Connect with us
DAPA Banner

Crypto World

Counterfeit Ledger Devices Found Draining Crypto Wallets Through Supply Chain Fraud

Published

on

Brian Armstrong's Bold Prediction: AI Agents Will Soon Dominate Global Financial

TLDR:

  • Counterfeit Ledger Nano S Plus devices use ESP32 chips to steal seeds and PINs in plain text format.
  • A fake Ledger Live app passed Mac App Store review and drained over $9.5 million from 50+ victims.
  • The fraud spans five attack vectors including Android, iOS, Windows, macOS, and physical hardware.
  • Ledger’s genuine check feature fails when hardware is compromised at the supply chain source level.

Counterfeit Ledger hardware wallets are at the center of a growing threat targeting cryptocurrency users worldwide.

A security researcher has documented a large-scale operation distributing fake Ledger Nano S Plus devices through multiple online marketplaces.

The compromised units appear identical to legitimate products but carry entirely different internal hardware. Seeds, PINs, and wallet data are being sent directly to attacker-controlled servers, draining any wallet initialized on the device.

Fake Hardware Hides Malicious Chips and Firmware

The counterfeit devices replace Ledger’s secure element chip with an ESP32 microcontroller. This substitute chip runs modified firmware labeled “Nano S+ V2 1.”

Unlike the genuine secure element, this hardware stores sensitive data in plain text. That data is then transmitted to remote servers controlled by the attackers behind the operation.

Advertisement

Beyond the hardware, the campaign also distributes a fraudulent version of Ledger Live. This fake app is built with React Native and signed using a debug certificate.

It intercepts transactions and sends sensitive user data to multiple command-and-control servers. Users downloading this version have no visible indication that anything is wrong.

The attack spans five separate vectors: compromised hardware, Android APKs, Windows executables, macOS installers, and iOS apps.

The iOS distribution uses Apple’s TestFlight platform to bypass the standard App Store review process. This approach allows the fraudulent software to reach users without triggering typical security checks. Each channel serves as an independent entry point for the same underlying scam.

Ledger’s built-in genuine check feature is designed to verify device authenticity. However, that verification process can be bypassed when the hardware is tampered with at the source.

This makes the point of purchase a critical security variable. Buying from unauthorized sellers removes the only reliable layer of hardware-level verification.

Advertisement

Separate Mac App Store Fraud Drained Over $9.5 Million

Separately, on-chain investigator ZachXBT documented another fake Ledger Live app that passed through Apple’s Mac App Store review. That operation alone drained more than $9.5 million from over 50 victims.

Among those affected was musician G. Love, who lost 5.92 BTC after entering his recovery phrase into the fraudulent application. The app presented itself as the legitimate Ledger companion software.

These two operations together show a clear pattern in how attackers are targeting hardware wallet users. Rather than exploiting firmware vulnerabilities, they are intercepting users before they reach a genuine device.

The fraud happens at the distribution level, not the protocol level. This shift makes user behavior and purchase source more important than ever.

Advertisement

Security best practices remain unchanged despite the evolving tactics. Hardware wallets should only be purchased directly from the manufacturer’s official website.

No legitimate wallet software will ever request a 24-word recovery phrase on screen. Any application asking for seed phrase input is running a scam, without exception.

The broader message from both incidents is straightforward. The hardware itself remains secure when obtained through proper channels.

The vulnerability now lives in the supply chain and software distribution ecosystem. Staying safe requires equal attention to both where a device is bought and how companion software is sourced.

Advertisement

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Ukraine Detains Suspect In $100M Cybercrime Ring, $11M in Assets Seized

Published

on

Ukraine Detains Suspect In $100M Cybercrime Ring, $11M in Assets Seized

Ukrainian authorities have arrested a member of an international cybercrime network wanted by the FBI over allegations of fraud and money laundering tied to losses exceeding $100 million across the United States and Europe.

The suspect was arrested in the Transcarpathia region during a joint operation involving the National Police of Ukraine and other internal security units, Ukraine police said on Thursday. Officials said the man had been wanted internationally for some time and was eventually found in Uzhhorod, where he was living under a fake identity using forged documents.

“He issued fictitious documents about his own death and continued to live in Ukraine as a “new” person, using false documents,” prosecutors said, adding that he laundered illicit proceeds through property acquisitions, often using relatives as intermediaries to disguise ownership and financial flows.

The suspect was part of a wider cyber syndicate that deployed malicious software to harvest personal data and corporate records, later using that information to extort victims by demanding payments in exchange for silence or the return of stolen material, per the announcement. The scheme targeted individuals and institutions in both the US and Europe.

Advertisement

Related: Paying Iran in crypto could put shippers at sanctions risk: Chainalysis

Ukraine seizes $3 million in crypto

During the investigation, authorities seized assets worth approximately $11 million, including cash, real estate, vehicles and cryptocurrency valued at around $3 million.

Ukrainian police seize crypto. Source: Prosecutor General Ruslan Kravchenko

Officials also flagged discrepancies between declared income and assets held by the suspect associates, pointing to tens of millions of Ukrainian hryvnias in unexplained wealth accumulation. Investigators say the financial trail helped reconstruct parts of the laundering network and confirm the scale of the operation. They also identified two additional accomplices linked to the laundering operation.

The suspect faces charges under Ukrainian criminal code provisions covering document forgery and money laundering. His alleged accomplices have also been charged and remain in custody.

Related: Ukraine blocks Polymarket, classifies prediction markets as gambling

Advertisement

Ukraine uncovers more hacker groups

Earlier this year, Ukraine, the United States and Germany uncovered another transnational hacking group responsible for blocking the systems of at least 11 American corporations and demanding ransom payments in cryptocurrency. Prosecutor General Ruslan Kravchenko said the attacks caused an estimated $1.5 million in damage, with the group consisting of more than 20 members, including seven based in Ukraine.

Authorities carried out searches at the homes of two Ukrainian suspects, seizing computers, phones, cash and documents. One suspect was also linked to the spread of BlackBasta malware.

Magazine: Bitcoin’s ‘biggest bull catalyst’ would be Saylor’s liquidation — Santiment founder