Atlas21
  • ‎
No Result
View All Result
Atlas21
No Result
View All Result
Atlas21
Home Bitcoin

Dark Skippy: the (non) new attack that puts the private keys of hardware wallets at risk

Newsroom by Newsroom
August 14, 2024
in Bitcoin
address poisoning
Share on FacebookShare on TwitterShare on Linkedin

Published a method to steal the seed phrase of hardware wallets through malicious firmware: the details.

A “new” attack called Dark Skippy jeopardizes the security of Bitcoin hardware wallets. Discovered by Robin Linus, Lloyd Fournier, and Nick Farrow, this method allows a hacker to steal the seed phrase of a hardware wallet by hiding it within the signatures of Bitcoin transactions.

How the attack works

The attack is based on the use of malicious firmware that alters the standard process of signing Bitcoin transactions.

  1. The hacker installs malicious firmware on the victim’s hardware wallet.
  2. When the user makes a transaction, the firmware hides the first part of the seed phrase in the transaction signature.
  3. With just two transactions, the entire seed phrase can be reconstructed by the attacker.
  4. The hacker can thus gain complete control of the wallet and steal the funds.

Although the attack does not represent a new vulnerability, Dark Skippy exploits this weakness more efficiently: only two transactions are needed to completely compromise the victim’s wallet. In the past, it was thought that many more transactions were necessary.

The attack exploits a technical element called “nonce” used in transaction signatures. Hardware wallets insert these random values every time they sign Bitcoin transactions.
Through the malicious firmware, Dark Skippy makes the nonce predictable, allowing secret information to be hidden in the transaction signature. The attacker can then monitor the blockchain to find transactions with a specific watermark that reveals the presence of embedded data.
Using algorithms such as Pollard’s Kangaroo, the attacker can retrieve the predictable nonces from public signature data, subsequently reconstructing the seed and gaining control over the wallet. Pollard’s Kangaroo algorithm is a useful tool in cryptography for solving problems related to discrete logarithms, but it can also be used in attack contexts to compromise the security of cryptographic systems.

As stated in the official disclosure, Dark Skippy does not affect hardware wallets that use a multi-sig setup.

Possible countermeasures

To defend against this type of attack, hardware wallet users should:

  • Use only official and updated firmware.
  • Purchase hardware wallets only from reliable vendors.
  • Consider using multi-sig wallets for increased security.

Regarding hardware wallet manufacturers, possible mitigations include implementing anti-exfil protocols, which can help prevent unauthorized leakage of secret data from the hardware device. To date, BitBox and Blockstream Jade are the only two hardware wallets that have implemented anti-exfil.

Community reactions

Among the various reactions to the news, some Bitcoin developers immediately allayed concerns, stating that this type of attack has been known for some time.

Stadicus from BitBox commented:

Dark Skippy – amidst all the panic about this "new" attack…
😮😱😨

The #BitBox02 cold wallet implemented a specific protection against this attack over THREE years ago.

Jade is the only other hardware wallet using it.https://t.co/PNfn7vD6zt https://t.co/6Mao9ogwcz

— Stadicus (@Stadicus3000) August 5, 2024

The developer Matt Corallo stated:

This is a novel new construction, but the class of attacks is very, very old – hardware wallets have had years to address this, and those that haven’t (all but Jade and BitBox) should be treated as an incompetent joke and discarded.

Use an offline laptop before a hardware wallet https://t.co/5HhXTQpHex

— Matt Corallo (@TheBlueMatt) August 5, 2024
Previous Post

Fedi is born: the Bitcoin app that puts the community at its center

Next Post

TASS: Putin signs law to legalize mining in Russia

Latest News

bitaxe
Bitcoin

Bitaxe Gamma: configuration guide

by Newsroom
March 6, 2026
0

A small open-source ASIC born from the community to bring mining back to individuals and strengthen the distribution of the...

Read moreDetails
phishing
Crypto

Google discovers an iOS exploit kit used in digital asset phishing attacks

by Newsroom
March 6, 2026
0

The kit, dubbed "Coruna", targets iPhones running iOS 13.0 through 17.2.1 and hunts for seed phrases and apps such as...

Read moreDetails
irs
Crypto

U.S.: the IRS proposes mandatory electronic delivery of tax forms for digital assets

by Newsroom
March 6, 2026
0

The proposal by the U.S. tax agency would eliminate the requirement for exchanges to provide users with paper copies of...

Read moreDetails
vancouver
Bitcoin

Vancouver rejects the bitcoin reserve proposal: blocked by provincial law

by Newsroom
March 6, 2026
0

Municipal staff concluded that the Vancouver Charter does not allow the city to hold bitcoin as a reserve asset.

Read moreDetails
Paralelní Polis
Bitcoin

Prague: Paralelní Polis hub closes permanently

by Newsroom
March 5, 2026
0

After 12 years, the cypherpunk space is ending its activities due to financial difficulties and the property owner’s decision.

Read moreDetails
Atlas21

© 2025 Atlas21

Navigate Site

  • About
  • Home
  • Feature
  • Bitcoin
  • Careers
  • Opinion
  • Interviews
  • Privacy Policy
  • News
  • Learn
  • Press
  • Cookie Policy

Follow Us

No Result
View All Result
  • News
  • Interviews
  • Learn
  • Feature
  • B2B Services
  • Adoption
  • ‎
    • ‎

© 2025 Atlas21

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site, we will assume that you are happy with it.