Jaxx and Bitcoin Wallet Have Major Vulnerabilities, Reveals Cheetah Mobile
- The two wallets have a combined user base of more than one million.
One of the major issues with technology is security vulnerability, and Blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tampe Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tampe technology is not immune to these. On Tuesday, the security research arm of Cheetah Mobile revealed some major security issues with two widely used mobile-based cryptocurrency wallets - Bitcoin.com Wallet and Jaxx Blockchain Wallet.
Discover credible partners and premium clients at China’s leading finance event!
In a released statement, Cheetah Mobile Blockchain Research Lab said that its researchers came across these security vulnerabilities while researching for a whitepaper called “2018 Global Cryptocurrency Wallet Security White Paper”, which it published recently. The whitepaper itself explores the security threats related to private key storage on mobile cryptocurrency wallets.
According to the firm’s statement, Bitcoin Wallet stores mnemonic phrases in plain text format on the phone’s operating system, which is very unsafe considering the complexity of the operating system. A hacker can easily access Bitcoin Wallet’s mnemonic phrases using any app that bypasses security barriers to gain ROOT access.
The researchers further explained that hackers don't even need ROOT access to exploit the operating system vulnerabilities, as by simply connecting the charging port of the mobile phone to a hacker-controlled device, they can easily gain Bitcoin Wallet’s mnemonic phrases and private keys.
For Jaxx Blockchain Wallet, the process of gaining access to private keys is even simpler, as hackers can do this by decrypting codes of the wallet’s private key data files.
Cheetah Mobile Blockchain Research Lab’s senior researcher Wei Li said: “If a wallet isn’t designed properly, users face the possibility of their private keys being lost or stolen. We believe it’s important to issue this warning so that users can understand the risks of using certain wallets and protect their digital assets.”
The researchers even advised the users of both the wallets to transfer their holding Cryptocurrencies Cryptocurrencies By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the netw By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the netw from these two wallets to other secure platforms.
“For users that have their digital assets stored in either of these wallets, Cheetah Mobile Blockchain Research Lab recommends that they immediately transfer them to a secure wallet such as SafeWallet, developed by Cheetah Mobile. SafeWallet possesses an innovative three-tiered security defense system and easy-to-use interface that allows users to safely and conveniently secure and manage their cryptocurrency assets,” the statement added.
Wallet vulnerabilities
Security vulnerabilities in cryptocurrency wallets are nothing new. Some of the biggest attacks had been pulled off by hackers on cryptocurrency wallet platforms stealing millions of dollars.
In November last year, around $300 million funds in cryptocurrencies were locked in the popular Parity Wallet due to some vulnerabilities, and later that month, news of another theft from a little-known wallet platform CoinPouch surfaced. On that occasion hackers stole $675,000 worth of Verge coins.
One of the major issues with technology is security vulnerability, and Blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tampe Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tampe technology is not immune to these. On Tuesday, the security research arm of Cheetah Mobile revealed some major security issues with two widely used mobile-based cryptocurrency wallets - Bitcoin.com Wallet and Jaxx Blockchain Wallet.
Discover credible partners and premium clients at China’s leading finance event!
In a released statement, Cheetah Mobile Blockchain Research Lab said that its researchers came across these security vulnerabilities while researching for a whitepaper called “2018 Global Cryptocurrency Wallet Security White Paper”, which it published recently. The whitepaper itself explores the security threats related to private key storage on mobile cryptocurrency wallets.
According to the firm’s statement, Bitcoin Wallet stores mnemonic phrases in plain text format on the phone’s operating system, which is very unsafe considering the complexity of the operating system. A hacker can easily access Bitcoin Wallet’s mnemonic phrases using any app that bypasses security barriers to gain ROOT access.
The researchers further explained that hackers don't even need ROOT access to exploit the operating system vulnerabilities, as by simply connecting the charging port of the mobile phone to a hacker-controlled device, they can easily gain Bitcoin Wallet’s mnemonic phrases and private keys.
For Jaxx Blockchain Wallet, the process of gaining access to private keys is even simpler, as hackers can do this by decrypting codes of the wallet’s private key data files.
Cheetah Mobile Blockchain Research Lab’s senior researcher Wei Li said: “If a wallet isn’t designed properly, users face the possibility of their private keys being lost or stolen. We believe it’s important to issue this warning so that users can understand the risks of using certain wallets and protect their digital assets.”
The researchers even advised the users of both the wallets to transfer their holding Cryptocurrencies Cryptocurrencies By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the netw By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the netw from these two wallets to other secure platforms.
“For users that have their digital assets stored in either of these wallets, Cheetah Mobile Blockchain Research Lab recommends that they immediately transfer them to a secure wallet such as SafeWallet, developed by Cheetah Mobile. SafeWallet possesses an innovative three-tiered security defense system and easy-to-use interface that allows users to safely and conveniently secure and manage their cryptocurrency assets,” the statement added.
Wallet vulnerabilities
Security vulnerabilities in cryptocurrency wallets are nothing new. Some of the biggest attacks had been pulled off by hackers on cryptocurrency wallet platforms stealing millions of dollars.
In November last year, around $300 million funds in cryptocurrencies were locked in the popular Parity Wallet due to some vulnerabilities, and later that month, news of another theft from a little-known wallet platform CoinPouch surfaced. On that occasion hackers stole $675,000 worth of Verge coins.