Image Credits: Silas Stein/picture alliance via Getty Images / Getty Images
Hackers compromised the code behind a crypto protocol used by multiple web3 applications and services, the software maker Ledger said on Thursday.
Ledger, a company that makes a widely used and popular crypto hardware and software wallet, among other products, announced on X (previously Twitter) that someone had pushed out a “malicious version” of its Ledger Connect Kit, a library that decentralized apps (dApps) made by other companies and projects use to connect to the Ledger wallet service.
“A genuine version is being pushed to replace the malicious file now. Do not interact with any dApps for the moment. We will keep you informed as the situation evolves,” Ledger wrote.
Soon after, Ledger posted an update saying that the hackers had replaced the genuine version of its software some six hours earlier, and that the company was investigating the incident and would “provide a comprehensive report as soon as it’s ready.”
After this story was published, Ledger spokesperson Phillip Costigan shared more details about the hack with TechCrunch and on X. Costigan said that a former Ledger employee was victim of a phishing attack on Thursday, which gave the hackers access to their former employee’s NPMJS account, which is a software registry that was acquired by GitHub. From there, the hackers published a malicious version of the Ledger Connect Kit.
“The malicious code used a rogue WalletConnect project to reroute funds to a hacker wallet,” Costigan said.
Then, Ledger deployed a fix within 40 minutes of the company becoming aware of the hack. The malicious file, however, was live for round 5 hours, but “the window where funds were drained was limited to a period of less than two hours,” according to Costigan.
Ledger also “coordinated” with WalletConnect which “quickly disabled the the rogue project,” essentially stopping the attack, according to Costigan.
Costigan also said Ledger pushed out a genuine software update that is “safe to use.”
“We are actively talking with customers whose funds might have been affected, and working proactively to help those individuals at this time,” the spokeperson said, adding that the company believes it has identified the hackers’ wallet.
The company says it has sold six million units of its hardware wallet, and Ledger Live, its software equivalent, is used by 1.5 million users. The Ledger hardware wallet is not believed to be affected by the hack.
Tal Be’ery, the co-founder of crypto wallet ZenGo, told TechCrunch that the hackers essentially pushed out a malicious version of the software that was designed to trick users into connecting their wallets and assets to the malicious version of the software.
Contact Us
Do you have more information about this hack? We’d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email lorenzo@techcrunch.com. You also can contact TechCrunch via SecureDrop.
That would allow the hackers to drain the crypto inside users’ wallets — so long as the users accepted the push to connect their wallets to the malicious Ledger version.
It’s not immediately clear how many people fell victim to the hack. ZachXBT, a well-known independent crypto researcher, wrote on X that one victim had more than $600,000 in crypto drained from their account.
Several blockchain security researchers, as well as people who work in the web3 industry, warned users on social media of the supply chain hack against Ledger.
Matthew Lilley, the chief technology officer of cryptocurrency trading platform Sushi, was one of the first ones to detect the attack and share the news.
“I would recommend never interacting with a [decentralized app] ever again and honestly just move on with your life,” said Joseph Delong, the CTO of NFT lending platform AstariaXYZ, joked on X, referring to the fact that Ledger uses the notoriously insecure programming language JavaScript.
UPDATE, December 14, 11:28 a.m. ET: This story was updated to include more details about the attack, provided by the company’s spokesperson.
This news is republished from another source. You can check the original article here