Trezor Wallets to Receive Firmware Update

Trezor Model T got support for Monero, Cardano, Stellar, Ripple, Tezos, Decred, Groestlcoin, Lisk, Zencash, as well as Zcash Sapling
08 November 2018   89

Trezor hardware wallet developers have introduced new software updates for Model T (2.0.9) and Trezor One (1.7.1). It is noted that many of the changes were implemented by third-party developers from the community.

Trezor Model T got support for Monero, Cardano, Stellar, Ripple, Tezos, Decred, Groestlcoin, Lisk, Zencash, as well as Zcash Sapling.

Note that Trezor One implements support for the WebUSB protocol, which saves users of Trezor Wallet and Trezor Password Manager from having to use the Trezor Brigde software to interact with Google Chrome.

In addition, Trekor One adds support for Lisk and Stellar, and Zcash Sapling hardfork.

Earlier, support for Lisk, Factom, MIX Blockchain, Musicoin, GameCredits, and EtherGem was added to Ledger Nano S.

Trezor to Undergo Fishing Attack

Trezor wallet team asks users to be exteme caution
02 July 2018   338

According to the blog of developers of the hardware wllet Trezor, their service has recently undergone a phishing attack. The project team stated that it received many complaints about the incorrect Secure Sockets Layer (SSL) certificate.

The number of warnings about the incorrect certificate has increased due to the increasing number of phishing attacks on the site. The vectors of the attack are reportedly the so-called "poisoning of the DNS server" and "BGP-interception".

Poisoning a DNS server is an attack that uses some DNS vulnerabilities. It allows the attacker to redirect traffic from legitimate servers to fake ones. This exploit was used, for example, to attack the "Great Chinese Firewall" in 2010.

BGP interception (also known as "prefix intercept") is an attack that consumes IP address groups and is performed by corrupting the routing Internet tables that the BGP protocol operates on.

As a result of the attack, the fake Trezor wallet site showed a warning message asking the user to restore the seed-phrase (an access key consisting of 12-24 "simple and memorable" words). According to Trezor, this was already the "second alarm bell", because the warning message was written with errors.

The third red flag was the method of recovery (seed check) — the fake site forced users to enter both the order number as well as the seed word into the computer.
 

Trezor's Blog

Next, the team warned users about the security measures that must be taken to protect themselves from this attack. It stressed that users should never enter their seed-phrases into the computer - this should be done only in the Trezor device. In addition, according to Trezor, the user should make sure that there is a "Protected" in the address bar of his browser.

They also noted that the fake wallet had already been blocked by the hosting provider, but they asked users to remain vigilant and inform the Trezor team about suspicious sites.