‘Wallet drainer’ code added to Ledger library has crypto on edge

A suspected “supply chain attack” on Ledger ConnectKit may leave dapp users open to loss of funds


Ledger Head of Sales Americas Joel Edgerton | DAS 2022 New York by Blockworks


Users of crypto web apps are being warned to avoid the platforms until investigations into a potential cybersecurity incident affecting hardware wallet Ledger play out.

Notices of malicious code were shared on social media Thursday morning, found in software libraries for Ledger’s ConnectKit, which connects blockchain apps with Ledger devices.

Web3-focused cybersecurity firm BlockAid told Blockworks that so far at least $150,000 has been lost as a result of the malicious code slipping into websites in production.

Ledger users are not at risk if they refrain from transacting, the firm said.

“It is not exploitable on prior approvals,” CEO Ido Ben-Natan told Blockworks, noting that “many websites are still affected and users are getting hit,” so the damage may be more severe.

Decentralized exchange SushiSwap took its front-end web app offline soon after the warnings.

“We’ve identified a critical issue the ledger connector has been compromised, potentially allowing the injection of malicious code affecting various dApps,” SushiSwap posted

“If you have the Sushi page open and see an unexpected ‘Connect Wallet’ pop-up, DO NOT interact or connect your wallet. We’re actively working to remove the ledger wallet connector. For your safety, please refrain from engaging with any dApps until further notice. Stay tuned for updates.”

Revoke.cash, a service which allows crypto users to take back transaction signing powers previously given to Web3 apps, also took its front-end offline to avoid users being duped.

“Revoke.cash specifically is affected, so don’t interact with it,” Ben-Natan said.

Loading Tweet..

Ledger’s official X account initially confirmed the potential attack vector and said the company had removed the malicious code.

The malicious version of the file was replaced with the genuine version at approximately 8:35 am ET. The new version is “propagating,” and will become active soon — effectively ending the threat — depending on the caching of the third party dApps, Philip Costigan, head of public relations at Ledger, told Blockworks.

Funds cannot be outright stolen from Ledger devices if no further actions are taken, and the malicious code was inserted into the software library only very recently — about 6:00 am ET, BlockAid confirmed —  meaning only a small subset of active crypto users could potentially be vulnerable.

Still, out of an abundance of caution, it’s best to avoid crypto web apps altogether, other experts said.

WalletConnect, a popular interface for dapp developers who do not integrate Ledger directly, also put out a warning.

Loading Tweet..

“Do not interact with any dApps for the moment,” Costigan said. “We will keep users informed as the situation evolves. Ledger devices and Ledger Live were not compromised.”

Hackers have similarly targeted front-ends of popular crypto apps before. Nearly 865 ETH ($3 million then, $2 million now) was stolen from SushiSwap users in 2021 in a supply-chain attack on the platform’s token sale platform.

The hack saw the auction wallet for a coin offering replaced with one controlled by the attacker. Other incidents have involved DNS attacks to reroute unsuspecting users to fake versions of platform websites, which upon interaction send funds to the attackers rather than their intended recipients.

Updated Dec. 14, 2023 at 8:34, 8:53, 9:03 and 9:15 am ET with context and comments from Ledger and BlockAid.

Start your day with top crypto insights from David Canellis and Katherine Ross. Subscribe to the Empire newsletter.

Explore the growing intersection between crypto, macroeconomics, policy and finance with Ben Strack, Casey Wagner and Felix Jauvin. Subscribe to the On the Margin newsletter.

The Lightspeed newsletter is all things Solana, in your inbox, every day. Subscribe to daily Solana news from Jack Kubinec and Jeff Albus.


Upcoming Events

Salt Lake City, UT

MON - TUES, OCT. 7 - 8, 2024

Blockworks and Bankless in collaboration with buidlbox are excited to announce the second installment of the Permissionless Hackathon – taking place October 7-8 in Salt Lake City, Utah. We’ve partnered with buidlbox to bring together the brightest minds in crypto for […]

Salt Lake City, UT

WED - FRI, OCTOBER 9 - 11, 2024

Pack your bags, anon — we’re heading west! Join us in the beautiful Salt Lake City for the third installment of Permissionless. Come for the alpha, stay for the fresh air. Permissionless III promises unforgettable panels, killer networking opportunities, and mountains […]

recent research

Research Report Templates.png


ZKPs enable efficient offchain transaction processing and validation, resulting in increased throughput and reduced fees. Solana's ZK Compression leverages ZKPs to minimize onchain storage costs, while Sui's zkLogin streamlines user onboarding by replacing complex key management with familiar OAuth credentials.


North Korea suspected in breach of Indian exchange’s multisig wallet


Plus, Sanctum’s CLOUD token has officially launched — but not without problems


It’s not yet clear whether Donald Trump is pumping bitcoin. But an unofficial memecoin is still seeing benefit.


StarkWare takes a step towards making StarkNet for Bitcoin


The numbers point to one conclusion: Risk is back, or at least it was during the first half of the year