立刻保护您的项目
借助最大的web3安全提供商来增强您的项目。
CertiK 安全专家将审核您的请求,并尽快与您联系。

Soft Spots in Hard Tech: Mobile Security Challenges in Web3

技术博客 ·教育 ·
Soft Spots in Hard Tech: Mobile Security Challenges in Web3

Bootloader Risks and Beyond

We discovered that under certain conditions, a threat actor could install custom firmware with a root backdoor onto a certain popular Web3-targeted phone, and thus access all plaintext data. This could happen before a customer receives their phone, meaning it is compromised from the very beginning. This scenario is more likely than a user having their phone stolen, tampered with, and then returned, as the bootloader attack results in a complete reset and erasure of the device. The main risk is for someone receiving a device without knowing that it has already been tampered with by attackers who have installed a backdoor.

The risk of unlocked bootloaders is not unique to the Solana phone; it's a broader issue in mobile device security, particularly in devices with similar security configurations. However, many manufacturers implement stringent security measures related to the bootloader, which greatly minimizes the risk.

The Role of Trusted Execution Environments (TEEs)

In light of these findings, we thought it essential to examine the use of Trusted Execution Environments (TEEs) in mobile devices. TEEs, intended to provide a secure area within a device's main processor, play a pivotal role in safeguarding sensitive data, such as private keys, from software attacks. However, our recent findings highlight that the effectiveness of TEEs is heavily dependent on their implementation.

Security Levels and Corresponding Threat Models in Cryptocurrency Wallets Source: Web3 Mobile Wallet Apps: A Secret Key Protection Perspective

We tested a device equipped with a dedicated TEE-based wallet, which featured a "secure mode" during wallet setup. In this mode, users set a PIN code, which is intended to act as a safeguard for the TEE wallet. This setup theoretically ensures that, even with physical access and the phone passcode, the TEE wallet remains inaccessible without the PIN.

Uncovering TEE Vulnerabilities

However, our investigation revealed a critical vulnerability within the TEE itself. We found that an attacker could extract the PIN code stored in the TEE, allowing them to access the wallet and retrieve the private key as if they were the owner. This finding is alarming, as it uncovers a significant security gap in TEEs, which are often deemed the ultimate defense in device security.

This underscores a crucial point: the security strength of hardware-based secure vaults is heavily contingent on their implementation. While a properly implemented TEE can effectively shield keys from OS-level attacks, vulnerabilities can still be exploited by privileged attackers if the implementation is flawed.

It is essential for TEE-based secure vault implementations to undergo thorough reviews by professional security experts. These reviews are critical in ensuring that the TEEs function as intended, providing the robust security necessary for the safekeeping of private keys in Web3 wallets.

Mitigations and Vendor Response

Following responsible disclosure protocols, we reported these vulnerabilities to the device vendors. The TEE vulnerability has since been addressed and satisfactorily fixed. To mitigate such risks, manufacturers must enforce strong security measures, not just in software like the bootloader but also in hardware components like TEEs.

Recommendations for Users and Developers

Users must remain vigilant about their device's physical security and choose wallets and apps with advanced security features. Developers should prioritize robust security measures at all levels of their products, especially when dealing with blockchain and Web3 technologies that have the potential to store large amounts of value.

The Bigger Picture

This case study underscores the need for a holistic approach to security in the blockchain domain. As blockchain technologies continue to evolve and integrate with everyday devices, the security of all components—software, hardware, and user interfaces—becomes critical for the safe adoption and growth of Web3 technologies.

In conclusion, the discovery of risks in both the bootloader and TEEs of blockchain-integrated mobile devices serves as a stark reminder of the complex and multifaceted nature of security challenges in Web3. It's imperative for all stakeholders in the Web3 ecosystem to collaborate and address these challenges proactively to ensure a secure and resilient future for the industry.

This blog post is a part of CertiK's ongoing commitment to raising security awareness and providing insights into the evolving landscape of blockchain technology security.

相关博客

The Counterparty Challenge in Institutional Crypto
新的 · 技术博客 ·教育

The Counterparty Challenge in Institutional Crypto

When an institution sends digital assets to an address provided by a counterparty, it is relying on the counterparty's claim that they control it. The blockchain will settle the transaction regardless of who is on the other end. This gap between how institutions want to use digital assets and what the compliance infrastructure can actually verify is becoming harder to ignore as more regulated capital moves on-chain.

The Enterprise DLT Oracle Challenge

The Enterprise DLT Oracle Challenge

In DeFi, oracle failures can cause financial losses within a system that broadly accepts risk. Enterprise DLT operates in a different world. The assets are physical. The counterparties are regulated. The consequences are legal.

Hack3d: The Web3 Security Report 2025

Hack3d: The Web3 Security Report 2025

Welcome to the 2025 Skynet Hack3D Report! This report offers deep dives into the exploits, vulnerabilities, and trends that define blockchain and smart contract security. They’re an invaluable resource for anyone seeking to understand the current landscape of Web3 security. Each report contains detailed incident analyses, technical insights, and the most comprehensive statistics on hacks, scams, and exploits in the entire Web3 industry.