Home » Trezor: phishing attack targets users after data leak

Trezor: phishing attack targets users after data leak

by Patricia

After a data leak on a newsletter, Trezor hadware wallet holders are the targets of a phishing attempt. This well-constructed attack could sow doubt in the mind of a potential victim, but does not call into question the importance of wallet hardwares.

Trezor confirms origin of phishing

Since Sunday, a phishing attack has been underway among Trezor hardware wallet users. This malicious campaign has been confirmed by the company, following several questions from customers on Twitter:

The attack comes after a data leak occurred on a newsletter hosted by MailChimp. Thus, users received an email from “noreply@trezor.us” instead of the domain name “trezor.io”.

Those targeted by this email are then asked to download an alleged update to the latest version of the Trezor Suite software and then change their PIN.

As some on Twitter have noted, the email is very well structured and can leave room for doubt:

It is not known at this time whether the phishing has affected users of a Trezor hardware wallet. The company has suspended its newsletter for the time being to clarify the situation.

When fear leads to error

Of course, it should be noted that the security of Trezor hardwares is not in question, contrary to what this phishing attempt would have us believe.

We can only speculate what would happen if someone were to click on the link in the email. Although the aim is most likely to steal their cryptocurrency in some way.

This attack is reminiscent of the one suffered by Ledger almost two years ago. But in either case, these events do not detract from the effectiveness of hardwares wallets. They remain, to this day, the best alternative to protect one’s assets from a hacker who would try to take control of a computer or a wallet for example.

This type of scam often plays on fear, to push people to act in haste. If in doubt, social networks, and particularly those of the companies concerned, can help. Indeed, in the case of a real security breach, it would be in their interest to communicate it on their Twitter in particular.

Related Posts

Leave a Comment