Kraken found KeepKey wallet vulnerability to extract seed phrases

KeepKey

Kraken Security Labs said they found a way to extract seed phrases from KeepKey hardware wallets.

According to them, the process takes only 15 minutes.

However, in order to carry out the plan, the attackers need physical access to the device and an inexpensive device that can cause a microcontroller to malfunction due to a voltage drop.

Experts added that the vulnerability is inherent in KeepKey microcontrollers and to modernize the devices it is necessary to eliminate it.

Kraken representatives told KeepKey about the problem, but they replied that their task was to “protect user keys from remote attacks.” first of all, cybersecurity experts advise not to give anyone physical access to KeepKey wallets, and also try not to lose the device.

Recommended Related Articles:

This post is also available in: Русский

Leave a Reply

Your email address will not be published. Required fields are marked *