Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesCopyBotsEarn

Dark Skippy method can exploit Bitcoin hardware wallets

CryptopolitanCryptopolitan2024/08/08 16:00
By:By Collins J. Okoth

Share link:In this post: A recent disclosure revealed a new method hackers use to leak user private keys from hardware wallets. The method allows hackers to steal private keys after a user signs two transactions. Users and hardware wallet makers are urged to take extra care to prevent the attack.

Security researchers recently disclosed a new type of malicious attack that allows hackers to access hardware wallets and user private keys after two signed transactions. The researchers dubbed the attack Dark Skippy that works if a hacker tricks a user into downloading a malicious firmware.

Nick Farrow, Lloyd Fournier, and Robin Linus published the disclosure detailing the information about Dark Skippy. Nick Farrow and Lloyd Fournier are co-founders of the upcoming hardware wallet firm Frostsnap. Robin Linus is involved in the Bitcoin protocols BitVM and ZeroSync.

The report explained how every signing device inserts random values known as nonces for every signed BTC transaction. Weak nonces can allow attackers to decipher private keys from the signatures through ‘nonce grinding.’ 

Dark Skippy attacks depend on a similar technique. An attacker introduces malicious firmware to the signing device. The malicious firmware generates weak nonces every time the device signs a transaction. 

An attacker can use techniques like Pollard’s Kangaroo Algorithm to compute the seed phrase and access a victim’s wallet. Dark Skippy is faster and requires fewer signed transactions compared to older nonce grinding techniques.

Researchers suggest mitigating measures for Dark Skippy

Nick, Robin, and Lloyd offered mitigation measures to deal with Dark Skippy. The researchers explained that most signing devices have hardware security defenses to prevent the loading of malicious firmware. Some include securing device physical access, employing hardware security techniques, buying legit signing devices, and more.

See also Donald Trump expects a global financial crisis and world war III

Nick tweeted about suggested protocol-based mitigations used in the past, including anti-exfil and deterministic nonces. The three researchers presented new mitigation measures that could coexist with partially signed Bitcoin transactions (PSBT) signing workflows in their report.

The two suggested measures include mandatory adaptor signatures and mandatory nonce proof-of-work. The measures aim to disrupt the Dark Skippy attacks like new PSBT fields.

The Frostsnap co-founder still insisted on mitigation discussions and implementations to deal with the new threat. The researchers also asked readers and industry experts to provide feedback on the mitigation measures provided in the report. 

Bitrace warns about new QR code scams 

Bitrace recently tweeted about a new scam that tricks users into authorizing wallets. A recent crypto wallet theft victim contacted the company requesting assistance. The victim explained that their funds were all stolen after testing a transfer of 1 USDT through a QR code. The victim revealed that they couldn’t understand how someone robbed them after only scanning a QR code.

The data analytics company explained that QR code scams were a new scam type involving a QR code transfer test. The scammers first suggest an over-the-counter transaction to unaware victims. The bad actors then offer lower rates than other crypto market services. 

See also Coinbase expects summary judgment in SEC, FDIC case by 2025

The company also revealed that scammers offer TRX as a fee for long-term cooperation and make a USDT payment to gain trust. The scammer then requests a small payment test to access a victim.

Bitrace tested the scam using an empty wallet and the QR code the victim provided. The company said the scan led them to a third-party website requesting a repayment amount. Once the victim confirms the transaction, scammers steal the wallet authorization. The cybercriminals then transfer all the funds from the victim’s wallet.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Stake to earn
CEC, QTLX, GDV and other popular new coins are in hot progress!
Stake now!

You may also like

Why Bitcoin Isn’t Experiencing an Explosive Surge? Analytics Company Reveals the Real Reason

Why doesn't the Bitcoin price show sudden increases like before? The analysis company shared the report containing its thoughts.

Bitcoinsistemi2024/09/20 09:36

What Does Bitcoin Dominance Tell Us? Why Is It Increasing? Here is the Latest Report

Bitcoin (BTC) dominance continues to rise. So what's behind this rise? Here's the data.

Bitcoinsistemi2024/09/20 09:36

Which Country Owns the Most Bitcoin? El Salvador is in Fourth Place

Interestingly, El Salvador is at the bottom of the list of governments with the most Bitcoin. Here are the details.

Bitcoinsistemi2024/09/20 09:36