Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/CyberSecurity News/Fake Ledger Wallets on Chinese Sites Steal Crypto Seeds
CyberSecurity News

Fake Ledger Wallets on Chinese Sites Steal Crypto Seeds

A Brazilian cybersecurity researcher has exposed a sophisticated, large-scale supply chain scam involving counterfeit <a href="https://www.cryptotimes.io/2026/04 The findings, posted to...

Jennifer sherman
Jennifer sherman
April 17, 2026 3 Min Read
7 0

A Brazilian cybersecurity researcher has exposed a sophisticated, large-scale supply chain scam involving counterfeit <a href="https://www.cryptotimes.io/2026/04

The findings, posted to Reddit by user u/Past_Computer2901, have sent shockwaves through the crypto security community, revealing a highly coordinated operation that combines tampered hardware, trojanized software, and cross-platform malware deployment into a single unified phishing pipeline.

The researcher purchased the device at a price matching the official Ledger store, with packaging and product listings that appeared authentic at a glance. Suspicion arose only after the device failed Ledger’s built-in Genuine Check when connected to a legitimately installed copy of Ledger Live — prompting a full physical teardown.

Inside the shell, the deception became undeniable. The original secure element chip had been replaced with an ESP32-S3 microcontroller, a generic IoT component manufactured by Shanghai-based Espressif Systems, a chip with no business being inside a hardware security device.

The chip markings had been physically scraped off to prevent identification, and the device contained a WiFi/Bluetooth antenna entirely absent in genuine Ledger Nano S Plus units. During boot mode, the chip initially spoofed itself as a legitimate Ledger product, but once the boot sequence completed, it betrayed its true identity: Espressif Systems.

A full firmware dump confirmed the most alarming finding: every PIN entered, and seed phrase generated on the device was stored in plaintext and transmitted to attacker-controlled command-and-control (C2) servers, including the domain kkkhhhnnn[.]com.

The fake firmware was labeled “Nano S+ V2.1” — a version that does not exist in Ledger’s official firmware lineup — effectively impersonating a product release to instill false confidence. The operation was designed to drain wallets across approximately 20 different blockchain networks simultaneously.

The counterfeit device shipped with a QR code inside the box, not directing buyers to ledger.com, but to a cloned phishing website where they would download a trojanized version of the Ledger Live app.

The fake app contained a hardcoded “Genuine Check” that always returned a success screen, meaning first-time crypto users would never receive any warning that their device was compromised. The malicious app was not properly signed and silently exfiltrated wallet data the moment it was used.

The scope of the operation extends far beyond a single fake app. The threat actors behind this campaign have deployed malware across Android, Windows, macOS, and iOS, with the iOS variant distributed through Apple’s TestFlight program to entirely bypass App Store review requirements.

Infrastructure analysis revealed three C2 servers, a cloned website, and a QR code redirect chain all registered under a shell company based in Shanghai.

Critically, the researcher clarified that Ledger’s official cryptographic Genuine Check does successfully detect this counterfeit device, but only when using the real Ledger Live downloaded from ledger.com.

The scam’s effectiveness hinges entirely on ensuring the victim never interacts with the legitimate application. The researcher has submitted a full technical report to Ledger’s security team, and a deeper analysis is expected following their review.

How to Stay Protected

  • Buy only from Ledger’s official website (ledger.com) or verified authorized resellers never from third-party Chinese marketplaces or auction sites
  • Download Ledger Live exclusively from ledger.com — never scan QR codes from inside the box to obtain software
  • Run the Genuine Check immediately upon first connecting any hardware wallet
  • Treat any firmware version not listed on Ledger’s official changelog as a red flag.
  • Report suspicious devices to Ledger’s security team at [email protected].

This incident marks one of the most technically sophisticated hardware wallet supply chain attacks documented to date, with confirmed financial losses from the fake app component alone surpassing $9.5 million across more than 50 victims.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwarephishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based

Next Post

Fake Zoom SDK Update Delivers Sapphire Sleet Malware Intrusion

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us