Scammers are sending fake hardware wallets to people whose data was gathered via a third-party data breach. These fake wallets contain hardware designed to steal the user's crypto.
The scam is an ambitious one. First appearing in May, the scammers mailed packages that contained a fake Ledger Nano wallet to the homes of Ledger users. They soldered a flash drive onto the interior of the fake wallet, and the packages also included a sealed bag with Ledger’s logo on it, and even shrink-wrapping the box itself, to appear as if it were never opened.
In a Ledger blog post Thursday explaining the scam, the company said the box includes a fake letter explaining the “need to replace your existing hardware wallet to secure your funds. This is a scam. The Ledger Nano is fake.”
A flash drive with a fake Ledger app is connected to the circuit board, and instructions enclosed with the device tell the recipient to plug in the wallet and run the malicious file. To initialize the device, the user is then asked for their 24-word recovery phrase.
That phrase could then be used to generate the wallet’s private keys, letting the scammer import a wallet and gain access to the funds.
“We are aware of this scam, which we have included in our list of ongoing malicious attacks listed on our website,” Ledger Chief Information Security Officer Matt Johnson told CoinDesk in an email. “You should be suspicious of receiving a free product in the mail that you didn’t order and check Ledger’s official channels or contact Ledger support team.”
Johnson added that Ledger and Ledger Live will never ask users to share their 24-word recovery phrase, that Ledger communicates securely through Ledger Live, never by mail or phone, and that the company would never mail anything to a user's address without their consent.
This is just the latest volley in a bombardment of scams and phishing attempts faced by Ledger customers whose data was compromised in last year’s breach. Victims have faced everything from phishing emails to even threats of home invasion.
The episode shows the cascading consequences that can happen as a result of data breaches, particularly if a scammer has the time, creativity and soldering ability to capitalize on it.