Add blog posts no.6
This commit is contained in:
parent
001af09770
commit
42463bd7e3
|
@ -0,0 +1,29 @@
|
|||
---
|
||||
layout: post
|
||||
title: "Update #6 - Cake Wallet Vulnerability PSA"
|
||||
author: ["Christian Reitter"]
|
||||
date: 2024-02-13 17:00:00 +0000
|
||||
---
|
||||
|
||||
This post is a **Public Service Announcement**:
|
||||
Several vulnerable versions of the cryptocurrency wallet software `Cake Wallet` released in 2020-2021 created [extremely weak Bitcoin wallets](https://www.reddit.com/r/Monero/comments/n9yypd/urgent_action_needed_for_bitcoin_wallets_cake/).<br/>
|
||||
If you're a Cake Wallet user or know someone who is, we urgently recommend checking if you
|
||||
-> still use a **vulnerable old wallet software version**
|
||||
-> still use an **old and weak Bitcoin mnemonic seed generated with a vulnerable version**<br/>
|
||||
Affected wallets are at risk of immediate and complete loss of all Bitcoin funds.
|
||||
|
||||
If you think this affects you, we strongly recommend moving your funds to a new Bitcoin wallet generated by a known-good `Cake Wallet` application version (or a different cryptocurrency wallet software).
|
||||
|
||||
## Context
|
||||
|
||||
Bitcoin wallets generated with vulnerable `Cake Wallet` versions are based on insecure randomness, which means that the secret keys for them can be reconstructed and misused by attackers similarly to the other wallet vulnerabilities we've described on this website. This has been well-known since the vendor's public Reddit [advisory post](https://www.reddit.com/r/Monero/comments/n9yypd/urgent_action_needed_for_bitcoin_wallets_cake/) on 2021-05-11.
|
||||
|
||||
The vulnerable wallet mnemonics are 12-word [seed phrases in Electrum format](https://electrum.readthedocs.io/en/latest/seedphrase.html) and all have the "Segwit" type. They look like normal BIP39 mnemonic phrases but are incompatible, meaning only Electrum-compatible software can use them. Other coin types and mnemonic format variations are not affected, based on what we know at the moment.
|
||||
|
||||
Possible scenarios of why this can still be relevant today:
|
||||
- The user still has a `Cake Wallet` application version before `v4.1.7` installed that was never patched, and continues to use it. This could happen via a manual Android `.apk` installation, for example.
|
||||
- The user generated and exported a weak wallet mnemonic from a vulnerable `Cake Wallet` version and re-imported it in a newer `Cake Wallet` version or other compatible wallet software such as Electrum.
|
||||
|
||||
We're in contact with `Cake Labs` about this. Starting with version `v4.12.0` released in December 2023, `Cake Wallet` will try to detect and warn about the continued local use of known vulnerable mnemonics due to our help, which covers [a known subset of ca. 8700 wallets](https://github.com/cake-tech/cake_wallet/pull/1238/files#diff-f0e3a7e177b8361801485b78f89e31eb8667f5084044ba4e63ff53780e974059).
|
||||
|
||||
More information and technical details will follow at a later date.
|
Loading…
Reference in New Issue