Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


A 15 Years Old Hacker gets into the Protected Ledger of Crypto Wallet


Saleem Rashid is a 15-year-old programmer who discovered a fault in the well-known wallet of Ledger hardware that enables crooks to seize confidential PINs prior to or after the shipment of the gadget. The blog of Rashid where he explained about the holes that enabled for the two "supply chain assault" that means - and device can be compromised by a hack before it was delivered to the customer - and another assault when the hacker could steal secure keys during the initialization of the device.


The 15 years old hacker is not directly affiliated with any of the ledger competitors, yet some suggestion was there that, little work has been done by him in Trezor including different hardware wallet as per the post on techcrunch.com21/03/2018.


Rashid denied the social media claims as well as a one of his personal blog named "Breaking the Ledger Security Model" on 20th March, stating that he could even now "autonomously take out root confidential key as soon as the end-user unlocks the gadget" and utilize it to encourage manipulation of the destination address of proceedings.


Both the Ledger as well as its number of users is on pressure for the argument, who has still comprehensively acknowledged the organizationsdeclare its wallets were fully secure.


Most of the Well-known names of the Bitcoin industry often suggest choosing hardware wallets, including Andreas Antonopoulos, the educator who like numerous other endeavors to discourage cryptocurrency investors to put stored fund online.


A hacker requires to some way installing a customized edition of the firmware program which runs on microcontroller of the Ledger wallet. This process takes 20 seconds or may be less as per Rashid. This can be only done if a wallet's physical possession can be grabbed before the devise reach to the user, that may happen in case the wallet was hacked and then send to Amazon, Ebay, and so on for sale.


Digital currencies, for example, Bitcoin utilize an encryption technique known as "public key cryptography" to secure funds. The stored fund can be used by the user only when they have the private key's access.

» SPAMfighter News - 3/28/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page