• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Cyber-Criminals Exploit Hardware Wallet to Steal Almost $30,000

You are here: Home / Cyber Security News / Cyber-Criminals Exploit Hardware Wallet to Steal Almost $30,000

A modified hardware wallet has been implicated in the theft of almost $30,000 well worth of cryptocurrency, according to security gurus at Kaspersky.

The decline of 1.33 BTC ($29,585) was linked to new methods, the corporation defined in a report shared with Infosecurity.

“Hardware wallets have extensive been regarded just one of the safest approaches to retail store cryptocurrency, but cybercriminals have uncovered new methods to reward by marketing contaminated or phony gadgets to unsuspecting victims,” commented Stanislav Golovanov, cyber incidents investigation pro.

The sufferer, in this scenario, did not make any transactions on the working day their money was stolen and the chilly wallet was not connected to a computer. Therefore, they only understood the theft afterwards.

Read much more on crypto-theft in this article: “Kekw” Malware in Python Packages Could Steal Facts and Hijack Crypto

The Kaspersky investigation discovered that the hardware wallet the sufferer purchased experienced been tampered with. Despite the fact that it appeared the very same as the initial, it was not adequately welded with each other and alternatively held with each other with glue and tape. 

The security experts discussed that the attackers created three modifications to the initial firmware of the bootloader and wallet: they disabled the protective mechanisms replaced the random seed phrase with 1 of 20 pre-established phrases and only applied the first character of any extra password. 

This reportedly gave the attackers 1280 options to accessibility the phony wallet’s vital. As a final result, the attackers could run the disabled crypto wallet without the need of getting detected, as it appeared to function ordinarily. On the other hand, the attackers had total command in excess of it from the start.

Further more, the microcontroller inside the unit was different and had examine defense mechanisms, and the flash memory was entirely disabled. This led Kaspersky scientists to conclude that the sufferer had unknowingly acquired an already infected hardware wallet.

To preserve crypto assets safe and sound, Kaspersky industry experts encouraged buying hardware wallets only from approved resources, inspecting for indications of tampering, verifying the firmware and securing seed phrases with a strong password.

The discovery arrives a several months following a US man was charged with fraudulently obtaining $110m of cryptocurrency from trade Mango Markets and its shoppers.

Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « Experts Detail New Zero-Click Windows Vulnerability for NTLM Credential Theft
Next Post: Twitter Hacker Admits Guilt in New York Court, Extradited from Spain »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor
  • LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
  • Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
  • Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
  • Are Forgotten AD Service Accounts Leaving You at Risk?

Copyright © 2025 · AllTech.News, All Rights Reserved.