{"id":48155,"date":"2023-05-10T09:49:09","date_gmt":"2023-05-10T13:49:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=48155"},"modified":"2023-06-02T05:42:47","modified_gmt":"2023-06-02T09:42:47","slug":"fake-trezor-hardware-crypto-wallet","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/48155\/","title":{"rendered":"Case study: fake hardware cryptowallet"},"content":{"rendered":"<p>Easy to steal and cash out, \u0441ryptocurrency is one of the <a href=\"https:\/\/www.kaspersky.com\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/47811\/\" target=\"_blank\" rel=\"noopener nofollow\">most attractive digital assets for attackers<\/a>. Accordingly, serious investors often use hardware cryptowallets to protect their crypto-investments. Such a wallet stores private keys away from vulnerable computers and smartphones and makes it much safer to sign transactions. But unfortunately, owning a hardware wallet <a href=\"https:\/\/www.kaspersky.com\/blog\/five-threats-hardware-crypto-wallets\/47971\/\" target=\"_blank\" rel=\"noopener nofollow\">doesn\u2019t guarantee the safety of your funds<\/a>, as one of our clients has learned the hard way.<\/p>\n<h2>Hack symptoms<\/h2>\n<p>Attackers worked stealthily: on a fateful day in the transaction\u00a0history of a cryptowallet there appeared an operation in which a large sum of money was transferred to someone else.\u00a0However, no transactions were performed on that day by the victim at all. Moreover, the cryptowallet wasn\u2019t even plugged into a computer!<\/p>\n<div id=\"attachment_48159\" style=\"width: 1640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060231\/fake-trezor-hardware-crypto-wallet-01.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48159\" class=\"size-full wp-image-48159\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060231\/fake-trezor-hardware-crypto-wallet-01.png\" alt=\"Aaand\u2026 It's gone!\" width=\"1630\" height=\"1272\"><\/a><p id=\"caption-attachment-48159\" class=\"wp-caption-text\">Aaand\u2026 It\u2019s gone!<\/p><\/div>\n<h2>Dissecting the wallet<\/h2>\n<p>The victim had purchased the rather popular hardware wallet <strong>Trezor Model T<\/strong>. It uses fully open-source code \u2014 both software and hardware-wise \u2014 and is based on the popular STM32F427 microcontroller.<\/p>\n<p>The Trezor Model T vendor has undertaken a wide range security measures that, in theory, should reliably protect the device from attackers. Both the box and the unit housing are sealed with holographic stickers, the microcontroller is in flash memory read-out protection mode (RDP 2). The bootloader checks the digital signature of the firmware and, if an anomaly is detected, displays an unoriginal firmware message and deletes all the data in the wallet. Accessing the device and confirming transactions require a PIN code that\u00a0\u2014 even though it doesn\u2019t protect the master access key (a base for generating the mnemonic seed phrase)\u00a0\u2014 is used to encrypt the storage where it\u2019s kept. Optionally, in addition to the PIN, you can protect your master access key with a password as per the BIP-39 standard.<\/p>\n<div id=\"attachment_48156\" style=\"width: 555px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060226\/fake-trezor-hardware-crypto-wallet-02.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48156\" class=\"size-full wp-image-48156\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060226\/fake-trezor-hardware-crypto-wallet-02.jpg\" alt=\"Do not use me, I am unsafe!\" width=\"545\" height=\"665\"><\/a><p id=\"caption-attachment-48156\" class=\"wp-caption-text\">Do not use me, I am unsafe! (<a href=\"https:\/\/www.reddit.com\/r\/TREZOR\/comments\/to2e6h\/the_most_insane_is_it_genuine_procedure\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a>)<\/p><\/div>\n<p>At first cursory glance, the wallet we examined appeared to be exactly the same as a genuine one, and showed no signs of tampering. The unit was bought through a popular classifieds website, and the holographic stickers on the box and the wallet itself were all present and undamaged. When started-up in update mode, the wallet displayed firmware version 2.4.3 and bootloader version 2.0.4.<\/p>\n<div id=\"attachment_48160\" style=\"width: 817px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060228\/fake-trezor-hardware-crypto-wallet-03.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48160\" class=\"size-full wp-image-48160\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060228\/fake-trezor-hardware-crypto-wallet-03.jpg\" alt=\"Fake wallet update mode screen\" width=\"807\" height=\"1024\"><\/a><p id=\"caption-attachment-48160\" class=\"wp-caption-text\">Fake wallet update mode screen<\/p><\/div>\n<p>When handling the wallet, nothing felt suspicious either: all the functions worked as they should, and the user interface was no different from the original one. However, mindful of the theft that had occurred via it, we delved deeper. And that\u2019s where our interesting discoveries began.<\/p>\n<p>Right off the bat, we found that the vendor had never released bootloader version 2.0.4. The project change history at GitHub concisely states that this version was \u201cskipped due to fake devices\u201d. After such an intriguing statement, we just had to reach for the scalpel and begin our dissection, of course\u2026<\/p>\n<div id=\"attachment_48157\" style=\"width: 1258px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060229\/fake-trezor-hardware-crypto-wallet-04.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48157\" class=\"size-full wp-image-48157\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060229\/fake-trezor-hardware-crypto-wallet-04.png\" alt=\"What on earth is version 2.0.4?\" width=\"1248\" height=\"752\"><\/a><p id=\"caption-attachment-48157\" class=\"wp-caption-text\">What on earth is version 2.0.4?<\/p><\/div>\n<p>The housing was difficult to open: its two halves were held together with liberal quantities of glue and double-sided adhesive tape instead of the ultrasonic bonding used on factory-made Trezors. Even more curiously, inside there was an entirely different microcontroller showing traces of soldering! Instead of the original STM32F427, the unit had an STM32F429 with fully deactivated microcontroller flash-memory read-out protection mechanisms (RDP 0 instead of RDP 2 in genuine Trezors).<\/p>\n<div id=\"attachment_48161\" style=\"width: 1517px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060230\/fake-trezor-hardware-crypto-wallet-05.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48161\" class=\"size-full wp-image-48161\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/10060230\/fake-trezor-hardware-crypto-wallet-05.jpg\" alt=\"It looked perfectly genuine from the outside; however\u2026 (left \u2014 original, right \u2014 fake)\" width=\"1507\" height=\"1023\"><\/a><p id=\"caption-attachment-48161\" class=\"wp-caption-text\">It looked perfectly genuine from the outside; however\u2026 (left \u2014 original, right \u2014 fake)<\/p><\/div>\n<p>Thus, the fake cryptowallet theory was proved true: it was a classic supply-chain attack in which an unsuspecting victim buys an already-hacked device. But the actual cryptocurrency stealing mechanism was still unclear\u2026<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-fraud\">\n<h2>Trojan firmware<\/h2>\n<p>We won\u2019t repeat the commonplace truths about cryptowallets that we <a href=\"https:\/\/www.kaspersky.com\/blog\/five-threats-hardware-crypto-wallets\/47971\/\" target=\"_blank\" rel=\"noopener nofollow\">covered earlier<\/a>, but we\u2019ve just one little reminder for you: a cryptowallet contains your private key, and whoever knows that key can sign any transaction and spend your money. The fact that the attackers were able to conduct a transaction while the offline wallet was stashed in its owner\u2019s strongbox means that they either copied the private key after it was generated, or\u2026 they knew it all along!<\/p>\n<p>Thanks to the deactivated flash-memory read-out protection, which our attackers decided not to turn on after the new microcontroller was soldered in, we easily extracted the wallet firmware and, by reconstructing its code, discovered that the attackers indeed knew the private key in advance. But how?<\/p>\n<p>The original bootloader and wallet firmware received only three modifications:<\/p>\n<p><em>First<\/em>, the bootloader-checks for protection mechanisms and digital signatures were removed, thus getting rid of the \u201cred screen\u201d problem during the firmware originality check at startup.<\/p>\n<p><em>Second<\/em>, at the initialization stage or when resetting the wallet, the randomly generated seed phrase was replaced with one of 20 pre-generated seed phrases saved in the hacked firmware. The owner would begin using it instead of a new and unique one.<\/p>\n<p><em>Third<\/em>, if the user chose to set an additional master-seed protection password, only its first symbol (<em>a\u2026z<\/em>, <em>A\u2026Z<\/em>, <em>0\u20269<\/em> or <em>!<\/em> for any special character) was used, which, together with the no-password option, gave just 64 possible combinations. Thus, to crack a given fake wallet, only 64*20=1280 variants were to be considered.<\/p>\n<p>The fake cryptowallet would operate as normal, but the attackers had full control over it from the very beginning. According to the transaction history, they were in no hurry, waiting a whole month after the wallet was credited for the first time before they grabbed the money. The owner had no protection whatsoever: the game was lost from the very moment the money first arrived in the Trojan wallet.<\/p>\n<h2>Response from the manufacturer<\/h2>\n<p>After our investigation was published, we received feedback from Trezor \u2013 the manufacturer of the hardware cryptowallet mentioned in the post. Confirming the third-party intruder\u2019s modification of the device described in the post, Trezor officials noted the following:<\/p>\n<ul>\n<li>This attack on the supply chain happened over a year ago, and since then there\u2019ve been no similar cases. After investigating the attack, Trezor published a <a href=\"https:\/\/blog.trezor.io\/stay-safe-shopping-for-hardware-wallets-543f144e3d24\" target=\"_blank\" rel=\"nofollow noopener\">blogpost with recommendations<\/a> on how to avoid such problems.<\/li>\n<li>\u00a0If you run the bootloader of the non-existent version 2.0.4 on an original device and try to install fake firmware, the user is notified that the wallet has unofficial firmware installed. If the user ignores this message and proceeds to update the new firmware, the warning appears again. Users should under no circumstances ignore these messages.<\/li>\n<\/ul>\n<div id=\"attachment_48361\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/01104740\/fake-trezor-hardware-crypto-wallet-07.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-48361\" class=\"wp-image-48361\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/05\/01104740\/fake-trezor-hardware-crypto-wallet-07.png\" alt=\"The unofficial firmware warnings.\" width=\"400\" height=\"550\"><\/a><p id=\"caption-attachment-48361\" class=\"wp-caption-text\">The unofficial firmware warnings.<\/p><\/div>\n<ul>\n<li>In our post, it was stated that \u201c<em>the wallet was<\/em> <em>bought from a trusted seller through a popular classifieds website<\/em>\u201c. It was assumed that the seller was verified and assigned as \u201ctrusted\u201d by the administration of the classifieds website, and not by Trezor. Trezor separately notes that only purchases of cryptowallets from official sellers are safe. To avoid ambiguity, we\u2019ve edited this phrase, replacing it with \u201c<em>the wallet was<\/em> <em>bought through a popular classifieds website\u201d<\/em>.<\/li>\n<\/ul>\n<p>In addition, Trezor strongly recommends that you adhere to the following guidelines when purchasing and using their hardware cryptowallets:<\/p>\n<ol>\n<li>Always buy hardware and software from an official vendor or seller.<\/li>\n<li>Never ignore warnings on your device or software.<\/li>\n<li>Keep your cryptowallet firmware always updated.<\/li>\n<li>Before using a new device, reset it to the factory settings.<\/li>\n<\/ol>\n<h2>How to prevent the fake device threat<\/h2>\n<p>It\u2019s not easy to tell a fake cryptowallet from a real one without special knowledge and experience. The main safeguard is to buy your wallet <strong>directly from the official vendor<\/strong> and choose models with special versions of protected microcontrollers (even original Trezors aren\u2019t ideal in this sense: there are other brands\u2019 wallets with better protected chips and extra protection mechanisms).<\/p>\n<p>It should be remembered that even an authentic and unmodified wallet can be vulnerable to <a href=\"https:\/\/www.kaspersky.com\/blog\/five-threats-hardware-crypto-wallets\/47971\/\" target=\"_blank\" rel=\"noopener nofollow\">a number of threats<\/a>. The priority measures include the use of a password (if supported by your wallet), and, of course, <a href=\"https:\/\/www.kaspersky.com\/lp\/crypto-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team______\" target=\"_blank\" rel=\"noopener nofollow\">protection for all computers and smartphones<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.<\/p>\n","protected":false},"author":2735,"featured_media":48158,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[374,1035,2640,3945,2713,3120,726,2893,422],"class_list":{"0":"post-48155","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bitcoin","9":"tag-blockchain","10":"tag-cryptocurrencies","11":"tag-cryptowallets","12":"tag-ethereum","13":"tag-hardware-wallets","14":"tag-scam","15":"tag-supply-chain-attack","16":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/48155\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/fake-trezor-hardware-crypto-wallet\/25652\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/21071\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/10592\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/28299\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/fake-trezor-hardware-crypto-wallet\/25951\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/26333\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/fake-trezor-hardware-crypto-wallet\/28819\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/fake-trezor-hardware-crypto-wallet\/27765\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/fake-trezor-hardware-crypto-wallet\/35272\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/fake-trezor-hardware-crypto-wallet\/11437\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/fake-trezor-hardware-crypto-wallet\/20586\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/fake-trezor-hardware-crypto-wallet\/21284\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/fake-trezor-hardware-crypto-wallet\/30153\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/fake-trezor-hardware-crypto-wallet\/33750\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/fake-trezor-hardware-crypto-wallet\/26262\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fake-trezor-hardware-crypto-wallet\/31959\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fake-trezor-hardware-crypto-wallet\/31648\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cryptocurrencies\/","name":"cryptocurrencies"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2735"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=48155"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48155\/revisions"}],"predecessor-version":[{"id":48365,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48155\/revisions\/48365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48158"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=48155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=48155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=48155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}