‘Wallet drainer’ code added to Ledger library has crypto on edge

A suspected “supply chain attack” on Ledger ConnectKit may leave dapp users open to loss of funds

article-image

Ledger Head of Sales Americas Joel Edgerton | DAS 2022 New York by Blockworks

share

Users of crypto web apps are being warned to avoid the platforms until investigations into a potential cybersecurity incident affecting hardware wallet Ledger play out.

Notices of malicious code were shared on social media Thursday morning, found in software libraries for Ledger’s ConnectKit, which connects blockchain apps with Ledger devices.

Web3-focused cybersecurity firm BlockAid told Blockworks that so far at least $150,000 has been lost as a result of the malicious code slipping into websites in production.

Ledger users are not at risk if they refrain from transacting, the firm said.

“It is not exploitable on prior approvals,” CEO Ido Ben-Natan told Blockworks, noting that “many websites are still affected and users are getting hit,” so the damage may be more severe.

Decentralized exchange SushiSwap took its front-end web app offline soon after the warnings.

“We’ve identified a critical issue the ledger connector has been compromised, potentially allowing the injection of malicious code affecting various dApps,” SushiSwap posted

“If you have the Sushi page open and see an unexpected ‘Connect Wallet’ pop-up, DO NOT interact or connect your wallet. We’re actively working to remove the ledger wallet connector. For your safety, please refrain from engaging with any dApps until further notice. Stay tuned for updates.”

Revoke.cash, a service which allows crypto users to take back transaction signing powers previously given to Web3 apps, also took its front-end offline to avoid users being duped.

“Revoke.cash specifically is affected, so don’t interact with it,” Ben-Natan said.

Loading Tweet..

Ledger’s official X account initially confirmed the potential attack vector and said the company had removed the malicious code.

The malicious version of the file was replaced with the genuine version at approximately 8:35 am ET. The new version is “propagating,” and will become active soon — effectively ending the threat — depending on the caching of the third party dApps, Philip Costigan, head of public relations at Ledger, told Blockworks.

Funds cannot be outright stolen from Ledger devices if no further actions are taken, and the malicious code was inserted into the software library only very recently — about 6:00 am ET, BlockAid confirmed —  meaning only a small subset of active crypto users could potentially be vulnerable.

Still, out of an abundance of caution, it’s best to avoid crypto web apps altogether, other experts said.

WalletConnect, a popular interface for dapp developers who do not integrate Ledger directly, also put out a warning.

Loading Tweet..

“Do not interact with any dApps for the moment,” Costigan said. “We will keep users informed as the situation evolves. Ledger devices and Ledger Live were not compromised.”

Hackers have similarly targeted front-ends of popular crypto apps before. Nearly 865 ETH ($3 million then, $2 million now) was stolen from SushiSwap users in 2021 in a supply-chain attack on the platform’s token sale platform.

The hack saw the auction wallet for a coin offering replaced with one controlled by the attacker. Other incidents have involved DNS attacks to reroute unsuspecting users to fake versions of platform websites, which upon interaction send funds to the attackers rather than their intended recipients.

Updated Dec. 14, 2023 at 8:34, 8:53, 9:03 and 9:15 am ET with context and comments from Ledger and BlockAid.


Get the news in your inbox. Explore Blockworks newsletters:

Tags

Decoding crypto and the markets. Daily, with Byron Gilliam.

Upcoming Events

Javits Center North | 445 11th Ave

Tues - Thurs, March 24 - 26, 2026

Blockworks’ Digital Asset Summit (DAS) will feature conversations between the builders, allocators, and legislators who will shape the trajectory of the digital asset ecosystem in the US and abroad.

recent research

Research Report Templates (8).png

Research

Kinetiq has established itself as Hyperliquid's dominant liquid staking protocol, holding 82.5% of LST market share with $610M in TVL. The protocol is now expanding beyond its kHYPE staking core into higher take-rate verticals: iHYPE for institutional custody rails, Launch for HIP-3 capital formation, and Markets for builder-deployed perpetuals. We view Markets, launching Jan. 12, as the highest-potential product line given its mechanically scalable, activity-linked unit economics. Near-term revenue remains anchored by kHYPE's KIP-2 fee schedule (~$1.6M annualized), while Markets provides embedded optionality if HIP-3 economics normalize post-Growth Mode. KNTQ's setup is relatively clean: zero insider unlocks until November 2026, 6.2% buyback yield from staking revenue, and cleared airdrop overhang. Risks center on unproven Markets execution, declining kHYPE TVL despite ongoing incentives, and competition from Hyperliquid's native initiatives.

article-image

BTC finished the week up 1.6%, while L2s, RWAs and the treasury trade continued to grind lower

article-image

DTCC moves DTC-custodied Treasuries onchain via Canton, while Lighter’s LIT launches trading at a fees multiple in Hyperliquid territory

article-image

In the 90s, rapt audiences worldwide watched a coffee pot — will that fascination ever turn to crypto?

article-image

Some systems improve by failing — and crypto has no choice

article-image

Yield Basis introduces an IL-free AMM design that already dominates BTC DEX liquidity

article-image

Maybe tokenholders don’t need the rights that corporate shareholders have come to expect

Newsletter

The Breakdown

Decoding crypto and the markets. Daily, with Byron Gilliam.

Blockworks Research

Unlock crypto's most powerful research platform.

Our research packs a punch and gives you actionable takeaways for each topic.

SubscribeGet in touch

Blockworks Inc.

133 W 19th St., New York, NY 10011

Blockworks Network

NewsPodcastsNewslettersEventsRoundtablesAnalytics