Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. General Discussion
  3. Solflare Crypto Wallet Vulnerability - "xpass exploit"

Solflare Crypto Wallet Vulnerability - "xpass exploit"

Scheduled Pinned Locked Moved General Discussion
14 Posts 6 Posters 759 Views 6 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Offline
    cycloneC Offline
    cyclone
    Admin Trusted
    wrote on last edited by cyclone
    #1

    During a recent audit of the Solflare Crypto Wallet v1.74.2 browser extension, I came across a major vulnerability that allows the encrypted seed phrase and private keys to be recovered -- without requiring the wallet password to decrypt them. This "xpass exploit" seems to only affect newer Solflare wallets, with version 1.74.2 February 7, 2025 being the latest at the time of this writing.

    This means a Solflare wallet and all of its crypto can be instantly compromised if an attacker gains access to the user's PC -- whether physical, or via malicious software.

    If you use Solflare, I would highly recommend you immediately transfer all your crypto to a trusted wallet since your crypto is not safe in Solflare.

    I have contacted Solflare via chat (Feb 12, 2025) and email (Feb 15, 2025) to make them aware of this vulnerability and will give them time to release a patch before I publicly release a full writeup.

    Timeline of reporting:
    2025-02-12 @15:36 (CST)
    Chat transcript snippet with Solflare Tech Support:
    (transcript is in Solflare's time zone of CET)
    66e620e3-e838-47ff-ab90-0d6c76cc6325-chat_transcript_2025_02_12.png_redacted.png

    2025-02-15 @17:29:50 (CST)
    Email sent to Solflare (vulnerability info redacted):
    7a0b1c5f-d558-4299-a2bd-cf0dc921d7a6-image.png

    Stay tuned. The writeup will be posted on my GitHub:
    https://github.com/cyclone-github/solflare_pwn

    Solflare Chrome Browser Extension:
    https://chromewebstore.google.com/detail/solflare-wallet/bhhhlbepdkbapadjdnnojkbgioiodbic

    Solflare Website:
    https://solflare.com

    This post is solely meant to inform the crypto community of the vulnerability in this crypto wallet. Hopefully, Solflare will promptly patch this vulnerability.

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    1
    • S Offline
      S Offline
      secretscribe1
      wrote on last edited by
      #2

      Will you post the code how to do this?

      1 Reply Last reply
      0
      • oe3p32wedwO Offline
        oe3p32wedwO Offline
        oe3p32wedw
        wrote on last edited by
        #3

        This vulnerability, as I understand, is directly related to the wallet files, and not to the algorithm?

        1x1660 Ti | 2x4090 | epileptic/anxiety/despair/drain | hashpwn <3

        cycloneC 1 Reply Last reply
        👍
        0
        • blandyB Offline
          blandyB Offline
          blandy
          Admin Trusted
          wrote on last edited by blandy
          #4

          Nice work cyclone 🙂 incredible and hugely worrying that a crypto wallet provider can be so incompetent. Bad enough Atomic Wallet was using a fast hashing algo (MD5) for the IV and Key values for the AES encryption, but this is a complete failure.

          5x RTX 2080 Ti | 11x ZTEX v1.15y FPGA (bcrypt) | Cracker | Developer

          oe3p32wedwO 1 Reply Last reply
          👍
          0
          • blandyB blandy

            Nice work cyclone 🙂 incredible and hugely worrying that a crypto wallet provider can be so incompetent. Bad enough Atomic Wallet was using a fast hashing algo (MD5) for the IV and Key values for the AES encryption, but this is a complete failure.

            oe3p32wedwO Offline
            oe3p32wedwO Offline
            oe3p32wedw
            wrote on last edited by
            #5

            @blandy The developers of the atomic wallet are scammers themselves. There have been waves of funds disappearing from users more than once. I also have a friend who kept funds here, he kept the seed phrase only on paper and he had a generated password. The funds disappeared at the same time, as with many AW users. I heard that all this was allegedly done by Lazarus, but during the community research it turned out that this is not the first case in the history of the wallet, which the developers kept silent about.

            1x1660 Ti | 2x4090 | epileptic/anxiety/despair/drain | hashpwn <3

            1 Reply Last reply
            0
            • blandyB Offline
              blandyB Offline
              blandy
              Admin Trusted
              wrote on last edited by
              #6

              Yes, I remember their system seeming being owned, although they denied this. Too many high value wallets were compromised, likely by themselves I'd suspect. Users need to remember that they are putting a lot of trust into the owners of these software wallets.

              5x RTX 2080 Ti | 11x ZTEX v1.15y FPGA (bcrypt) | Cracker | Developer

              1 Reply Last reply
              0
              • oe3p32wedwO oe3p32wedw

                This vulnerability, as I understand, is directly related to the wallet files, and not to the algorithm?

                cycloneC Offline
                cycloneC Offline
                cyclone
                Admin Trusted
                wrote on last edited by cyclone
                #7

                @blandy Thanks! Hopefully Solflare users will transfer their crypto to a secure wallet before a threat actor exploits this in the wild.
                @oe3p32wedw That is correct. The encryption function Solflare used is similar to Phantom, which is secretbox with pbkdf2-sha256 KDF. To clarify, the encryption function is secure, but the vulnerability is what Solflare did after the encryption function.

                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                3x RTX 4090

                1 Reply Last reply
                0
                • tychotithonusT Offline
                  tychotithonusT Offline
                  tychotithonus
                  Moderator Trusted
                  wrote on last edited by
                  #8

                  Wow, amazing work!
                  Suggestion: add a timeline to your GitHub info page, to document your interaction with the org.

                  2x 4090 | 36x ZTEX 1.15y | hashcat / JtR / MDXfind

                  1 Reply Last reply
                  👍
                  0
                  • R Offline
                    R Offline
                    rickyc2024
                    Banned
                    wrote on last edited by
                    #9

                    Cyclone, this very much annoys me. How could you do this? I found this vulnerability and I had ALREADY reported it.

                    1 Reply Last reply
                    0
                    • R Offline
                      R Offline
                      rickyc2024
                      Banned
                      wrote on last edited by
                      #10
                      This post is deleted!
                      1 Reply Last reply
                      0
                      • cycloneC Offline
                        cycloneC Offline
                        cyclone
                        Admin Trusted
                        wrote on last edited by cyclone
                        #11

                        I independently found the vulnerability while reverse engineering the encryption function, wrote the solflare_pwn toolkit, and reported the vulnerability on Feb 12 to Solflare with a followup email on Feb 15. All of this with timestamps is disclosed on my post above.

                        This is the 2nd time rickyc2024 has publicly taken credit for my solflare_pwn toolkit and my work on this project. To once again clarify, he has nothing to do with solflare_pwn or me discovering the vulnerability.

                        @rickyc2024 has been banned.

                        # EDIT 2025/02/21
                        I've also banned his dup accounts below since running multiple accounts on the forum is not allowed. General Forum Rules: https://forum.hashpwn.net/post/11
                        @rickyc2024 banned
                        @rickyig2025 banned
                        @donotban banned
                        @youremail banned
                        @jdjwjdiw banned

                        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                        3x RTX 4090

                        1 Reply Last reply
                        👍
                        1
                        • blandyB Offline
                          blandyB Offline
                          blandy
                          Admin Trusted
                          wrote on last edited by
                          #12

                          I can confirm I've worked with @cyclone and also have a working C# copy of the decrypter and also the vulnerability.

                          Nice work @cyclone 🙂

                          5x RTX 2080 Ti | 11x ZTEX v1.15y FPGA (bcrypt) | Cracker | Developer

                          cycloneC 1 Reply Last reply
                          👍 🍻
                          1
                          • blandyB blandy

                            I can confirm I've worked with @cyclone and also have a working C# copy of the decrypter and also the vulnerability.

                            Nice work @cyclone 🙂

                            cycloneC Offline
                            cycloneC Offline
                            cyclone
                            Admin Trusted
                            wrote on last edited by
                            #13

                            @blandy Thanks, great job porting this over to C#!

                            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                            3x RTX 4090

                            1 Reply Last reply
                            👍
                            0
                            • cycloneC Offline
                              cycloneC Offline
                              cyclone
                              Admin Trusted
                              wrote on last edited by cyclone
                              #14

                              New GitHub Release:
                              https://forum.hashpwn.net/post/434

                              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                              3x RTX 4090

                              1 Reply Last reply
                              👍
                              1
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              Who's Online [Full List]

                              7 users active right now (3 members and 4 guests).
                              hashpwn-bot, freeroute

                              Board Statistics

                              Our members have made a total of 3.6k posts in 150 topics.
                              We currently have 257 members registered.
                              Please welcome our newest member, vioednfekla.
                              The most users online at one time was 49 on Thursday, December 26, 2024.

                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent