Hardware Wallet Hacking: Glitching
When to use Hardware Hacking?
In some cases, password recovery alone isn’t enough. More so when dealing with hardware wallets that are damaged, PIN-locked, or unresponsive. In these situations, we deploy a range of advanced hardware hacking tools and techniques to extract data directly from the secure element or microcontroller. This process requires deep technical expertise, precise timing, and specialized equipment. It’s notable that mistakes when engaging in hardware hacking can destroy the wallet or permanently lock its contents as
What is involved?
One of the most critical methods we use is voltage glitching: a technique that momentarily disrupts the power supply to a chip at a precise moment to bypass authentication or trigger unintended behavior. To pull this off successfully, we rely on our own homegrown multiplexers and custom glitch injection boards. We use these in conjunction with with tightly timed scripts written for known vulnerabilities in STM32 and similar architectures. These methods can allow temporary or permanent bypass of PIN checks, key export blocks, or other protections baked into the wallet's firmware.
Glitching: Tools of the Trade for Hardware Wallet Attacks
Voltage glitching (also known as fault injection) is one of the few techniques available to bypass physical security on hardware wallets, secure microcontrollers, and embedded cryptographic elements. At Praefortis, we’ve used these techniques in extreme last-resort scenarios where no recovery phrase is available and traditional access methods are permanently blocked. Below is a breakdown of the essential equipment used for glitching attacks (note: this is not for the faint of heart or the ill-prepared).
1. Oscilloscope
A high-bandwidth oscilloscope is essential for characterizing the target device’s behavior during boot and identifying precisely when to inject the glitch. We recommend:
Bandwidth: At least 100MHz (ideally 500MHz+ for STM32/ARM targets)
Sampling Rate: Minimum 1 GSa/s
Trigger Features: Adjustable trigger hold-off and external triggering capabilities
Brands: Rigol, Siglent, Keysight
2. Glitching Platform
This is the brain of the operation and delivers precisely timed voltage dips or EM pulses to the target. Popular platforms include:
ChipWhisperer Lite / Pro – The gold standard for beginner-to-intermediate glitching and side-channel analysis
Glitcher Nano – Compact and powerful for simple low-cost setups
Custom-built Arduino or STM32-based glitchers – Viable with the right firmware and low latency
3. Power Delivery and Monitoring
Glitching often involves tampering with the VCC or RESET lines of the target. Clean power and monitoring are key:
Bench Power Supply – Adjustable voltage/current limits with fine resolution
Low ESR Capacitors – For local power rail stability
Current Sense Resistors or INA219 Sensors – To monitor target behavior during injection
4. Precision Clocking Tools
Controlling or synchronizing the target’s clock can increase the reliability of glitch timing:
External Clock Generator – Can override the target's internal oscillator
Frequency Synthesizers – Useful for fine-tuning clock speed to amplify vulnerability
5. Micromanipulators and Test Probes
Reliable probing of tiny test pads and traces is a must. A soldered connection can introduce delay or instability.
Pogo Pins – Non-invasive access to test points
Sharp Logic Analyzers (e.g., Saleae Logic) – For correlating events to firmware operations
Micromanipulator Arms – For precise placement of probes on QFN or BGA packages
6. Firmware Tools and Debugging
You need a way to observe bootloader behavior, UART output, or response to glitches:
SEGGER J-Link / ST-Link – For SWD or JTAG debugging
USB-to-Serial Adapters (FTDI/CH340) – For monitoring console output
Bus Pirate / Logic Analyzer – For sniffing UART protocols
7. Shielding and Protection
When working with glitching hardware, isolation is key to avoid frying your USB ports — or your wallet:
USB Isolators
Opto-isolators on GPIOs
Faraday Cages or EMI Shielding – To contain unintended RF leakage
8. Software Suite
Without the right software, your gear is just metal and silicon. You’ll need:
ChipWhisperer GUI / Python API
OpenOCD – For low-level debugging
Ghidra / IDA Pro – To reverse bootloader firmware and map function locations
Custom glitch scripts – To coordinate attack sequences and validate results
A Word of Caution
This is not plug-and-play work. Glitching requires patience, repetition, and a willingness to destroy a few boards along the way. It is closer to science than engineering where you are inducing failure in a deterministic system and hoping it fails in your favor. We’ve spent thousands of hours fine-tuning our glitching setups and workflows. If you’re attempting this solo, be prepared for an uphill battle.
Or, if you prefer results over theory, get in touch. Praefortis has the gear, the experience, and the scars to prove it.
Nanosecond Timing
Precise timing is everything in hardware fault injection. That's why we use oscilloscopes to analyze signal behavior, clock cycles, and voltage irregularities. By observing the waveform outputs of the device under attack, we can align our glitch pulses with the microcontroller's instruction pipeline. We also use tools like the SEGGER J-Link for JTAG/SWD debugging, which allows us to halt execution, read registers, and inspect memory if the device isn't locked down completely. In devices where the debug interface is still partially accessible, this can be the most surgical and effective way to pull secrets out safely.
These tools and techniques aren't guesswork. They are part of a methodical process we have refined across hundreds of cases. At Praefortis.us, we combine electrical engineering, firmware reverse engineering, and real-world recovery experience to perform hardware wallet extractions that would be impossible with software alone.
DIY Hardware Hacking vs. Professional Extraction
While DIY hardware hacking might seem appealing, the risks are enormous: one wrong pulse or solder bridge can permanently destroy access. We've handled hundreds of hardware wallet recoveries without ever losing a customer’s funds. We use calibrated tools, methodical extraction protocols, and secure key handling environments to ensure success where DIY often ends in permanent loss.
Factor / Risk | DIY Attempt | Professional Recovery (Praefortis.us) |
---|---|---|
Required Equipment Cost | 💸 $15,000+ (glitcher, scope, debug tools) | ✅ Included in service |
Technical Skill Level | ⚠️ Very High (EE + firmware + fault injection) | ✅ Team of specialists |
Success Rate | ⚠️ Extremely low for non-experts | ✅ High — no customer wallet lost to date |
Risk of Permanent Bricking | ❌ High (glitching at wrong moment) | ✅ Fully mitigated with staged testing |
Oscilloscope Tuning & Timing | ⚠️ Requires sub-10ns precision tuning | ✅ Calibrated lab setups + automated triggers |
Safe Key Extraction | ❌ Difficult (volatile memory issues) | ✅ Expert-controlled extraction flow |
Debugging Interface Handling | ⚠️ Risk of locking down chip further | ✅ Custom J-Link scripts + forensic staging |
Chip Removal / PCB Work | ⚠️ Requires micro soldering, reballing | ✅ Clean lab conditions + microscope soldering |
Post-Recovery Handling | ❌ Often insecure (keys exposed) | ✅ Secure rekeying, signing, and cold transfer |
Legal Chain of Custody | ❌ None | ✅ Full documentation for estate & fiduciary cases |
Why DIY Hardware Hacking Is Simply Not Worth the Risk
Attempting hardware wallet hacking on your own, whether it’s voltage glitching, EM fault injection, or even chip probing is a high-stakes gamble that demands professional grade tools, nanosecond-level timing, and deep expertise in electrical engineering and firmware. The margin for error is razor thin. A single mistimed glitch or incorrect solder joint can permanently brick a wallet or render its contents unrecoverable. Worse, missteps may lock down the chip indefinitely or expose sensitive data without access, the net result that of having compromised funds beyond repair.
These techniques also require more than just hardware, they demand controlled lab environments, calibrated oscilloscopes, precision JTAG debugging with tools like SEGGER J-Link, and a forensic grade workflow where mistakes aren’t an option. Without the infrastructure to contain and analyze glitches, or prevent EMI and leakage, a DIY attempt is far more likely to destroy the wallet than recover any keys. Industry research confirms this vulnerability; powerful side-channel and glitching attacks exist, but executing them reliably requires expertise few individuals can replicate.
Through Praefortis, you get expertise refined through hundreds of successful recoveries without ever losing a single customer wallet. Our team combines academic-grade hardware testing rigs with validated glitch injection workflows, controlled debugging with SEGGER and J-Link, and cleanroom soldering techniques. We work in secure, test-driven environments where every recovery is scripted, repeatable, and documented. When lives (or livelihoods) depend on it, this structured approach is not just better, it’s essential.