Beware of Cold Wallets! Trezor and Ledger users are receiving physical letters containing phishing QR codes in succession.

ChainNewsAbmedia

Cryptocurrency scam techniques are once again evolving. Recently, multiple hardware wallet users, including those of Trezor and Ledger, have reported receiving physical letters disguised as official notices. The letters instruct recipients to scan a QR code for mandatory verification, but in reality, they are designed to trick users into entering their seed phrases, allowing attackers to steal assets. Such attacks are not new and highlight the ongoing risks of personal data leaks and social engineering scams.

Physical letters disguised as official notices demand “identity verification” within a deadline

Cybersecurity team Dmitry Smilyanets pointed out that several users received paper letters signed by Trezor or Ledger, claiming that they need to complete an “Authentication Check” or “Transaction Check” within a certain timeframe, or their devices may be restricted.

Reports indicate that the letters are meticulously crafted, featuring forged signatures, brand logos, anti-counterfeit stickers, and include a verification QR code. In some cases, the letters even bear the signature of Trezor CEO Matěj Žák.

Scanning the QR code directs to a fake website, prompting users to input their seed phrases

Dmitry Smilyanets reported that the QR codes in the letters lead recipients to malicious websites that mimic official pages, requesting users to enter their wallet seed phrases to complete a so-called “security verification.” Once the seed phrase is entered, the data is transmitted via backend APIs to the attackers, allowing them to import the wallet on other devices and transfer assets.

Both Trezor and Ledger emphasize that they never, and will never, ask users for seed phrases via websites, emails, or physical letters. Once seed phrases are leaked, control of the wallet is effectively lost.

Origin of the attack: Ledger’s past data breaches as a targeting list

The precision of these physical scam letters is linked to data breaches over the past years. In 2020, Ledger experienced a security incident involving its e-commerce partner Shopify, which exposed the names and physical addresses of hundreds of thousands of customers. In 2023, Ledger Connect Kit also suffered a supply chain attack. Early 2024, Trezor reported that contact information for 66,000 users was inadvertently leaked.

Just last month, Ledger was hacked through a third-party payment provider, Global-e, resulting in the exposure of user names and contact details. Although the company stated that private keys and payment information were not compromised, this data could still be used for phishing attacks. Even if the hardware wallet itself remains secure, leaked user data can be exploited repeatedly.

(Ledger’s third-party payment provider Global-e experiences data breach; official response: “Wallet hardware remains secure.”)

Evolving scam methods: from emails to physical social engineering

Recent attack trends show that phishing tactics are shifting from emails and fake customer service messages to counterfeit apps, fake hardware devices, and even physical letters. Physical mail reduces user suspicion, especially when designed to look highly authentic, making it easier to deceive recipients. These continuous attacks reflect the risks associated with data protection and reliance on third-party services within the crypto industry.

Dmitry Smilyanets warns that the most crucial defense for users remains a fundamental principle: “Never disclose your seed phrase to anyone under any circumstances.” Amid ongoing cybersecurity incidents, enhancing user awareness and securing supply chains will continue to be key challenges for the industry.

This article originally appeared on Chain News ABMedia: “Beware of Cold Wallets! Trezor and Ledger Users Receive Phishing QR Code Physical Letters.”

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

GoPlus: The Claude Chrome extension version 1.0.41 and below has a critical vulnerability and needs to be upgraded immediately.

GoPlus Security Agency warns that the Anthropic Claude Chrome extension has a high-risk prompt injection vulnerability, affecting versions below 1.0.41. Attackers can exploit this vulnerability to hijack user sessions and steal data. Users should update the extension immediately and remain vigilant.

GateNews5m ago

GoPlus: Below version 1.0.41 of the Claude Chrome extension has a high-risk vulnerability; upgrade immediately

On March 27, GoPlus cited a Koi report stating that Anthropic's Claude Chrome extension has a critical prompt injection vulnerability, affecting all versions below 1.0.41. Users are advised to update to version 1.0.41 or higher immediately and to be cautious of phishing links. Attackers could exploit this to hijack the extension and carry out data theft.

BlockBeatNews10m ago

BSC on-chain staking contract was subjected to a price manipulation attack, resulting in a loss of approximately $133,000.

Gate News reports that on March 27, according to BlockSec monitoring, a suspicious transaction targeting an unknown contract (Stake) occurred on the BSC chain, resulting in a loss of approximately $133,000. The root cause was an exploitable dependence on spot prices in the Stake contract.

GateNews4h ago

Israeli reservists! Selling out the country for 1000鎂 in cryptocurrency could face life imprisonment or the death penalty.

An Israeli reservist was charged with leaking Iron Dome system secrets related to Iran and assisting the enemy during wartime, facing life imprisonment or the death penalty. Investigations revealed that this individual received cryptocurrency via Telegram and provided sensitive information. Similar incidents have occurred in Taiwan, where the Chinese Communist Party has used cryptocurrencies to infiltrate the military, posing challenges to national security. Countries need to strengthen the protection of military secrets.

CryptoCity4h ago

ZachXBT reveals progress on Circle freezing incident: two more wallets are unfrozen, but case details remain undisclosed.

On-chain detective ZachXBT revealed that Circle has unfrozen two frozen hot wallets, "500 Casino" and "Whale," which users were previously unable to withdraw from. The details of the case are still unclear, and Circle has not objected to the information.

GateNews5h ago

DeFi Protocol Moonwell Faces $1M Threat After Cheap Token Buy

_Moonwell faces $1M risk after attacker buys cheap tokens and submits malicious vote proposal to gain control of DeFi lending protocol contracts._ A decentralized finance platform called Moonwell is facing a serious security threat after a very cheap attack. The incident was a surprise to the

LiveBTCNews11h ago
Comment
0/400
No comments