• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
crypto hardware wallet ledger's supply chain breach results in $600,000

Crypto Hardware Wallet Ledger’s Supply Chain Breach Results in $600,000 Theft

You are here: Home / General Cyber Security News / Crypto Hardware Wallet Ledger’s Supply Chain Breach Results in $600,000 Theft
December 15, 2023

Crypto components wallet maker Ledger released a new variation of its “@ledgerhq/hook up-kit” npm module immediately after unidentified risk actors pushed malicious code that led to the theft of extra than $600,000 in virtual belongings.

The compromise was the outcome of a former staff falling victim to a phishing attack, the company claimed in a assertion.

This allowed the attackers to obtain access to Ledger’s npm account and add 3 destructive variations of the module – 1.1.5, 1.1.6, and 1.1.7 — and propagate crypto drainer malware to other purposes that are dependent on the module, ensuing in a software program supply chain breach.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Upcoming WEBINAR Conquer AI-Driven Threats with Zero Rely on – Webinar for Security Professionals

Traditional security measures is not going to slash it in today’s planet. It truly is time for Zero Have faith in Security. Secure your info like hardly ever just before.

Be part of Now

“The destructive code made use of a rogue WalletConnect job to reroute resources to a hacker wallet,” Ledger mentioned.

Connect Kit, as the identify indicates, tends to make it achievable to hook up DApps (small decentralized programs) to Ledger’s components wallets.

According to security agency Sonatype, variation 1.1.7 straight embedded a wallet-draining payload to execute unauthorized transactions in purchase to transfer digital property to an actor-controlled wallet.

Variations 1.1.5 and 1.1.6, although lacking an embedded drainer, had been modified to down load a secondary npm package, determined as 2e6d5f64604be31, which functions as a crypto drainer. The module is still accessible for obtain as of producing.

Crypto Hardware

“When set up into your software, the malware presents the buyers with a pretend modal prompt that invitations them to hook up wallets,” Sonatype researcher Ilkka Turunen said. “When the consumers simply click by this modal, the malware commences draining resources from the linked wallets.”

The destructive file is approximated to have been are living for about five hrs, while the energetic exploitation window for the duration of which the funds ended up drained was constrained to a period of much less than two hours.

Ledger has given that taken out all 3 malicious variations of Join Kit from npm and posted 1.1.8 to mitigate the issue. It has also claimed the menace actor’s wallet addresses and famous that stablecoin issuer Tether has frozen the stolen money.

Cybersecurity

If anything at all, the progress underscores the ongoing focusing on of open up-source ecosystems, with program registries such as PyPI and npm more and more made use of as vectors for installing malware by means of offer chain attacks.

“The certain concentrating on of cryptocurrency assets demonstrates the evolving methods of cybercriminals to obtain significant economic gains inside of the room of hours, directly monetising their malware,” Turunen mentioned.

Found this post attention-grabbing? Abide by us on Twitter  and LinkedIn to go through a lot more unique articles we put up.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «bug or feature? hidden web application vulnerabilities uncovered Bug or Feature? Hidden Web Application Vulnerabilities Uncovered
Next Post: New KV-Botnet Targeting Cisco, DrayTek, and Fortinet Devices for Stealthy Attacks new kv botnet targeting cisco, draytek, and fortinet devices for stealthy»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.