Pages:
Author

Topic: Be careful what you plug your hardware wallet into your PC with - page 2. (Read 509 times)

legendary
Activity: 3500
Merit: 6320
Crypto Swap Exchange
It would also get them into big legal trouble if they don't make a responsible disclosure. In cybersecurity it's either that, or selling the exploit.
I wanted to say that as well, but I couldn't remember the damn term Grin. Responsible disclosure, that's it. Dave doesn't seem to me like the person who is looking yo exploit this, otherwise I don't think we would even have this thread. His post above confirms just that. Dave also doesn't know how it works. Only the person who discovered this bug knows the specifics.

Apple = "It's not a bug, it's a feature"

Seriously, it's not a bug.

You are plugging something inline between your PC and your hardware device that can manipulate data. When HW wallets were 1st made there was no way that a device with all this storage and Wi-Fi could be put into a cable that does not look any different then a regular cable.

So, it's just a vulnerability not a bug. In the real world it's the same thing to the end user. Dealing with security discussions it's different. A bug indicates they made a mistake, a vulnerability is something they do not defend against. To most of us it does not make a difference.

To others it could cost them their job. A bug is "what the f--k were you thinking, get out of the office you idiot" a vulnerability is "This came up can you fix it or code around it"

-Dave

legendary
Activity: 2730
Merit: 7065
It would also get them into big legal trouble if they don't make a responsible disclosure. In cybersecurity it's either that, or selling the exploit.
I wanted to say that as well, but I couldn't remember the damn term Grin. Responsible disclosure, that's it. Dave doesn't seem to me like the person who is looking yo exploit this, otherwise I don't think we would even have this thread. His post above confirms just that. Dave also doesn't know how it works. Only the person who discovered this bug knows the specifics.
hero member
Activity: 882
Merit: 5834
not your keys, not your coins!
~
Right, so going the responsible disclosure route then. Definitely the best thing for the users and by many claimed the more moral thing to do.
I can see how this may be unfixable. If I am on the right track with my idea about this exploit, it should be possible to e.g. construct a 'toy scenario' with a software wallet or so, and show the attack on that, without revealing a real manufacturer where this also works. And letting people figure that out by themselves; that should be 'green light', legally.
It will be interesting nonetheless. The 'exploit' just uses keypresses though, so a mitigation would be providing a software that requires the user to allow new USB HID devices explicitly. It could be a service that runs in the background and shows a pop-up 'do you want to use this keyboard?' when plugging in a new device.
legendary
Activity: 3500
Merit: 6320
Crypto Swap Exchange
If he can get it working, it will be disclosed to them with an "X" number of days to acknowledge the issue and discuss with him.
The trouble is, it's not vulnerable until the user plugs in a malicious piece of hardware inline with their device. So, there might not really be a way to fix it if what he thinks is happening, is really the way it works.

It's like using a wireless keyboard to type sensitive information. There may not be a way to fix it.

As for what is working now, i.e. change an address in a known location that the user copy & pastes. There is nothing to really disclose. This device can run an app that can create predefined keyboard inputs. Short of unplugging the power to your PC it can't be fixed.

Edit to add: if it can't be fixed, it will not be given out or discussed (even to me and I'm the one who paid for the damn cables to test with)
If it can be fixed but they don't want to or just don't I'm not sure.
If it can be fixed and they have a timeline it will not be disclosed till after an agreed upon time has passed.

-Dave
hero member
Activity: 882
Merit: 5834
not your keys, not your coins!
Depending on how severe this vulnerability or bug is, will the two of you reveal and discuss this with the manufacturing company first before releasing any details to the public? I think you should and I hope you will. There might be a bug bounty in it for you if you do. But more importantly, you won't be making life easier for those who want to destroy everything and steal money from people.   
It would also get them into big legal trouble if they don't make a responsible disclosure. In cybersecurity it's either that, or selling the exploit. Releasing online without notice to the manufacturer brings you 0 benefits and >0 troubles. Grin
legendary
Activity: 2730
Merit: 7065
Depending on how severe this vulnerability or bug is, will the two of you reveal and discuss this with the manufacturing company first before releasing any details to the public? I think you should and I hope you will. There might be a bug bounty in it for you if you do. But more importantly, you won't be making life easier for those who want to destroy everything and steal money from people.   
hero member
Activity: 882
Merit: 5834
not your keys, not your coins!
I don't understand this however. You're breaking encryption now? Why?

Once again, I'm not he is :-)

But he is not sending the bad address to the device, that is the issue. The user can copy / paste the info, but leaving the manufacturer out of it, there is a browser plug in they use to talk to the hardware wallet.

As of now THAT is not fooled by the find / replace on the web page since it sees it as it loads or something. Explained to me but as I said I lost it after the 1st few minutes of the explanation.

Just so you know how dangerous devices like this are here are just the PUBLIC DOWNLOADABLE things you can load on it.
https://hak5.org/blogs/payloads  (7 pages of fun)
Honestly, I don't get why the attacker would 'talk to the hardware wallet' directly; it would be the most trivial and easy thing, if you have a way to manipulate webpages locally, to just replace the address, so the user himself copies the 'bad address' to the wallet and signs a transaction that spends money to it. This should also work pretty 'universally' against a variety of wallets, whereas other methods might be restricted to specific manufacturers / wallets only.
But I'll just wait and see once more information can be released publicly; no hurry. Wink

Oh, I know about these devices, they're really good, I used them in the past, too.
legendary
Activity: 3500
Merit: 6320
Crypto Swap Exchange
I don't understand this however. You're breaking encryption now? Why?

Once again, I'm not he is :-)

But he is not sending the bad address to the device, that is the issue. The user can copy / paste the info, but leaving the manufacturer out of it, there is a browser plug in they use to talk to the hardware wallet.

As of now THAT is not fooled by the find / replace on the web page since it sees it as it loads or something. Explained to me but as I said I lost it after the 1st few minutes of the explanation.

Just so you know how dangerous devices like this are here are just the PUBLIC DOWNLOADABLE things you can load on it.
https://hak5.org/blogs/payloads  (7 pages of fun)

-Dave

hero member
Activity: 882
Merit: 5834
not your keys, not your coins!
Having one of those small adapters is nice. But people are people, and people forget things.
If I drop a few of those cables around a show like BlackHat or Defcon probably nobody is going to plug them into anything.
Leave a few around Bitcoin Miami and you could probably get someone to plug them in.

Buy a few dozen (yes it's expensive) but then put a logo on for something that looks like a giveaway and you know people are going to use it....
You'd be surprised how often you do find USB freebies at conferences such as BlackHat and similar. Grin
Infecting PCs using free USB devices is a very common practice and even part of the toolbelt of lots of professional pentesting companies.

Until now, I was under the impression that if you only transmit PSBTs through USB, a simple corrupting / replacing attack would definitely lead to the wrong address showing on the hardware device's screen.
I'm very excited to see how you're going to circumvent this for hacking USB hardware wallets, though!

It will do those easier if it's just putting in an address. It's actually trivial.
Remember it not just a key logger, it can also run apps and put stuff into the PC.
So if he can get to the page inspector in chrome (or whatever it is in that particular browser) he can modify a BTC address at a known location. Since it's always in the same space here: https://bitcointalk.org/index.php?action=credit;promote it's a known spot in code that can change to his address. For now it can only change the address QR codes cannot be done (yet)
From this text it appears to me that you're just replacing the address shown on screen with a malicious one as well as sending that address to the hardware device; thus the user sees the same one on both devices. That's quite smart and should be relatively simple to do, sounds good to me!

The trick with the HW wallet is that it's breaking the encryption loop with their app.
I don't understand this however. You're breaking encryption now? Why?
legendary
Activity: 3668
Merit: 6382
Looking for campaign manager? Contact icopress!
Leave a few around Bitcoin Miami and you could probably get someone to plug them in.

Well, we know that most aren't into Bitcoin because of the tech Wink
And then I can guess the horror (and the bad publicity) if such exploit indeed happens at a big Bitcoin event Grin
legendary
Activity: 3500
Merit: 6320
Crypto Swap Exchange
Looks like there's a new reason to keep an extra PC/laptop to interact with crypto. Of course, with USB type A, even then no adapters are required. This means that the threat described in this topic will be excluded.

USB A can easily handle exploits for PC/laptops, see the link from my other post here.
So by making the wrong assumptions, instead of protecting one, you can end up getting malware on the other.

More and more manufacturers are refusing to use USB A in their devices, and over time this will lead to a shortage of such devices. The market for used devices will not be endless either.

This doesn't really make sense. USB A is still widely used for PCs, I don't think they'll get no-longer-produced too soon. And, if you want to, you can easily buy cheap and straightforwards adapters from USB A to micro USB or USB-C like this one:



MacBooks And any of the ultra portable PC ones (Microsoft surface, etc.) are all USB A only.

Having one of those small adapters is nice. But people are people, and people forget things.
If I drop a few of those cables around a show like BlackHat or Defcon probably nobody is going to plug them into anything.
Leave a few around Bitcoin Miami and you could probably get someone to plug them in.

Buy a few dozen (yes it's expensive) but then put a logo on for something that looks like a giveaway and you know people are going to use it....

-Dave
legendary
Activity: 3668
Merit: 6382
Looking for campaign manager? Contact icopress!
Looks like there's a new reason to keep an extra PC/laptop to interact with crypto. Of course, with USB type A, even then no adapters are required. This means that the threat described in this topic will be excluded.

USB A can easily handle exploits for PC/laptops, see the link from my other post here.
So by making the wrong assumptions, instead of protecting one, you can end up getting malware on the other.

More and more manufacturers are refusing to use USB A in their devices, and over time this will lead to a shortage of such devices. The market for used devices will not be endless either.

This doesn't really make sense. USB A is still widely used for PCs, I don't think they'll get no-longer-produced too soon. And, if you want to, you can easily buy cheap and straightforwards adapters from USB A to micro USB or USB-C like this one:

legendary
Activity: 1792
Merit: 1296
Crypto Casino and Sportsbook
And makes me thing about all that people who connects their smartphones to "free chargers".
Wow. But really, this is a great way to get malware on your phone. In modern times, in addition to the usual software hygiene of your device, it will include "do not charge in suspicious places and with unfamiliar cables."

With more and more laptops only coming with the USB C connector and more and more people needing the C to A adapter, it's going to be much easier to drop compromised cables like this into the environment.
I am not a big fan of using USB-C as universal USB connector for all devices but it looks like we are going in that direction.
Looks like there's a new reason to keep an extra PC/laptop to interact with crypto. Of course, with USB type A, even then no adapters are required. This means that the threat described in this topic will be excluded.

More and more manufacturers are refusing to use USB A in their devices, and over time this will lead to a shortage of such devices. The market for used devices will not be endless either.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
Normally to recover a wallet you'd also have to put in a mnemonic, which would be sent down the cable too so there's added reason to make sure you can trust your connectors.
Normally, the entire recovery process takes place or should take on a device itself, typing your seed on a computer is a terrible practice in principle.

As an example: https://wiki.trezor.io/User_manual:Recovery

Ohhhhh it's been updated! Afaik the last time I tried to recover my trezor it asked me to input the mnemonic in a different order (based on what the device said and asked for some extra words but I wasn't sure how much I trusted that - this was 3 or 4 years ago).
legendary
Activity: 3500
Merit: 6320
Crypto Swap Exchange
Been working with someone and we think we might have a MITM attack working against a certain hardware wallet.
Please try doing that with airgapped hardware wallets like Passport or Keystone that don't use any cable connection with computer... I can't wait to see the results Smiley

With more and more laptops only coming with the USB C connector and more and more people needing the C to A adapter, it's going to be much easier to drop compromised cables like this into the environment.
I am not a big fan of using USB-C as universal USB connector for all devices but it looks like we are going in that direction.
They are even using same usb type c for charging devices like laptops and smartphones, and I've seen that making problems on some laptops, because people confuse power cable with usb and they blow up the board.
It's not that hard to imagine some malware cables could target hardware wallet users, that is why I would only use original cables made by manufacturers.


It will do those easier if it's just putting in an address. It's actually trivial.
Remember it not just a key logger, it can also run apps and put stuff into the PC.
So if he can get to the page inspector in chrome (or whatever it is in that particular browser) he can modify a BTC address at a known location. Since it's always in the same space here: https://bitcointalk.org/index.php?action=credit;promote it's a known spot in code that can change to his address. For now it can only change the address QR codes cannot be done (yet)

The trick with the HW wallet is that it's breaking the encryption loop with their app.
As I said WAY over my head in programming.

As for only using the original cables, it's like you said USB A on a lot of machines is going away till they give you a cable that is USB C you need one of these adapter things.

-Dave
legendary
Activity: 2212
Merit: 7064
Been working with someone and we think we might have a MITM attack working against a certain hardware wallet.
Please try doing that with airgapped hardware wallets like Passport or Keystone that don't use any cable connection with computer... I can't wait to see the results Smiley

With more and more laptops only coming with the USB C connector and more and more people needing the C to A adapter, it's going to be much easier to drop compromised cables like this into the environment.
I am not a big fan of using USB-C as universal USB connector for all devices but it looks like we are going in that direction.
They are even using same usb type c for charging devices like laptops and smartphones, and I've seen that making problems on some laptops, because people confuse power cable with usb and they blow up the board.
It's not that hard to imagine some malware cables could target hardware wallet users, that is why I would only use original cables made by manufacturers.
legendary
Activity: 3500
Merit: 6320
Crypto Swap Exchange
Normally to recover a wallet you'd also have to put in a mnemonic, which would be sent down the cable too so there's added reason to make sure you can trust your connectors.

Do you know how easy the vulnerability you found would be to patch - is it likely to not remain one for long or is it quite well embedded (feel free to wait on answering this)?

I don't know, I'm a network and hardware guy. I got about 20% of the way into his explanation before my eyes glazed over.

a MITM attack working against a certain hardware wallet.

Since the only valid uses for a cable are for signing transactions and maybe for charging, I'd guess that the transaction info going to the HW could be altered with the "right" cable (wouldn't such a cable be too bulky?!)
But even then, such an attack could work only if one doesn't pay attention what the HW screen shows before signing (unless it's Jack's screenless future HW lol).

However, I guess that the validation (or not) for my theory may have to wait "a few weeks"...

(wouldn't such a cable be too bulky?!)
I just wanted to ask this.  Is there no way to tell a compromised cable from a non malicious one?  One thing I never do is use any cable other than those I have always trusted or that came with the product.  I understand it is possible to be targeted and have a cable compromised but besides what Neurotic's scenario of an attack, I do not think there is any way you could be attacked?

If there was a way to do something malicious due to the cable being compromised, then I suppose it would also be possible to attack a Hardware Wallet through any computer infected with the right malware.  Right?

-
Regards,
PrivacyG

Actually, the screen shows on the device shows the correct information as does the screen of your PC. Remember not only can it record keyboard strokes it can play them back. As in edit webpages. What it can't do at this point is generate QR codes / graphics.

Not only do the cables look the same, since USB C to A cables are still new to a lot of people they would not know the difference anyway.

This is one of the few times BIP 70 would have actually been useful.

-Dave
legendary
Activity: 952
Merit: 1385
https://hak5.org/products/omg-adapter

Been working with someone and we think we might have a MITM attack working against a certain hardware wallet.


Very interesting, I can't wait.
It reminds me the famous "USB Ninja" project : https://usbninja.com or USBHarpoon.
And makes me thing about all that people who connects their smartphones to "free chargers".

legendary
Activity: 3668
Merit: 6382
Looking for campaign manager? Contact icopress!
(wouldn't such a cable be too bulky?!)
I just wanted to ask this.  Is there no way to tell a compromised cable from a non malicious one?

I remembered that I've seen here in the past a discussion about malicious cables and I've found it: https://bitcointalksearch.org/topic/usbharpoon-a-charging-cable-that-can-hack-your-computer-5186863
It looks like the cable is not really different from normal ones; at least no visible difference. So it's a real problem.
hero member
Activity: 882
Merit: 1873
Crypto Swap Exchange
(wouldn't such a cable be too bulky?!)
I just wanted to ask this.  Is there no way to tell a compromised cable from a non malicious one?  One thing I never do is use any cable other than those I have always trusted or that came with the product.  I understand it is possible to be targeted and have a cable compromised but besides what Neurotic's scenario of an attack, I do not think there is any way you could be attacked?

If there was a way to do something malicious due to the cable being compromised, then I suppose it would also be possible to attack a Hardware Wallet through any computer infected with the right malware.  Right?

-
Regards,
PrivacyG
Pages:
Jump to: