Pegasus Spyware: Is Your Crypto Secure?

2021-8-3 11:03

The following article summarizes the technical blog recently published by the Ledger Donjon team. You can click here to read it.

Software programs designed to hack our personal devices are getting more and more sophisticated. The Pegasus spyware scandal highlights the threat this software poses to our technology and information. 

Spyware have also gained the attention of the crypto industry, as an increasing number of users and investors rely on software wallets running on unsafe computers and smartphones. Web3 digital assets, such as Bitcoin or Ethereum, should not be stored on Web2 devices (laptops and smartphones). This article explains why.

“Zero-days” & “zero-clicks” spyware proliferates

In 2020, investigative reporters revealed that tens of thousands of citizens, activists, and political leaders were targeted by clients of the spyware maker, NSO Group. Recently, the spyware became a true diplomatic scandal with the revelation that 14 heads of States and governments were former targets, including President Macron of France and King Mohammed V of Morocco. The spyware provided full access to their smartphones.

How did this spyware become such an insidious surveillance tool? Simply because of a mix of “zero-day” and “zero-click” features. But what does that mean, exactly? 

A “zero-day” attack occurs when hackers exploit a vulnerability in an app or device unknown to the vendor of the target software. In the Pegasus spyware case, entry points are messaging apps (iMessage, WhatsApp, SMS…). 

On the other hand, a “zero-click” attack exploits vulnerabilities without requiring a target to click anywhere. These vulnerabilities gave the attacker almost complete access to targeted devices and their data: camera, microphone, geolocation, images, conversations, etc. 

A “zero-day zero-click attack” is a combination of the two above. Worried, yet?

These attacks harm your digital assets, too 

Unfortunately, “zero-day” and “zero-click” attacks are not limited to Pegasus spyware. If you thought your software wallets were inherently secure, think again. The following videos show how easily our Ledger Donjon Team was able to hack smartphones and access the seed phrases of MetaMask, Coinbase, and Blockchain.com software wallets.

The next video simulates a malware that steals the user password entered by the victim. It is then used to decrypt the Electrum wallet data and to display the seed.

The following video highlights malware disguised as a fake Bitcoin ticker widget. Malware exploits a device vulnerability to exfiltrate the encrypted seed to a remote server. The server then bruteforces the password to decrypt the seed: 

The next video shows an equivalent process with a Coinbase Wallet:

This last video demonstrates spyware targeting a Blockchain.com wallet. Once user has authenticated using the victim fingerprint, encryption key is unlocked and wallet data is decrypted: 

Overall, the process is actually quite simple. The hacker sends you a message without you being notified. The message exploits a vulnerability allowing the attackers to spy on your app and exfiltrate your seed phrase through the internet. The hacker then sends the seed back to their own computer. No click is needed and it’s a malicious exploit, to say the least. 

As for your crypto? Gone.

The lesson is clear: don’t put your Web3 digital assets on Web2 devices like laptops and smartphones! They’re not secure by design, meaning they run on software programs (iOS or Android) that don’t allow you to leave your belongings in a safe enclave. 

Why safety in crypto needs to be hardware-based?

The crypto universe is full of treasure, but one’s adventure should ALWAYS be safe. Here’s why our hardware wallets, Ledger Nano S and Nano X, are the most secure storage solutions for your digital assets:

First, they protect you against malware, by design. Our hardware wallets are independent devices that sign transactions on their own. The cryptographic materials of private keys always stay inside the device. They are never sent to the application they communicate with. Hence, your keys are kept offline where malware can’t access them.  Second, our devices embed a screen allowing you to verify your actions when you interact with your secret keys. When you make transactions on a mobile phone or desktop computer, malware can access your information or even swap/modify your addresses. Our on-device authentications are very efficient countermeasures.

Offline keys and on-device authentications are critical tools for fully securing digital assets on hardware devices. 

Conclusion:

As cryptocurrencies become more common, attacks against wallets will, unfortunately, become more and more sophisticated. At Ledger, we aim to bring you the most secure experience when managing your digital assets.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

Simple Software Solutions (SSS) íà Currencies.ru

$ 0 (+0.00%)
Îáúåì 24H $0
Èçìåíåèÿ 24h: 0.00 %, 7d: 0.00 %
Cåãîäíÿ L: $0 - H: $0
Êàïèòàëèçàöèÿ $0 Rank 99999
Öåíà â ÷àñ íîâîñòè $ 0.1322 (-100%)

software programs click designed getting sophisticated devices

software programs → Ðåçóëüòàòîâ: 26


BlackBerry’s Cylance: Malicious Code Used By Hackers In WAV Audio Files To Mine Cryptos

Researchers of BlackBerry Cylance – a software company that creates anti-virus programs, uncovered a malicious code used by hackers to mine digital currencies in WAV audio files. Each WAV file was combined with a loader part for decoding and executing the infected content while subtly work through the data of the audio file. At the […]

2019-10-18 18:26


Introducing Pardon the Intrusion, our new cybersecurity newsletter

The theory that underpins computer viruses was first made public in 1949, when computer pioneer John von Neumann presented a paper titled “Theory and Organization of Complicated Automata. ” In the paper, von Neumann speculated that computer programs could reproduce themselves — effectively describing the most basic form of a malevolent virus you often hear about now.

2019-9-25 17:13


Ôîòî:

Better testing could solve most tech problems, so why aren’t companies doing it?

The headlines are packed with stories of high-tech gadgets, apps, and video games failing to meet consumer expectations due to performance failures or otherwise disappointing features. Samsung smartphones have been exploding, Nintendo Joy-Cons eventually run into a drifting problem, and countless apps and software programs have launched riddled with bugs.

2019-7-30 20:15


Hospitality Total Solution (HTS) Software Picks Qiibee Loyalty Blockchain Protocol as Partner

A Swiss loyalty token protocol, qiibee, has just announced their partnership with the software company HTS, Hospitality Total Solution. The qiibee is a company that has been able to help different brands that are based around the world the ability to run their loyalty programs effectively on the blockchain technology. According to the CEO of HTS and the General Manager […]

2018-10-25 02:58


Ôîòî:

Queensland Backs Cryptocurrency Point-of-Sale Project for Tourism

The Queensland government in Australia is backing a cryptocurrency point-of-sale system that officials believe will help boost tourism throughout the area. Thus far, they have given over $8 million in Australian dollars ($6 million USD) to roughly 70 different companies that will work to inspire innovation and create new ideas within the region’s travel space.

2018-8-2 00:27


PowerGhost, the latest Cryptomining malware discovered by Kaspersky

Kaspersky researchers have recently discovered a new cryptojacking campaign named PowerGhost that aims at infecting corporate networks worldwide in order to generate maximum mining profits. Cryptomining malware refers to software programs and malware components that are developed to forcefully take over a computer’s resources and adopt them for cryptocurrency mining without a user’s approval. The cryptojacking […]

2018-7-29 04:55


Ôîòî:

Lufthansa searches for suggestions for a SAP competitive flight

Major airline Lufthansa has partnered with software giant SAP to launch a blockchain competition aimed to boost blockchain adoption in the airline industry. Announced Friday, the Aviation Blockchain Challenge seeks “groundbreaking ideas” for blockchain applications that can advance the airline industry and lead on to pilot programs assisted by Lufthansa and SAP. The initiative comes as

2018-7-23 16:33


Monero [XMR] mining malware Coinhive takes another victim, League of Legends infected

Players of the popular internet game, League of Legends have fallen prey to a malicious software that programs their system to involuntarily mine Monero [XMR]. A Reddit user named Lestergonzaga discovered this through the Garena server, where many players all around the world have been mining Monero without their knowledge. The mining process took place […]

2018-7-22 02:28