The 2020 data breach of the hardware wallet company Ledger has taken yet another turn.
Scammers are sending fake hardware wallets to people whose data was gathered via a third-party data breach. These fake wallets contain hardware designed to steal the user’s crypto.
The scam is an ambitious one. First appearing in May, the scammers went to the extent of soldering additional hardware to the housing of a Ledger Nano wallet and packaging it in a Ledger box. The most recent iteration adds the additional facade of a sealed bag with Ledger’s logo on it, and even shrink-wrapping the box itself, to appear as if it was never opened.
In a Ledger blog post Thursday explaining the scam, the company said the box includes a fake letter explaining the “need to replace your existing hardware wallet to secure your funds. This is a scam. The Ledger Nano is fake.”
A flash drive with a fake Ledger app is connected to the circuit board and instructions enclosed with the device tell the recipient to plug in the wallet and run the malicious file. To initialize the device, the user is then asked for their 24-word recovery phrase.
That phrase could then be used to generate the wallet’s private keys, letting the scammer import a wallet and access the funds.
“We are aware of this scam, which we have included in our list of ongoing malicious attacks listed on our website,” Ledger Chief Information Security Officer Matt Johnson told CoinDesk in an email. “You should be suspicious of receiving a free product in the mail that you didn’t order and check Ledger’s official channels or contact Ledger support team.”
Johnson added that Ledger and Ledger Live will never ask users to share their 24-word recovery phrase, that Ledger communicates securely through Ledger Live, never by mail or phone, and the company would never mail anything to a user’s address without their consent.
This is just the latest volley in a bombardment of scams and phishing attempts faced by Ledger customers whose data was compromised in last year’s breach. Victims have faced everything from phishing emails to even threats of home invasion.
The episode shows the cascading consequences that can happen as a result of data branches, particularly if a scammer has the time, creativity and soldering ability to capitalize on it.