OneKey Addresses Vulnerability That Allowed Hardware Wallet to be Hacked

OneKey, a company that provides cryptographic hardware wallets, has said that it has already patched a flaw in its firmware that made it possible for one of its hardware wallets to be compromised in under one second.

Unciphered, a firm in the field of cybersecurity, said in a video that was uploaded on YouTube on February 10 that it has discovered a means to “break open” a OneKey Mini by taking advantage of a “Massive major flaw” and exploiting it.

It was possible, according to Eric Michaud, a partner at Unciphered, to return the OneKey Mini to “factory mode” and bypass the security pin by disassembling the device and inserting coding. This would allow a potential attacker to remove the mnemonic phrase that is used to recover a wallet. This was made possible by returning the device to “factory mode.”

“You have the central processing unit as well as the security element. Your cryptographic keys will always be stored in the secure element. Michaud noted that in a typical situation, the connections between the central processing unit (CPU), which is where the processing is done, and the secure element are encrypted.

“Well, as it turns out, in this particular instance, it wasn’t built to do so. “What you could do is put a tool in the middle that monitors the communications and intercepts them and then injects their own commands,” he said, adding: “That being said, with password phrases and basic security practices, even physical attacks disclosed by Unciphered will not affect OneKey users.” 

The company went on to emphasize that despite the fact that the vulnerability was concerning, the attack vector that was discovered by Unciphered cannot be used remotely. Instead, it necessitates “disassembly of the device and physical access through a dedicated FPGA device in the lab” in order to be possible to execute.

According to OneKey, after discussion with Unciphered, it was divulged that other wallets have been found to have similar difficulties. This was disclosed when it was discovered that other wallets had the same issue.

OneKey said that they have compensated Unciphered with bounties as a way of expressing gratitude for their contributions to the company’s security.

OneKey has said in a blog post that it has already taken significant precautions to secure the safety of its customers. These precautions include protecting customers against supply chain assaults, which occur when a hacker replaces a real wallet with one that is under their control.

Tamper-proof packaging for shipments has been one of the steps taken by OneKey, along with the use of Apple’s own supply chain service providers for the purpose of ensuring tight supply chain security management.

They have aspirations to add onboard authentication in the not too distant future and to update more recent hardware wallets with higher-level security components.

According to what was said by OneKey, the primary objective of hardware wallets has always been to safeguard the financial assets of users from cyber-attacks, computer viruses, and other potential threats; nevertheless, sadly, nothing can be completely secure.

“When we look at the entire manufacturing process of hardware wallets, from silicon crystals to chip code, from firmware to software, it’s safe to say that any hardware barrier can be breached with enough money, time, and resources; even if it’s a nuclear weapon control system.” “When we look at the entire manufacturing process of hardware wallets, from silicon crystals to chip code, from firmware to software,”

Source

Tagged : / / / / / /

Solana Developers Bifurcates Solana Liquidity Hub Serum after Hacking Incident on FTX

Serum, an open liquidity infrastructure known to be the most widely used liquidity hub in the Solana ecosystem, is now said to be forked after the fact that it may have been compromised due to the FTX hack.

A developer with a pseudonym, Mango Max, said on Twitter a “verified build of the same version has been made and deployed” on Nov 12. In addition, the upgrade authority and fee revenues have been changed and are now managed by a multi-sig controlled by a team of trusted developers. Serum (SRM) and MegaSerum (MSRM) tokens, and also fee discounts, were not altered and are now working as usual.

Given that FTX develops Serum, many Solana developers believe the hack may have affected the protocol. Anatoly Yakovenko, a developer of the Solana blockchain, stated that developers are racing to fork Serum’s code today and resume the protocol without the involvement of FTX. 

However, apparently, developers might have to require another version of Serum because the original can only be updated via a private key which is controlled by someone at FTX and not the Serum DAO. As a result of the FTX hack, that key may have been compromised. Yakovenko added, “Afaik, the devs that depend on serum are forking the program because the upgrade key to the current one is compromised.”  

Yakovenko is not the only developer who contributed to the forking matter. Mango Max said, “The serum program update key was not controlled by the SRM DAO but by a private key connected to FTX. At this moment, no one can confirm who controls this key and hence has the power to update the serum program, possibly deploying malicious code.”

Mango Max mentioned that he and some other developers have now decided to take matters into their hands and push for a “relaunch.” He also concluded that a few community projects, including Solape Finance, Open Serum, Jupiter Exchange, Switchboard, and Mango Markets, have announced that they are working to integrate with the fork.

While the plan to relaunch was happening, several Solana apps which depend on the Serum protocol began limiting their exposure. Jupiter, a widely used DEX aggregator exchange on Solana, informed users that it has turned off the use of Serum’s liquidity due to security concerns. Jupiter concluded by encouraging other integrators to do the same.

Other Solana-based applications, such as Mango Markets, Phantom, and Magic Eden, also announced they would stop depending on Serum for liquidity and have halted its use because of security concerns.

It’s no more news that the hack and bankruptcy of FTX caused so much damage in the industry, affecting other projects. Recently Galois Capital, a crypto hedge fund that deals in over-the-counter trading, disclosed that almost half of its capital is trapped in FTX.

Image source: Shutterstock

Source

Tagged : / / / / /

ImmuneFi Launches Whitehat Leaderboard to Incentivize Web3 Hackers

ImmuneFi, one of the most notable Web3 bug bounty protocols has announced the launch of a new Leaderboard feature for ethical hackers in Web3. 

IMMUNEFI2.jpg

As announced by the outfit, the Leaderboard will pull 20 of the most versatile Whitehat hackers in the Web3 ecosystem and rank them in order of the critical bugs they report through the ImmuneFi platform.

“We’re proud to release the Immunefi Whitehat Leaderboard showing the top 20 whitehats in web3!” ImmuneFi shared the announcement via its Twitter page 

Bug bounties have become a thing in the web3 ecosystem as protocols incentivize experienced hackers to help scour through their codes to see if there are vulnerabilities therein. As the industry evolved, ImmuneFi emerged, helping to organize Whitehat events in a way that was easy for both the protocols and the participants.

Whitehats are typically rewarded for their participation, and with this new feature, ImmuneFi said it will be giving the top hackers additional benefits.

“Whitehats who earn their spot through genius and hard work are eligible for further rewards, exclusive merch, paid trips, speaking opportunities, and more,” ImmuneFi affirmed.

ImmuneFi said the ranking for whitehats who submit bug reports through its platform will be based on three crucial factors including, the number of paid reports, the severity of paid reports, and total earnings. 

While the new leaderboard feature may not be an extra motivation for Whitehats to intensify their activities in the space, it certainly creates room for respect amongst the most elite of solution providers to hacking problems in the industry.

The appreciation of Whitehats cannot be overemphasized, a move that was recently underscored by the ApeCoin DAO. The ApeCoin DAO recently passed a vote that will see 1 million APE tokens set aside as bug bounty on ImmuneFi to incentivize whitehats to pour through its forthcoming staking protocol in a bid to see if there is a weak leak that might cause fund drain in the near future.

Image source: Shutterstock

Source

Tagged : / / / /

Binance Identifying Hackers behind $570m Crypto Exploit, Says CZ

Binance CEO Changpeng Zhao on Monday told CNBC media that the cryptocurrency exchange is getting closer to identify the identity of a hacker or hackers who organized a $570 million hack on its BNB blockchain early this month.

In an interview on CNBC’s “Squawk Box Europe” on Monday, Zhao said after obtaining some tips from law enforcement agencies on who the hacker(s) might be, Binance is now “narrowing down” the person or persons who facilitated the attack.

The attack occurred on a cross-chain bridge where users transfer digital assets from one blockchain to another, allowing the unknown hacker or hackers to make a withdrawal of 2 million of Binance’s BNB tokens worth around $570 million at that time.

Zhao said, “We’re still actually chasing … helping [authorities] to chase the bad players, working with law enforcement around the globe. Working with law enforcement is one of the ways that we can try to make the space safe.”

The CEO said law enforcements have given Binance some tips regarding who they think might be behind the attack, and now the exchange is “narrowing down.”

On October 7, a cross-chain bridge linking with BNB Chain (Binance Chain) was attacked, enabling hackers to move BNB tokens off the network.

During that time, Zhao said Binance intervened to limit the damage of the attack, suspending all transaction processing activities on its BNB Chain blockchain network after coordinating with network validators — entities or individuals who confirm transactions on the blockchain.

Zhao said with the intervention, BNB Chain was able to prevent most of the targeted funds from being stolen by the hacker. “The blockchain was able to freeze about 80% to 90% of it, so the actual loss of it was much smaller,” the CEO said.

The firm coordinated with BNB Chain validators to enact an upgrade. And that meant that the majority of the funds remained in the exploiter’s crypto wallet, while around $100 million was unrecovered.

The Binance hack was the latest in a string of major attacks targeting cross-chain bridges. According to Chainalysis blockchain analytics company, approximately $1.4 billion has been stolen due to cross-chain bridges since the beginning of 2022.

Image source: Shutterstock

Source

Tagged : / / / / / /

Binance Is Profiling Identities of Hackers behind $570m Crypto Exploit, Says CZ

Binance CEO Changpeng Zhao on Monday told CNBC media that the cryptocurrency exchange is getting closer to identify the identity of a hacker or hackers who organized a $570 million hack on its BNB blockchain early this month.

In an interview on CNBC’s “Squawk Box Europe” on Monday, Zhao said after obtaining some tips from law enforcement agencies on who the hacker(s) might be, Binance is now “narrowing down” the person or persons who facilitated the attack.

The attack occurred on a cross-chain bridge where users transfer digital assets from one blockchain to another, allowing the unknown hacker or hackers to make a withdrawal of 2 million of Binance’s BNB tokens worth around $570 million at that time.

Zhao said, “We’re still actually chasing … helping [authorities] to chase the bad players, working with law enforcement around the globe. Working with law enforcement is one of the ways that we can try to make the space safe.”

The CEO said law enforcements have given Binance some tips regarding who they think might be behind the attack, and now the exchange is “narrowing down.”

On October 7, a cross-chain bridge linking with BNB Chain (Binance Chain) was attacked, enabling hackers to move BNB tokens off the network.

During that time, Zhao said Binance intervened to limit the damage of the attack, suspending all transaction processing activities on its BNB Chain blockchain network after coordinating with network validators — entities or individuals who confirm transactions on the blockchain.

Zhao said with the intervention, BNB Chain was able to prevent most of the targeted funds from being stolen by the hacker. “The blockchain was able to freeze about 80% to 90% of it, so the actual loss of it was much smaller,” the CEO said.

The firm coordinated with BNB Chain validators to enact an upgrade. And that meant that the majority of the funds remained in the exploiter’s crypto wallet, while around $100 million was unrecovered.

The Binance hack was the latest in a string of major attacks targeting cross-chain bridges. According to Chainalysis blockchain analytics company, approximately $1.4 billion has been stolen due to cross-chain bridges since the beginning of 2022.

Image source: Shutterstock

Source

Tagged : / / / / / /

Binance Clarifies Users Assets Safe on Accounting System Vulnerability Incident

Binance clarified on Sunday, September 18, that the “Binance Accounting System Vulnerability” incident previously stated by the Helium Foundation occurred on Binance.US, and Binance.com found no related problems, emphasising that user assets are safe.

The Helium Foundation said a bug found in Binance’s accounting system led to the misidentification of Helium Network’s MOBILE tokens for higher-value HNT, with users mistakenly receiving around $20 million worth of HNT tokens.

At the time of writing, Binance.US officials have not yet made any official response to the incident.

Arman Dezfuli-Arjomandi, a podcast host focusing on the Helium ecology, criticised Binance.US for actively maintaining communication with customers, opening up the transparency of relevant information as soon as possible, and announcing relevant compensation plans. exist

The podcaster revealed in a post on his official Twitter that: “Due to a bug in the exchange system, each deposited MOBILE token gets 1 HNT (1 MOBILE is only worth <0.001 HNT). The attackers dumped HNT tokens that did not belong to them into the market, causing huge downward pressure on the price.”

Founded in 2013, the Helium Network’s ever-expanding network of hotspots enables anyone to own and operate a wireless network of low-power Internet of Things (IoT) devices, while customers can build and participate by using a cryptographic token called the HNT award network for profit.

The HNT native token is a reward paid by Helium to hotspot hosts, while the MOBILE tokust launched last month, is a reward paid to Helium 5G hotspot infrastructure operators. Currently, there is a lack of liquidity in the market for MOBILE tokens.

Image source: Shutterstock

Source

Tagged : / / / / /

Binance Clarifies Users Assets Safe on Accounting System Vulnerability Incident

Binance clarified on Sunday, September 18, that the “Binance Accounting System Vulnerability” incident previously stated by the Helium Foundation occurred on Binance.US, and Binance.com found no related problems, emphasising that user assets are safe.

The Helium Foundation said a bug found in Binance’s accounting system led to the misidentification of Helium Network’s MOBILE tokens for higher-value HNT, with users mistakenly receiving around $20 million worth of HNT tokens.

At the time of writing, Binance.US officials have not yet made any official response to the incident.

Arman Dezfuli-Arjomandi, a podcast host focusing on the Helium ecology, criticised Binance.US for actively maintaining communication with customers, opening up the transparency of relevant information as soon as possible, and announcing relevant compensation plans. exist

The podcaster revealed in a post on his official Twitter that: “Due to a bug in the exchange system, each deposited MOBILE token gets 1 HNT (1 MOBILE is only worth <0.001 HNT). The attackers dumped HNT tokens that did not belong to them into the market, causing huge downward pressure on the price.”

Founded in 2013, the Helium Network’s ever-expanding network of hotspots enables anyone to own and operate a wireless network of low-power Internet of Things (IoT) devices, while customers can build and participate by using a cryptographic token called the HNT award network for profit.

The HNT native token is a reward paid by Helium to hotspot hosts, while the MOBILE tokust launched last month, is a reward paid to Helium 5G hotspot infrastructure operators. Currently, there is a lack of liquidity in the market for MOBILE tokens.

Image source: Shutterstock

Source

Tagged : / / / / /

Binance Clarifies Accounting System Vulnerability Happened to Binance.US

Binance clarified on Sunday, September 18, that the “Binance Accounting System Vulnerability” incident previously stated by the Helium Foundation occurred on Binance.US, and Binance.com found no related problems, emphasising that user assets are safe.

The Helium Foundation said a bug found in Binance’s accounting system led to the misidentification of Helium Network’s MOBILE tokens for higher-value HNT, with users mistakenly receiving around $20 million worth of HNT tokens.

At the time of writing, Binance.US officials have not yet made any official response to the incident.

Arman Dezfuli-Arjomandi, a podcast host focusing on the Helium ecology, criticised Binance.US for actively maintaining communication with customers, opening up the transparency of relevant information as soon as possible, and announcing relevant compensation plans. exist

The podcaster revealed in a post on his official Twitter that: “Due to a bug in the exchange system, each deposited MOBILE token gets 1 HNT (1 MOBILE is only worth <0.001 HNT). The attackers dumped HNT tokens that did not belong to them into the market, causing huge downward pressure on the price.”

Founded in 2013, the Helium Network’s ever-expanding network of hotspots enables anyone to own and operate a wireless network of low-power Internet of Things (IoT) devices, while customers can build and participate by using a cryptographic token called the HNT award network for profit.

The HNT native token is a reward paid by Helium to hotspot hosts, while the MOBILE tokust launched last month, is a reward paid to Helium 5G hotspot infrastructure operators. Currently, there is a lack of liquidity in the market for MOBILE tokens.

Image source: Shutterstock

Source

Tagged : / / / / /

Chainalysis Partners with US Regulators to Recover $30m from Ronin Loot

Blockchain analytics and security service provider, Chainalysis has helped in the recovery of $30 million in funds stolen from the Ronin Bridge by the elite North Korean hacking outfit Lazarus Group.

CHAIN2.jpg

The Chainalysis’s update is yet another attempt to frustrate the laundering activities of the Lazarus Group following the $600 million drain of the Ronin Bridge back in March.

With diligence and advanced tracking tools, Chainalysis could monitor the flow of funds from the intermediate wallets into which the initial funds were siphoned. 

“With the help of law enforcement and leading organizations in the cryptocurrency industry, more than $30 million worth of cryptocurrency stolen by North Korean-linked hackers has been seized. This marks the first time ever that cryptocurrency stolen by a North Korean hacking group has been seized, and we’re confident it won’t be the last,” Chainalysis’s Erin Plante said in a Blog Post on Thursday.

The $30 million funds recovery was made despite the laundering complications associated with the Lazarus Group. The recovered cash is a testament to the openness of blockchain technology compared to traditional financial systems.

Power of Collaboration

Chainalysis said it drafted help from a number of industry stakeholders and government agencies to help track and recover the funds.

The sanctions placed by the United States Treasury Department’s Office of Foreign Assets Control (OFAC) on the two most prominent crypto mixing services, Blender.io and Tornado Cash, left the Lazarus hackers with a limited option to launder their proceeds.

Chainalysis described the recovery of the $30 million as the first of the many confiscations to come as it works to make the crypto ecosystem a safe place for all. 

While the Ronin Network has reopened its bridge following the hack, this cash recovery brings the total recovered funds to $35.8 million on behalf of Ronin Network. Binance exchange had earlier helped in the recovery of $5.8 million a few weeks after the hack event.

Image source: Shutterstock

Source

Tagged : / / / /

Naoris Protocol Secures $11.5 m Funding, Enhancing Web3 Networks Security

Portuguese cybersecurity protocol Naoris announced on Wednesday that it has raised $11.5 million in a funding round led by Tim Draper’s Draper Associates.

Other high-profile investors, like Holt Xchange, Holdun Family Officer, SDC Management, Expert Dojo, Uniera, Level One Robotics, and multiple angel investors, including some “well-known” NBA stars and tennis players participated in the funding round.

David Carvalho, the founder and CEO of Naoris Protocol, said that the cybersecurity company plans to use the fresh funding to create a decentralised proof-of-security consensus mechanism by the end of 2022 as well as expand and scale its operations.

The executive elaborated that Naoris Protocol will use the capital to develop an AI-based “cybersecurity mesh” that it promises will protect web3 networks better as they grow.

With its blockchain-based cybersecurity mesh, Naoris aims to transform existing web2 networks that are highly centralised into decentralised networks made up of “trusted machines” that can help to validate one another.

Naoris Protocol is trying to solve the current problem whereby today’s computer networks can never be completely secured. That is because an attacker only needs to compromise a single device within any network to gain access to a business’s system. This means that the more a network grows, the more entry points emerge that attackers can easily use to gain access to a network and monitor or steal sensitive information.

Naoris protocol relies on blockchain and its decentralised proof of security consensus mechanism to transform each device into a trusted validator node, which is then tasked with validating all the other devices within the network.

 This decentralised technique works because the more the network grows, the more validators there, thus increasing its security. It is a distributed security environment where every device continuously validates every other device in the network. This brings trust across all devices, thus securing a baseline layer and enabling trust and risk mitigation to be enabled in every element of the network. Since each device is basically a security watchdog for every other, they can act in synchronous harmony while enforcing and securely adhering to security policies.

The company says it is chasing to tap a $10 trillion global opportunity — it is estimated that cybercrime will cost businesses worldwide $10.5 trillion annually by 2025.

Carvalho commented: “Our vision is to leverage the cryptographic power of the many through blockchain to fundamentally change how trust happens between devices and applications on the internet.”

Naoris Protocol plans to create and run the decentralised system by the end of this year before rolling out its full product to clients across the Web3, critical infrastructure, banking, healthcare, government sectors, and other industries by mid-2023.

Image source: Shutterstock

Source

Tagged : / / / / / / /
Bitcoin (BTC) $ 26,961.22 1.80%
Ethereum (ETH) $ 1,670.96 2.87%
Litecoin (LTC) $ 65.68 2.78%
Bitcoin Cash (BCH) $ 232.18 0.72%