Phishing Ledger: a bitcoiner loses all his savings

phishing ledger

Why invest in expensive hardware to mine Bitcoin (BTC), if all it takes is a few hundred dollars to create a phishing site, to send SMS and emails to pigeons? A Ledger user had his savings stolen: $ 50,000 in Bitcoin. Cryptophyls must remember and master the usual safety precautions to avoid being “phisher”.


Ledger user cut down on Bitcoins

On December 9, 2020, the presenter of Magic Internet Money podcast, Brad mills, mentions an incident causing the loss of the equivalent of $ 50,000 in Bitcoin following a phishing targeting users of Ledger.

Mills did not share information as to the modus operandi of this attack. Hackers could have used one of the most common phishing techniques, which is to send a text or email claiming that some servers have been infected with a virus.

This email prompts users to Ledger to update their hardware by installing software. The latter is a malware intended to collect the seed phrase and user identifiers.

They are then redirected to a clone of the site of Ledger where they install the malware.

Unfortunately, they only realize the deception after the hackers have emptied their wallets.

The usual precautions: a good reminder

These attacks began in October 2020 and many customers continue to fall into the trap set by hackers.

The team of Ledger advises its users to verify all communications using unrecognized email addresses of Ledger.

It is recommended that downloads only from the official company website.

Users should not enter personal information on any website; Ledger they never ask them for sensitive information from their customers.


Bitcoin may be a “futuristic” technological reserve, but it doesn’t take much to trap bitcoiners. Hackers don’t even have to invent new practices to be successful, the good old recipes still work. Should every crypto custodian service provider set up a private communication channel with their users, to put an end to phishing? Cryptophiles who ignore the basic principles of cybersecurity: like what, we are not all geeks in the cryptosphere.


Related Articles

Back to top button