EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion

08/31/2021
by   Nikolay Ivanov, et al.
0

Hardware wallets are designed to withstand malware attacks by isolating their private keys from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a clipboard. To prevent such attacks, a hardware wallet asks the user to verify the recipient address shown on the wallet display. Since crypto addresses are long sequences of random symbols, their manual verification becomes a difficult task. Consequently, many users of hardware wallets elect to verify only a few symbols in the address, and this can be exploited by an attacker. In this work, we introduce EthClipper, an attack that targets owners of hardware wallets on the Ethereum platform. EthClipper malware queries a distributed database of pre-mined accounts in order to select the address with maximum visual similarity to the original one. We design and implement a EthClipper malware, which we test on Trezor, Ledger, and KeepKey wallets. To deliver computation and storage resources for the attack, we implement a distributed service, ClipperCloud, and test it on different deployment environments. Our evaluation shows that with off-the-shelf PCs and NAS storage, an attacker would be able to mine a database capable of matching 25 fitting fake address. For responsible disclosure, we have contacted the manufactures of the hardware wallets used in the attack evaluation, and they all confirm the danger of EthClipper.

READ FULL TEXT

page 1

page 3

research
01/20/2020

A Secure and Smart Framework for Preventing Ransomware Attack

Nowadays security is major concern for any user connected to the interne...
research
06/12/2022

RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis

Encryption ransomware has become a notorious malware. It encrypts user d...
research
05/07/2020

Defending Hardware-based Malware Detectors against Adversarial Attacks

In the era of Internet of Things (IoT), Malware has been proliferating e...
research
04/24/2020

ML-driven Malware that Targets AV Safety

Ensuring the safety of autonomous vehicles (AVs) is critical for their m...
research
10/18/2022

Automatic Detection of Fake Key Attacks in Secure Messaging

Popular instant messaging applications such as WhatsApp and Signal provi...
research
06/06/2018

CMOS: Dynamic Multi-key Obfuscation Structure for Strong PUFs

Strong physical unclonable function (PUF) is a promising solution for de...
research
06/06/2018

DMOS-PUF: Dynamic Multi-key-selection Obfuscation for Strong PUFs against Machine Learning Attacks

Strong physical unclonable function (PUF) is a promising solution for de...

Please sign up or login with your details

Forgot password? Click here to reset