Search content
Sort by

Showing 15 of 15 results by Electrum_LedgerNS_Issue
Post
Topic
Board Hardware wallets
Re: Anyone a Ledger Nano S expert?
by
Electrum_LedgerNS_Issue
on 21/02/2020, 10:31:33 UTC
At some point two years ago, before Ledger introduced the confirmation of the receiving address on the device, there was an attack where a malicious script would change the address shown in the Chrome app (and it was very easy to do as well ... a few lines of code).
I don't think that's the case. As o_e_l_e_o already said, after 2 years, funds have not been moved yet.


Then the derivation path problem is more likely indeed, he can check the edit of my reply and try this.
Post
Topic
Board Hardware wallets
Re: Anyone a Ledger Nano S expert?
by
Electrum_LedgerNS_Issue
on 21/02/2020, 10:19:59 UTC
    I have had a problem with my Ledger Nano S for over 2yrs now and Ledger Support can't even help me.

    My Ledger Nano S issued me a Bitcoin Segwit receive address.

    I transferred my coins to this address and have never had access to them.

    My Ledger has never recognised this address since it issued it to me and according to Ledger Support they say that this address does not belong to my xpub.

    The coins are still sat at this address - can anyone help me recover them?

    I sincerely doubt that your Ledger would generate an address not related to your xpub.
    It seems so, unless you have any other suggestions that have not been tried already.


    At some point two years ago, before Ledger introduced the confirmation of the receiving address on the device, there was an attack where a malicious script would change the address shown in the Chrome app (and it was very easy to do as well ... a few lines of code).
    https://thenextweb.com/hardfork/2018/02/06/cryptocurrency-wallet-ledget-hardware/


    Anyway, your best (and only) hope at this point is that you had some sort of derivation path issue.
    On an offline machine, you can write a script which will regenerate addresses from your mnemonic seed given a derivation path (you can use https://github.com/dan-da/hd-wallet-derive).
    Ledger can't do this, as they only have the xpub at the level after the hardened derivation paths, and they can't possibly ask for the mnemonic seed to do this for you.
    You will have to do your research on possible derivation paths used at that time, extend search ranges and hope for the best (obviously, if one of the addresses you generated is the one where you send the funds to, then getting them back will be easy).[/list]
    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 21/02/2020, 09:54:12 UTC
    I see. I'll have to arrive home and I'll look more things up to see if I find anything helpful.

    I'm honestly surprised Ledger didn't try helping you out with finding where the problem is, knowing it could turn out to be a huge vulnerability nobody's found before.. especially because it's supposed not to be able to send any tx without physical confirmation..

    Well, they tried, but I guess that without having access to the machine they only can try to replicate the bug using the high-level specs (Windows 10 1903/Electrum 3.3.8/Device firmware 1.6.0 BTC app 1.3.16).
    Considering how widely used this setup is, and given that I didn't manage to find anything similar reported in the last 6m/1y, it's not so surprising that it's very hard to replicate otherwise hundres/thousands of reports would be made ...

    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 21/02/2020, 09:10:38 UTC
    It's not that you've downloaded a compromised wallet. From my understanding, there was an exploit in the official version of Electrum that let hackers display a fake update notification. Those who've updated through that notification have updated to a modified version of Electrum.

    And if I got it all right, I believe the servers removed by MB were servers through which you've got the malicious update of your Electrum.

    If you read the MalwareBytes article, you'd get an idea of what has probably happened.


    Yes the malicious servers were sending a link to a malware advertising it as update in the wallet's GUI, but I didn't get this sort of message as I only installed the 3.3.8 version which doesn't allow this anymore (and thus didn't do the "update"). So even if the two servers mentioned were part of that attack, I don't see what they could have done in my case ...
    And even if the 3.3.8 I installed from the official website was still a malware (because I didn't check the PGP signature on my initial download) I still can't see how the fake Electrum managed to hide the fraud transaction in Ledger's display.

    If anyone could modify Electrum in a way in which it can by itself do this (without having access to the physical device) then I would consider my problem "solved" ...
    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 21/02/2020, 08:57:31 UTC
    So I gave a Google search of the two servers you've mentioned in the third post of this thread. A Google search of "exs.ignorelist.com phishing" resulted in a report from MalwareBytes, and I don't believe it's a coincidence.

    Something smells fishy to me here. I've taken a look over all the posts on this thread and, according to #4, the address 34Y6nb5SRxAGkozUpyKa59Qq7f87acC98s, which OP confirmed was one of the addresses he used as an input in one of his transactions, is listed right next to its private key on https://bitkeys.work/?page=725.

    I'm confused, to be honest.


    Edit: apparently the website generates a random private key for the richest wallets, hoping to collide with the address.. I thought it was one of these "all BTC private keys" websites.

    Still, the Google search I've done linked me to the report above. Hence, OP might've downloaded an infected Electrum wallet..

    Edit 2: I've done another search for the second server MalwareBytes categorized as a "Phishing". According to this link I found,

    Code:
    # As of Dec 2018 criminals carry out phishing attacks against vulnerable versions of Electrum asking them to download malware versions of Electrum.
    # For abuse desks around the world it is hard to determine whether or not a certain domain name or IP address participates in this scam.
    # Perpetrators have also used faked messages with manipulated screenshots to claim legit server domains would take part in sending phishing links, when this is not the case.
    # For more information about the issue please see https://blog.malwarebytes.com/cybercrime/2019/04/electrum-bitcoin-wallets-under-siege/
    #
    # This is a list of electrum servers scanned for whether they distribute malware links or not
    # If you work at an abuse desk and have questions or would like to reproduce these results yourself please get in touch with Electrum Technologies at electrumdev@gmail.com
    #
    # Fri 21 Feb 00:44:02 CET 2020
    #
    # Valid servers which are working as expected (no scam):
    # There are still some false-positives of scam servers detected as legitimate:
    #
    0.btc.dev
    104.244.222.228
    104.248.139.211
    109.248.206.13
    142.93.6.38
    148.251.22.104
    157.245.172.236
    167.172.226.175
    167.172.42.31
    178.62.80.20
    185.64.116.15
    198.27.70.66
    213.109.162.82
    2AZZARITA.hopto.org
    2a01
    2a02
    2a03
    2ex.digitaleveryware.com
    52.1.56.181
    68.183.188.105
    VPS.hsmiths.com
    bitcoin.alephnullptr.net
    bitcoin.lukechilds.co
    blkhub.net
    btc.electroncash.dk
    btc.groftware.com
    btc.litepay.ch
    btc.skynetcloud.site
    caleb.vegas
    crypto.no-ip.eu
    currentlane.lovebitco.in
    dxm.no-ip.biz
    e2.keff.org
    ecdsa.net
    electrum.aantonop.com
    electrum.bitblog.io
    electrum.bitkoins.nl
    electrum.dnshome.de
    electrum.emzy.de
    electrum.fedaykin.eu
    electrum.hodlister.co
    electrum.hsmiths.com
    electrum.networkingfanatic.com
    electrum.nute.net
    electrum.papabyte.com
    electrum.poiuty.com
    electrum.srvmin.network
    electrum.vom-stausee.de
    electrum2.hodlister.co
    electrum3.hodlister.co
    electrum5.hodlister.co
    electrumx-core.1209k.com
    electrumx.alexridevski.net
    electrumx.electricnewyear.net
    electrumx.kenrufe.com
    electrumx.schulzemic.net
    electrumx3.nmdps.net
    electrumx50102.aspinall.io
    endthefed.onthewifi.com
    esx.geekhosters.com
    exs.ignorelist.com
    fortress.qtornado.com
    gall.pro
    hodlers.beer
    kirsche.emzy.de
    ndnd.selfhost.eu
    noveltybobble.coinjoined.com
    ns3079938.ip-217-182-196.eu
    ns3079942.ip-217-182-196.eu
    ns3079943.ip-217-182-196.eu
    ns3079944.ip-217-182-196.eu
    satoshi.fan
    shogoth.no-ip.info
    thanos.xskyx.net
    v22019051929289916.bestsrv.de
    xtrum.com
    }
    #
    #
    #IP-Addresses of servers in DNS-records identified to be phishing (with number of occurences in first column):
    #
         10 91.211.88.104
          9 91.211.88.115
         10 91.211.88.132
         10 91.211.88.239
         12 91.211.88.249
         11 91.211.88.66
         12 91.211.89.12
         12 91.211.89.37
         14 91.211.89.39
         12 91.211.89.84
          9 91.211.89.85
         10 91.211.89.91
    #
    #
    #IP-Addresses of servers in DNS-records which have been shut down (Port 50002 closed) but are still listed in DNS:
    #
    #
    #Scam servers which are sending a phishing URL (under certain conditions):
    #The list is reliable with no false-positives:
    #Abuse desks: Please block these domains
    #
    ELEX01.blackpole.online
    antumbra.se
    arihanc.com
    asis.io
    aspinall.io
    btc.asis.io
    btc.smsys.me
    cryptohead.de
    electrum.antumbra.se
    electrum.be
    electrum.cutie.ga
    electrum.meltingice.net
    electrum.online
    electrum.poorcoding.com
    electrumx.antumbra.se
    electrumx.arihanc.com
    electrumx.asis.io
    electrumx.aspinall.io
    electrumx.cryptohead.de
    electrumx.electrum.be
    electrumx.electrum.online
    electrumx.ga
    electrumx.luggs.co
    electrumx.meltingice.net
    electrumx.ml
    electrumx.nmdps.net
    electrumx.poorcoding.com
    electrumx.smsys.me
    [Suspicious link removed]
    electrumx1.antumbra.se
    electrumx1.arihanc.com
    electrumx1.asis.io
    electrumx1.aspinall.io
    electrumx1.cryptohead.de
    electrumx1.electrum.be
    electrumx1.electrum.online
    electrumx1.luggs.co
    electrumx1.meltingice.net
    electrumx1.nmdps.net
    electrumx1.poorcoding.com
    electrumx1.smsys.me
    electrumx2.antumbra.se
    electrumx2.arihanc.com
    electrumx2.asis.io
    electrumx2.aspinall.io
    electrumx2.cryptohead.de
    electrumx2.electrum.be
    electrumx2.electrum.online
    electrumx2.luggs.co
    electrumx2.meltingice.net
    electrumx2.nmdps.net
    electrumx2.poorcoding.com
    electrumx2.smsys.me
    electrumx3.antumbra.se
    electrumx3.arihanc.com
    electrumx3.asis.io
    electrumx3.aspinall.io
    electrumx3.cryptohead.de
    electrumx3.electrum.be
    electrumx3.electrum.online
    electrumx3.luggs.co
    electrumx3.meltingice.net
    electrumx3.poorcoding.com
    electrumx4.antumbra.se
    electrumx4.arihanc.com
    electrumx4.asis.io
    electrumx4.aspinall.io
    electrumx4.cryptohead.de
    electrumx4.electrum.be
    electrumx4.electrum.online
    electrumx4.luggs.co
    electrumx4.meltingice.net
    electrumx4.nmdps.net
    electrumx4.poorcoding.com
    electrumx5.antumbra.se
    electrumx5.arihanc.com
    electrumx5.asis.io
    electrumx5.aspinall.io
    electrumx5.cryptohead.de
    electrumx5.electrum.be
    electrumx5.electrum.online
    electrumx5.luggs.co
    electrumx5.meltingice.net
    electrumx5.nmdps.net
    electrumx5.poorcoding.com
    electrumx50102.antumbra.se
    electrumx50102.arihanc.com
    electrumx50102.asis.io
    electrumx50102.cryptohead.de
    electrumx50102.electrum.be
    electrumx50102.electrum.online
    electrumx50102.luggs.co
    electrumx50102.meltingice.net
    electrumx50102.nmdps.net
    electrumx50102.poorcoding.com
    electrumx50102.smsys.me
    electrumx50105.antumbra.se
    electrumx50105.arihanc.com
    electrumx50105.asis.io
    electrumx50105.aspinall.io
    electrumx50105.cryptohead.de
    electrumx50105.electrum.be
    electrumx50105.electrum.online
    electrumx50105.luggs.co
    electrumx50105.meltingice.net
    electrumx50105.nmdps.net
    electrumx50105.poorcoding.com
    electrumx50105.smsys.me
    electrumx995.antumbra.se
    electrumx995.arihanc.com
    electrumx995.asis.io
    electrumx995.aspinall.io
    electrumx995.cryptohead.de
    electrumx995.electrum.be
    electrumx995.electrum.online
    electrumx995.luggs.co
    electrumx995.meltingice.net
    electrumx995.nmdps.net
    electrumx995.poorcoding.com
    electrumx995.smsys.me
    icarus.tetradrachm.net
    luggs.co
    meltingice.net
    nmdps.net
    node.arihanc.com
    oneweek.duckdns.org
    poorcoding.com
    s2.noip.pl
    s5.noip.pl
    smsys.me
    us.electrum.be

    In other words, OP has fallen victim to a phishing attack... Press CTRL + F and look for "exs.ignorelist.com" and "endthefed.onthewifi.com", you can find them in the code above. I'm sorry, OP. Sad Please take measures ASAP to secure all your funds before they'll steal more out of your wallets..



    Considering your wallet is compromised, I can assume you might also have other compromised softwares installed on your computer. Therefore, I'd suggest switching the internet off on the computer you've got Electrum on (or plugging out the Ethernet cable), backing up everything important (don't forget to backup the wallet.dat files!!!!) and doing a fresh, SECURE complete wipe out and reinstall of the operating system.

    If you connect your computer to the internet again after reinstalling the OS, please make sure the software you install is legit.

    We're talking about very large amounts at stake, so taking appropriate measures against phishing might save you from another disaster. I really wish I could've helped with the recovery of your funds..

    Hi,
    Thank you for looking into this.
    I don't think it's that simple unfortunately - I didn't download a different version than the 3.3.8 which I installed initially from the official website, and besides showing me a message in a previous version of Electrum, a server can't really do much as far as I know ...

    Also, dont think the private keys were exposed, as the attacker would've transferred out all the funds, which wasn't the case.
    Can't help but think that it's somehow related to the fact that when validating a transaction with multiple outputs you have two "screens" in Ledger but when validating a single output transaction there is only one.
    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 20/02/2020, 10:58:57 UTC
    from where you bought your Ledger? maybe it is fake, or you upgraded firmware with a fake one that do dirty thing just once (just a suggestion)
     
    check your device:
    https://support.ledger.com/hc/en-us/articles/360002481534-Check-if-device-is-genuine
    https://support.ledger.com/hc/en-us/articles/115005321449

    also look here:
    https://www.reddit.com/r/ledgerwallet/comments/bhb2o2/warning_weve_detected_a_malware_that_locally/


    Bought the Ledger Nano S from their website more than 2 years ago, did multiple transactions during this time with it without any issues.
    Can't exclude the fact that the firmware was somehow compromised during this time, even if I don't know how it's possible to do it.
    Didn't open the device to check if it's genuine yet, in case it gets to the police and they need it.

    About the malware that replaces Ledger Live and asks for the seed (or any other malware/social engineering attack that asks for the seed), it didn't happen ... 


    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 20/02/2020, 09:29:30 UTC
    Have you tried creating a wallet account on Ledger Live to see if the BTC shows up as missing there too? If it's an Electrum bug, it must show up in Ledger Live. I think Magnum Wallet (no need to download it) works as well with the Bitcoin wallet on your Nano S. Suggesting this in order to see whether it's Electrum's fault or there's a serious security risk with the hardware wallet. If the latter is the case, then I gotta put mine away for the time being.  Shocked

    Hi,
    The "false" transaction appears in the Ledger Live as well, even with "Extended account search" (what does this even do precisely ? what derivation paths does it look into ?) and Custom gap limit = 999 ...
    Additionally, I generated about 50m addresses from my mnemonic with the most used derivation paths and variable ranges where I thought the coins might be, but didn't manage to find this address ...

    I honestly looked a lot into this and I couldn't find anything similar to this described over the internet (well, at least not recently) so I think that the conditions needed to replicate this bug/exploit are very specific, I wouldn't worry about it too much if i was you ... (hell, if you manage to replicate this, you can claim a bounty with Ledger which in most cases will be bigger than the lost amount ...).
    When sending the remaining coins to a custodian afterwards, I restored my wallet from the seed to a new Ledger device and used the new one to sign on an offline machine the last transaction which went through properly, so I guess you can do this if you're worried ...

    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 20/02/2020, 08:42:48 UTC
    Actually it is very well imaginable that your OS is compromised.

    Nothing stops malware from generating transactions and sending them to your ledger for your to accept/verify them.
    A locktime of 1 could mean that the person creating the malware/transaction simply just wanted to have the tx to be confirmed as fast as possible (i.e. can be confirmed in the next block) without checking the current block etc.

    The safety which comes from using a hardware wallet is, that the transaction details shown to you on the HW screen can not be manipulated and that you actively have to confirm the transactions by pressing a button.
    But if your OS is compromised, he definitely can just create transactions and send them to your HW wallet in hope for you to accept them. Waiting until one is created by electrum seems a not too dumb move which might have caught some people off-guard.


    And honestly i'd think that your OS is compromised, than that this is a bug from electrum and/or ledger.


    Thank you for your answers.
    Indeed, when I make any transaction I assume my OS is compromised so I check properly the details on my screen.
    Even in this case, I did check them properly (the proof being that the first intended transaction was properly sent).
    The only way for me to accidentally accept another transaction would be after pressing the "Validate transaction" for the first one, to press "accidentally" a few times the right button without looking at the new transaction details and then validate it by pressing both buttons, which, while not impossible, is very hard to believe ...

    I'm still scratching my head on this btw, so if someone at least has other ideas on how it might have happened (even assuming compromised OS etc) please let me know.
    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 13/02/2020, 14:31:09 UTC
    Electrum_LedgerNS_Issue, is there any new information regarding your case? I see that the problematic transaction is still intact/unspent which can be a good sign (if it is not in the classical hack), which means that there is still hope for a solution.

    I have something similar in past when I play with change address from Ledger, and one transaction was invisible because Ledger Chrome app was set to not check all addresses. I fix that in Electrum with increasing the gap limit. If only the solution would be so easy in your case...

    Hi Lucius,
    Unfortunately nothing new for now. I've generated about 50m addresses from my mnemonic seed by now on the derivation ranges I thought probable, but no luck so far.
    I'm pretty much trying to understand what happened at this point, can't do much without knowing what went wrong, generating addresses is a shot in the dark.
    I guess I'll need to get the help of a digital forensic and try to find a trace of the receiving address on my machine.
    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 11/02/2020, 15:13:14 UTC
    These "pages" seem to be Electrum servers (you can see them in your own server list probably).
    When I downloaded Electrum I didn't check the PGP signature initially.
    After the incident, I looked into my browser history (the link was correct), accessed the link from history, downloaded again the installer and checked the signature which verified.
    It's possible my initial install was corrupted, not very probable though.

    What is weird that I personally have never been alerted by MB (using the premium version) regarding the Electrum servers, which may just be a coincidence, even though I have the servers set to automatic.

    I must admit I've never heard of change path attacks, and it will be really weird if this is the case here, because that's supposedly should be fixed. If I understand correctly, in this case, the attacker actually initiates a transaction that does not allow him to access to the funds, but by changing the path hides the funds and then requests a ransom for info where coins are located.

    I cannot technically say how this can be done, but there may be a possibility that some of the servers you mentioned may still be guilty of this, although this is just one of the options.

    I see you've taken the right steps in trying to find where the coins ended, and I really hope you can find them. I would only advise others to be careful until it is revealed exactly what happened in this case.


    I'm hoping more that it's a bug instead of a change path attack (which indeed is supposed to be fixed, so at the very least it's not exactly the same attack), but given that the Ledger is supposed to NOT show only transactions towards the change addresses, I have some hope albeit small.

    Thanks for your input.

    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 11/02/2020, 11:04:20 UTC
    Thanks for your reply.
    Indeed, I searched my PC trying to find traces of the address string and I didn't get anything, thus either a script injected it then deleted itself either it was derived by Ledger somehow with a wrong derivation path.

    The hardware wallet should be safe to use even on an infected computer, but it's just an assumption based on what we know, which certainly doesn't mean that some clever hacker didn't find a way to circumvent the protection that Nano S should provide.

    Now that you have shown us both transactions, I can see that these are really large amounts and that you may be the victim of a very targeted attack, so you have to wonder who all knew that you owned such a significant amount of BTC.

    On the other hand, when I look at the first legitimate transaction, I notice that second transaction is had fee of only 200 satoshi, compared to the first one that had a 5x higher fee. Hackers in such cases usually place a maximum fee to get confirmations as soon as possible. Considering this, it is possible that this is some kind of bug in Ledger or in Electrum, and that coins are still in your wallet, but in an address that you can't see for some reason.

    I can confirm that both of the pages you cited are really blocked by MB, one because it contains exploit and the other because of phishing. If MB is blocking those sites, do you visit them or this is happening when you surf on some other site which is maybe try to redirect you to that sites?

    Can you confirm that you downloaded Electrum from the official site https://electrum.org/#home , and did you maybe verify GPG signatures of downloaded files before installing?

    Hi,

    These "pages" seem to be Electrum servers (you can see them in your own server list probably).
    When I downloaded Electrum I didn't check the PGP signature initially.
    After the incident, I looked into my browser history (the link was correct), accessed the link from history, downloaded again the installer and checked the signature which verified.
    It's possible my initial install was corrupted, not very probable though.
    Also, I'm running an algo on an offline machine right now with the seed to derive possible addresses.
    Parameters: m/bip'[0,44,48,49,84]/0'/account'[0-100]/visibility[0,1]/index[0-5000]
    Will also test indexes up to 50k on 49 afterwards (based on this github.com/LedgerHQ/ledger-app-btc/pull/90).
    If you have any other ideas where to look for, shoot.

    Also, it is indeed possible that It was a targeted attack, but unfortunately this doesn't get me any further in understanding how it was done Sad

    Thanks
    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 10/02/2020, 21:20:09 UTC
    That is indeed a puzzle... I've honestly never seen anything like this. I would hazard a guess that it was a bug... as the UTXO generated is still unspent and given the current price of BTC, I would expect it would have been moved/sold by now if it was 'stolen'.

    Quite how you can "accidentally" sign a second transaction is a complete mystery and it seems it would be incredibly difficult to replicate the issue. I've certainly not experienced anything similar.

    If Ledger support are unable to assist, I doubt anyone here will be. Undecided Have you tried raising an issue on the Electrum github? https://github.com/spesmilo/electrum/issues Huh

    Yes, I'm banging my head against the wall for two weeks now and can't still figure what happened (bug or exploit ?) or at least how ...
    Didn't raise an issue in the github, will do.
    Thanks for your reply
    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 10/02/2020, 21:03:22 UTC
    Did you also create this transaction today?: https://www.blockchain.com/btc/tx/362b50e056ec340a8be9204885a9c8c65d333c494d8b3f791faff7d8eeb8c255 Huh

    It appears that another lot of UTXOs from that address: 34Y6nb5SRxAGkozUpyKa59Qq7f87acC98s (along with UTXOs from other addresses) were consolidated into 39ycTMCUiC7yqABzR1sdaTbUhsGFi7cQ2Z. If you didn't execute this transaction, it's likely that your seed has indeed been compromised. Undecided

    Yes that was me, I moved everything before posting the transaction IDs, seed still safe ...
    Post
    Topic
    Board Electrum
    Re: Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 10/02/2020, 15:24:29 UTC
    I have to admit that this is the first time I've ever heard of a case like this, and it's really weird this happened to you. I see that you are not a beginner and that you understand the basics on which a hardware wallet works, so I will not doubt that everything you wrote is true.

    Assuming you have legitimate software (Electrum, firmware in Nano S and legit Windows 10) I would personally assume it was some sophisticated malware that somehow bypassed the protection Ledger had and added another transaction. Another possibility is that it's some kind of internal bug that is a combination of some incredibly strange circumstances that occurred during your legitimate transaction. Still, the question remains, where did this new address come from if it wasn't some malware?

    I understand your privacy concerns, but it would still be advisable to put the ID of both transactions, there are members who can conclude something from the transactions. Are you using any kind of antivirus protection, have you tried scanning your computer for possible virus/malware?

    I used the Nano S in combination with Electrum a few days ago, and the transaction went pretty normal.


    Thanks for your reply.
    Indeed, I searched my PC trying to find traces of the address string and I didn't get anything, thus either a script injected it then deleted itself either it was derived by Ledger somehow with a wrong derivation path.

    I've tried recreating the bug the same day with a different Ledger which had the keys on a much smaller account and didn't manage to recreate the behavior.

    As for security, only Avast and the Windows firewall at the time when the incident happened.
    Downloaded Malwarebytes after it happened and ran a scan - only some PUPs but the realtime protection detected 2 things afterwards: Malicious site "exs[dot]ignorelist[dot]com pointing to electrum-3.3.8.exe and qualified as an exploit and endthefed[dot]onthewifi[dot]com pointing to electrum-3.3.8.exe qualified as "Phishing", so this might be a lead even if I don't see what a server can do to cause this.


    Greatly appreciate any help or ideas.
    Thanks
    Post
    Topic
    Board Electrum
    Merits 3 from 3 users
    Topic OP
    Fraudulent transaction along with the correct one(Ledger Nano S + Electrum)
    by
    Electrum_LedgerNS_Issue
    on 10/02/2020, 13:50:35 UTC
    ⭐ Merited by Lucius (1) ,DireWolfM14 (1) ,o_e_l_e_o (1)
    Hi guys,

    I posted this topic 2 weeks ago in the Ledger subreddit and created a support ticket with Ledger, but they came back to me saying that they can't find an issue/replicate my problem so I'm trying again here.
    I someone would be able to replicate this bug I would be extremely grateful, as i'm at a loss here ...

    So, I used Electrum wallet (installed as described here: https://support.ledger.com/hc/en-us/articles/115005161925) with Ledger Nano S.
    Electrum: version 3.3.8
    Ledger Nano S firmware: 1.6.0
    Bitcoin app 1.3.16.
    OS: Windows 10 Pro 1903

    I created a transaction and pressed "Send". The details of the transaction appeared on my ledger device, I checked them and then validated the transaction (first screen was Output #1 or #2, correct amount, correct destination, "Validate", then second screen with the correct fees and "Accept").

    The transaction was sent correctly (2 outputs - one recipient one change).

    The problem: At the same time with the correct transaction, another transaction got generated - my biggest UTXO was sent in full towards an address not controlled by me (the address had no transactions in it and the coins didn't move since).

    Please note that there are still other bitcoins on my wallet which weren't moved so i doubt my seed was compromised (both on the subwallet which contained the "stolen" UTXO and other wallets derived from the same seed).

    Things I noticed: one weird thing about the second transaction is that the LockTime was 1 instead of a block number close to the one when the transaction gets broadcasted, so I think it got created through the console ?
    Would it be possible somehow to inject a second transaction while I was on my Ledger checking the details of the original one ? Or modify the script hash so that one validation sends two transactions ?
    It is possible for my operating system to be compromised, but even then I still can't understand how I got to accept this ...
    I'm at a complete loss ... Help ?