Trezor under phishing attack, maximum alert



Understanding the Recent Trezor Phishing Attack

A recent phishing attack targeted Trezor users by exploiting the company’s support module, sending out fraudulent emails. The attackers sent fake requests using real users’ email addresses, prompting the system to generate automatic responses that appeared legitimate. These emails, sent from Trezor’s system, requested users to share their wallet backups, a crucial element for accessing funds.



How the Exploit of Trezor’s Contact Module Occurred

The hackers didn’t directly breach Trezor’s internal systems or email servers. Instead, they took advantage of an automatic response mechanism tied to Trezor’s public contact form. By sending fake requests from stolen or impersonated email addresses, they triggered legitimate support responses, which deceived users because the emails seemed to come from an official channel.

  • Support module: Although secure for legitimate requests, it was manipulated by executing false requests.
  • Automated responses: These became a tool for phishing, mimicking authentic communications.
  • Phishing on sensitive information: Users were asked to provide their seed phrase or wallet backup, which should never be shared.

The Official Position of Trezor

Trezor clarified that there was no email breach and that the incident was limited to the fraudulent use of an external interface. The company emphasized on its social media channel, X, that users should “NEVER share your wallet backup—it must always stay private and offline. Trezor will never ask for your wallet backup.” This statement aimed to heighten community awareness about personal security importance.

See also  Bitcoin Cash (BCH) Surges Above $500 Amid Bullish Momentum and Security Concerns

Ecco cosa è successo

Non c’è stata alcuna violazione delle email.

Gli aggressori hanno contattato il nostro supporto per conto degli indirizzi interessati, attivando una risposta automatica come un messaggio legittimo di supporto Trezor.

Il nostro modulo di contatto rimane sicuro e protetto.

Stiamo attivamente ricercando modi per prevenire futuri…

— Trezor (@Trezor) 23 giugno 2025

Containment and Strategies to Prevent New Vulnerabilities

Following the alert, Trezor stated that the exploit has been contained. The company is developing stricter procedures to limit future abuse of the support system. The focus is on implementing more sophisticated filters and controls to stop unauthorized requests from triggering harmful automatic responses.

Despite the severity of this attack, Trezor’s fundamental security protocols remained intact, reaffirming the robustness of the company’s infrastructure. This incident serves as a warning for the entire crypto community to rigorously monitor communications and interactions with services.



The Context of Increasing Phishing Attacks in the Crypto Sector

The Trezor case is part of a broader trend of increasing phishing attacks targeting crypto platforms and users. Just days earlier, CoinMarketCap experienced a similar exploit that injected malicious code into their system, displaying fake wallet verification pop-ups. This attack resulted in losses of over $21,000 across 76 compromised accounts.

See also  Indian Crypto Exchange CoinDCX Loses $44 Million in Security Breach

Simultaneously, Cointelegraph reported a front-end compromise involving fake airdrop promotions, which deceived users into connecting their wallets, leading to asset thefts. These incidents confirm a trend towards more sophisticated scams, where official channels are manipulated, increasing user trust and the likelihood of successful schemes.

Other Recent Campaigns and Targeted Attacks

  • March 2025: Fake emails were sent to Coinbase and Gemini users to push them to migrate funds to self-custody wallets.
  • April 2025: JFrog discovered a malicious Python package disguised as a legitimate library, stealing API keys and credentials of crypto traders.
See also  CoinDCX hit by $44.2 mn cyberattack on operational account; assures customer funds protected, operations normal

These episodes indicate that attacks are shifting away from traditional malware towards social engineering and the abuse of legitimate communication infrastructures. This approach deceives users into revealing crucial information like backups and private keys.

Implications for Users and Security Tips

The attack on Trezor shows that security in the crypto world relies not only on the technical strength of systems but also on users’ ability to recognize phishing attempts. Any request to send a wallet backup or seed phrase should be a red flag.

To protect themselves, users must follow some essential rules:

  • Never share the wallet backup;
  • Beware of emails or messages requesting sensitive data;
  • Always verify the authenticity of communications by contacting official channels;
  • Keep software and security devices updated;
  • Be aware of the risks associated with social engineering.

Trezor is actively working to strengthen security and prevent similar vulnerabilities in the future.

See also  Avalanche (AVAX) Faces Mixed Signals Amid Regulatory Delays and Promising Partnerships

Future Prospects and Resilience of the Crypto Sector

Despite the dramatic nature of recent events, the crypto sector shows a growing focus on cybersecurity and user protection. Incidents like the one with Trezor prompt improvements in protocols and increase collective awareness.

The continuous evolution of attack techniques encourages the search for more effective solutions, from the introduction of advanced anti-fraud systems to enhanced user education. Consequently, trust in the sector remains an achievable goal as long as coordinated and proactive strategies are adopted.

In conclusion, maintaining a high guard against phishing and other abuse attempts is essential to protect both users and the integrity of platforms. The security of digital resources depends on collaboration between companies and the community, with a constant focus on prevention and innovation.

See also  Moria partnered with Hashlock to conduct a security audit of their smart contracts

Image Credit: en.cryptonomist.ch

Hot Topics

Related Articles

bitcoin
Bitcoin (BTC) $ 118,270.69
ethereum
Ethereum (ETH) $ 3,771.49
tether
Tether (USDT) $ 1.00
bnb
BNB (BNB) $ 795.17
xrp
XRP (XRP) $ 3.20
cardano
Cardano (ADA) $ 0.828476
usd-coin
USDC (USDC) $ 1.00
matic-network
Polygon (MATIC) $ 0.236822
binance-usd
BUSD (BUSD) $ 0.997766
dogecoin
Dogecoin (DOGE) $ 0.238938
okb
OKB (OKB) $ 48.25
polkadot
Polkadot (DOT) $ 4.18
shiba-inu
Shiba Inu (SHIB) $ 0.000014
tron
TRON (TRX) $ 0.320619
uniswap
Uniswap (UNI) $ 10.60
wrapped-bitcoin
Wrapped Bitcoin (WBTC) $ 118,154.66
dai
Dai (DAI) $ 1.00
litecoin
Litecoin (LTC) $ 114.83
staked-ether
Lido Staked Ether (STETH) $ 3,767.73
solana
Solana (SOL) $ 186.57
avalanche-2
Avalanche (AVAX) $ 25.00
chainlink
Chainlink (LINK) $ 18.68
cosmos
Cosmos Hub (ATOM) $ 4.80
the-open-network
Toncoin (TON) $ 3.32
ethereum-classic
Ethereum Classic (ETC) $ 23.09
leo-token
LEO Token (LEO) $ 8.99
filecoin
Filecoin (FIL) $ 2.69
bitcoin-cash
Bitcoin Cash (BCH) $ 570.21
monero
Monero (XMR) $ 322.17