Connect with us
DAPA Banner

Crypto World

Researcher uncovers fake Ledger Nano S modified to siphon crypto assets

Published

on

Counterfeit Ledger device.

This article has been updated with comments from a Ledger spokesperson.

A Brazilian security researcher has uncovered a sophisticated counterfeit Ledger device operation after discovering modified hardware designed to siphon cryptocurrency from unsuspecting users.

Summary

  • A Brazilian security researcher identified a sophisticated hardware compromise in a counterfeit Ledger Nano S Plus that utilized modified firmware to capture user recovery phrases.
  • Physical inspections of the fraudulent device revealed the addition of unauthorized WiFi and Bluetooth components alongside a secondary manufacturer’s chip hidden beneath scraped markings.
  • The operation relies on a deceptive QR code included in the packaging to lure users into downloading a malicious application designed to bypass official security checks.

The security researcher, known online as “Past_Computer2901,” shared findings on Reddit after purchasing what appeared to be a standard Ledger Nano S Plus from a Chinese marketplace. 

Advertisement

Despite the packaging and price point matching official retail standards, the unit failed a “Genuine Check” when connected to the authentic Ledger Live desktop application. 

This red flag led to a physical teardown of the device, revealing that the internal circuitry had been altered to include WiFi and Bluetooth antennas—features entirely absent from the legitimate model.

Hardware manipulation and malicious redirects

Scammers are utilizing these tampered devices to exploit first-time buyers through a deceptive setup process. 

A QR code included in the packaging directs users to a fraudulent version of the Ledger Live app, which is programmed to bypass security warnings and issue a fake verification of the hardware’s authenticity. 

Advertisement

Once a user follows the prompts to generate or enter a seed phrase, the compromised firmware captures the data, allowing the attackers to drain the wallet at will.

“This isn’t meant to cause panic, but rather to serve as a serious warning — I’m honestly still a bit shaken by the sheer scale of this operation,” the researcher noted.

Internal analysis of the unit showed that the scammers went to great lengths to hide the fraud, including scraping off original chip markings.

Advertisement
Counterfeit Ledger device.

Counterfeit Ledger device. Source: Reddit. 

While the device initially identified itself as a Nano S Plus 7704 during the boot phase, the final sequence revealed the manufacturer as Espressif Systems, a Shanghai-based semiconductor firm. 

These modifications fundamentally break the security premise of Ledger products, which are built to keep private keys in a strictly offline environment.

“When purchasing from a marketplace, Ledger strongly encourages users to verify the identity of the seller. Users should ensure they only download the official Ledger Wallet apps on desktop and mobile. The situation involved counterfeit hardware, paired with a fake companion app flow designed to simulate the onboarding process, distributed through unofficial channels,” a Ledger spokesperson told crypto.news.

“Ledger will never ask users for their 24 words. If anyone claiming to be Ledger, or any app that purports to be a Ledger app, asks for your 24 words, you should immediately assume it is a scam,” they added.

Advertisement

The discovery follows a separate incident earlier this month where a fraudulent app bypassed Apple App Store security via a bait-and-switch tactic. The malicious software successfully tricked over 50 people into revealing their recovery phrases, resulting in the theft of $9.5 million before the platform removed the listing. The app has since been removed for malicious bait-and-switch functionality, according to Apple.

“Stay safe out there. Only download Ledger Live from ledger.com. Only buy hardware from ledger.com. If your device fails the Genuine Check — stop using it immediately,” the researcher cautioned.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Circle Launches USDC Bridge For Native Cross-Chain Transfers

Published

on

Circle Launches USDC Bridge For Native Cross-Chain Transfers

Stablecoin issuer Circle has launched USDC Bridge, a new user interface built on top of the Cross-Chain Transfer Protocol (CCTP) that seeks to simplify native cross-chain transfers of the USDC stablecoin.

On Friday, Circle’s USDC X account said the bridge allows users to move the USDC (USDC) stablecoin in a “predictable, transparent way,” citing a native burn-and-mint transfer mechanism and no bridge complexities.

Gas fees will be handled automatically, fees will be shown upfront, and live status updates will be provided throughout the transfer, Circle added.

Source: Circle

The USDC Bridge builds on Circle’s CCTP, which was introduced in April 2023 and facilitates hundreds of millions of stablecoin transfers each day.

CCTP eliminated the need for wrapped and synthetic versions of USDC.

Advertisement

Cross-chain bridges seek to make the broader crypto ecosystem interoperable, functioning as a unified network rather than a collection of fragmented, isolated blockchains.

Making bridges as simple and easy to use as possible has been an area of focus for many crypto infrastructure firms. 

In the past, bridges have confused users and arguably slowed crypto adoption, especially for beginners struggling to navigate bridge interfaces, trade routes and gas fees.

USDC Bridge supports over a dozen blockchains

Cointelegraph found that USDC Bridge supports USDC transfers between at least 17 Ethereum Virtual Machine-compatible blockchains, including Ethereum, Avalanche, Arbitrum, Base, Monad, Optimism, Polygon, Sonic and World Network.

Advertisement

Related: Ukraine arrests FBI-wanted cybercrime suspect, seizes $11M in assets

Circle’s CCTP supports a broader number of blockchains, including Solana, Sui and Aptos, which are not natively EVM compatible.

On Wednesday, Circle was hit with a class action for failing to freeze around $230 million worth of USDC that moved through its CCTP from the Drift Protocol exploit on April 1.

Circle is accused of aiding and abetting conversion and negligence. 

Advertisement

More than 100 members are involved in the class action. The law firm representing them, Mira Gibb, is seeking damages, with the final amount to be determined at trial.

Magazine: Are DeFi devs liable for the illegal activity of others on their platforms?