While cryptocurrencies are an impressive piece of modern technology, they remain susceptible to vulnerabilities. Hackers, who are becoming more and more devious every year, are seizing these opportunities. Recently, they have taken over the hardware's Discord channel wallet Ledger attacked. Here they tried to get information about the hardware wallets through underhand tricks.
The scammers pretended to be moderators of Ledger and sent phishing links in the chats. When unknowing crypto owners followed these links, they were asked to enter their recovery seed. A proven method that allowed hackers to simply gain access to the wallets and steal the cryptocurrencies. The number of victims and the total damage are still unknown, which makes the situation all the more worrying.
A hardware wallet is designed to store your crypto assets offline and securely. However, hackers sometimes manage to breach this security. Important precautions you can take yourself are: never share your recovery seed with anyone, only use official software and links and always double-check URLs. Because a small typo can lead to big losses.
Even with technologies like Discord, which allow users to communicate anonymously, you can take measures against identity fraud. By staying vigilant yourself and using two-factor authentication, for example, you ensure a reduced risk of hacks. You can even add extra authentication processes to increase your digital security.
Ledger confirmed that the hackers did not gain direct access to the hardware wallets, but only gathered information via chat. The company is now taking stricter measures to protect access for administrators of its social channels and to remove suspicious messages more quickly. Ledger will also communicate more frequently about security updates and share tips to better protect users from future hacks.
What is a recovery seed?
A recovery seed is a string of words that serves as a backup key for your blockchain wallets. It is crucial to keep it private and secure.
How does two-factor authentication work?
Two-factor authentication requires a second form of verification, such as a code sent to your mobile phone, in addition to the password. This increases security.
Is every hardware wallet susceptible to an attack?
No form of technology is completely immune to attack, but hardware wallets are generally one of the safest options for storing cryptocurrencies when used correctly.