Hackers disguise them as official technical support per email

  • Vulnerability was already resolved, according to Trezor.

  • Trezor’s team confirmed that there was no email gap and asks not to share Wallet keys.

This June 23, from the official Trezor account in X, the company alerted about a type of fraud that could compromise the funds of its Wallet Hardware. The notice arose after identifying a vulnerability that certain attackers took advantage of to Send fraudulent emails to Wallet users, disguised as legitimate responses of the Trezor support.

According to Trezor’s team, the attackers They exploited the company’s contact form To start the scam. They used previously obtained email addresses to contact the support, which activated an automatic response that the criminals captured and altered to make it go through an official message.

This suggests that attackers could have accessed the directions committed through a Prior knowledge of user accounts already at risk, although the report It does not detail a specific method of obtaining.

The company clarified that There was no gap in its postal systemand the contact form remains safe, although it is worrying not to know how the hackers accessed the emails of Trezor users.

Despite this, they assured that The problem “was already contained”and the team investigates methods to avoid future abuses.

These emails, although they appear to be legitimate, are attempts to Phishing Designed to deceive users, says Trezor. «You never share your Wallet support, you must remain private and without connection. Trezor will never request your support from Wallet, ”said the company in its statement.

The main risk is that users deliver their secret Wallet key, which allows access to funds in Bitcoin (BTC) or other cryptocurrencies stored, losing control over assets.

From Trezor they stressed that legitimate interactions always come from official channels and never include sensitive data requests.

For now, Trezor says that his infrastructure remains intact, but the case underlines the need for monitor communication channels of companieseven if these are or seem reliable.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *