 2019 News
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The leading manufacturer of cryptocurrency hardware wallets Ledger spoke about the vulnerabilities identified in the devices of his direct competitor Trezor. This is stated in a message distributed by the French company on Monday, March 11.

    As previously mentioned, @BreakerMag toured our competitor.

    Here is a detailed overview of these vulnerabilities: https://t.co/sW1rxH3lwP

    – Ledger (@Ledger) March 11, 2019

    The Ledger study states that the vulnerabilities were discovered by employees of Attack Lab, a division of the company, which, to increase security, hacks both its own wallets and competitors' devices. Representatives of Ledger claim that they have repeatedly contacted Trezor regarding the weak points in their Trezor One and Trezor T wallets, and after the disclosure period ended, they decided to make them public.

    The first problem is related to authenticity of devices. As Ledger claims, the Trezor device can be simulated by hacking it with malware, and then resealing it in a box, forging a sticker designed to protect against unauthorized access. The latter, said the French company, is easy to remove. It is also claimed that this vulnerability can be eliminated only by reformatting the entire design of Trezor wallets, in particular, by replacing one of the main components with the Secure Secure chip.

    Secondly, Ledger hackers were able to pick up a PIN on a Trezor wallet using an attack on a third-party channel, as reported by Trezor in late November 2018. Later, the company solved this problem in its firmware update 1.8.0.

    The third and fourth vulnerabilities, which Ledger also proposes to eliminate, replacing the main component with the Secure Element chip, are the possibility of stealing confidential data from the device. Ledger claims that an attacker with physical access to Trezor One and Trezor T can extract all data from flash memory and gain control over the assets stored on devices.

    The last discovered weakness is also related to the Trezor security model: as stated by Ledger, the Trezor One cryptographic library does not contain adequate countermeasures against hardware attacks. It is alleged that a hacker with physical access to the device can extract the secret key through an attack on a third-party channel, although Trezor claimed that his wallets are resistant to such an attack.

    It is noteworthy that in November 2018 Trezor representatives themselves warned that an unknown third party was distributing individual copies of their flagship device, Trezor One, urging users to buy wallets only through their official website.

    However, in its report, Ledger claims that users cannot be sure, even if they buy equipment on the Trezor website. An attacker can buy multiple devices, hack them, and then send them back to the manufacturer for compensation. Ledger researchers conclude that if a compromised device is resold, user cryptocurrencies may be stolen.

    Recall that in December cyber specialists from Wallet.fail discovered a number of vulnerabilities in both Trezor and Ledger devices, managing to launch a series of successful attacks. In response, representatives of Ledger said that the findings of the researchers do not correspond to reality . In turn, Trezor said that he acknowledged the existence of the vulnerability, but stressed that in order to use it, the attacker must have physical access to the victim's device.

    Representatives of Trezor have not yet commented on the latest conclusions of Ledger.

    Subscribe to BlockchainJournal on Facebook !

    << aside id = "unisender_subscribe_form-10" class = "widget unisender_form">

    BlockchainJournal.news

    BlockchainJournal.news

    Employees Featured Ledger Report Trezor
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    BlockchainJournal

    Related Posts

    ARK Invest Unloads Coinbase and GBTC Shares by Millions Amid Market Boom

    December 6, 20232 Mins Read

    GBTC Discount Shrinks as Bitcoin Price Surges

    December 6, 20232 Mins Read

    IBM Introduces OSO, Designed for Cold Storage of Digital Assets

    December 6, 20232 Mins Read

    Marathon Digital Produced 1,187 Bitcoins in November and Held 14,025 Unrestricted BTC

    December 5, 20232 Mins Read

    Volume Counterfeiting Allegations Rock RATS Token on Gate Exchange

    December 5, 20232 Mins Read

    A New Era for Cryptocurrency: Zodia Custody’s Integration with Harmonize

    December 4, 20232 Mins Read

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 Blockchain Journal

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.