NOTE: This is an article from 2017 and is not relevant to the current versions of Jaxx.
- For more up to date information on free and commercial wallets, go to our crypto wallet guide.
- We also have a dedicated guide for staking wallets (incl. Exodus)
2017 Jaxx Vulnerability Report
Source: vxlabs.com
Even when your Jaxx has a security PIN configured, anyone with 20 seconds of (network) access to your PC can extract your 12 word backup phrase and copy it down. Jaxx does not have to be running for this to happen.
With the 12 word backup phrase, they can later restore your wallet, including all of your private keys, on their own computers, and then proceed to transfer away all of your cryptocurrency.
The main problem is that the Jaxx software encrypts the mnemonic using a hard-coded encryption key, instead of making use of a strong user-supplied password. (As Daira Hopwood points out in the comments, using the PIN would not be sufficient.)
This means we can easily read and decrypt the full recovery phrase from local storage using sqlite3 and some straight-forward code.
I successfully tested this vulnerability on the Jaxx Chrome extension v1.2.17 and the Jaxx Linux desktop app 1.2.13.
If you have BTC, ETH, ETC or other coins in Jaxx get them out now.
If you only ever used the Jaxx mobile apps your coins are apparently safe (not if you use both desktop and and mobile though).
Update: People report stolen ETH, ETC and ZEC