Snail Mail Phishing Campaign Targets Trezor and Ledger Crypto Wallet Users

Related

Lotus Blossom Hackers Compromised Notepad++ Hosting Infrastructure to Deliver Malware

What happened The state-sponsored threat group Lotus Blossom breached the...

Lithuania Launches National Initiative to Counter AI-Driven Cyber Fraud

What happened Lithuania has launched a government-funded national initiative aimed...

ClickFix Attack Abuses nslookup to Deliver PowerShell Malware via DNS

What happened Threat actors have introduced a new ClickFix attack...

Snail Mail Phishing Campaign Targets Trezor and Ledger Crypto Wallet Users

What happened Threat actors have launched a phishing campaign using...

Share

What happened

Threat actors have launched a phishing campaign using physical mail to impersonate communications from hardware wallet providers Trezor and Ledger, attempting to steal cryptocurrency recovery phrases. The letters, printed on fake company letterhead, instruct recipients to complete an urgent “Authentication Check” or “Transaction Check” by scanning a QR code and visiting a fraudulent website. 

The phishing pages mimic legitimate wallet setup portals and prompt users to enter their recovery phrase under the pretense of verifying device ownership. Once entered, the recovery phrase is transmitted to attacker-controlled infrastructure, allowing threat actors to import the wallet and steal cryptocurrency funds. 

The targeting source is unclear, though both Trezor and Ledger have experienced past data breaches that exposed customer contact information. 

Who is affected

Customers of Trezor and Ledger hardware wallets who receive and interact with the phishing letters are affected, as submitting recovery phrases allows attackers to gain full control of cryptocurrency wallets.

Why CISOs should care

The campaign demonstrates how attackers are expanding phishing techniques beyond digital channels by using physical mail and trusted brand impersonation to obtain sensitive authentication credentials.

3 practical actions

  • Warn users about recovery phrase security. Ensure users understand recovery phrases must never be entered into websites or shared externally.
  • Monitor for phishing domain access. Detect connections to known fraudulent domains impersonating Trezor or Ledger services.
  • Review exposure from prior data breaches. Assess whether customer contact data may have been exposed and used for targeted phishing campaigns.