On Nov. 15, Scott Melker, aka “The Wolf of All Streets,” said that one of his followers was hacked in the latest scam targeting Ledger users.
While checking his Nano S hardware wallet, the user reported seeing a 503 HTTP API error when it attempted to synchronize, “which in and of itself terrified me.”
The victim reached out to Ledger support and reported having the CTO (chief technology office) contact him via direct message on X.
This is when alarm bells should have rung as support isn’t that quick, and customers definitely won’t get to speak to executives and are likely to be lumbered with a chatbot.
Scam alert.
I have been speaking with one of my followers here, who shared that he was hacked this morning on a Ledger scam.
Here is what he said happened –
“Woke up this morning and wanted to just do a sanity check on my Nano S – ensure accounts look good and maybe move a…
— The Wolf Of All Streets (@scottmelker) November 14, 2023
Fake Ledger Support
The spurious CTO walked the user through a five-step “fix,” which involved visiting a fake website and entering details about the device and the passphrase.
“I even asked him about why it was required, and he mentioned it was end-to-end encrypted and a requirement to sync,” the victim said before adding:
“Moving too quickly and obviously not thinking clearly, I gave it and within minutes realized my account was completely drained.”
Melker lamented that the person was “on top of his security,” but a simple mistake was all it took.
“This has happened to SO MANY PEOPLE that never tell you about it,” he added.
Genuine support staff will never ask you for your passphrases, and the phishing scam relied on social engineering to induce a mistake by the user and could have happened on any wallet.
What wasn’t detailed was how the scammers quickly commandeered Ledger support channels and posed as company executives.
Go to Source to See Full Article
Author: Martin Young