Powered by

Artificial Intelligence

Ledger HACKED!! How to Protect Your Crypto!! 😱



🔥 TOP Crypto TIPS In My E-newsletter 👉
📲 Insider Data in my Socials 👉
🔓 Get Your Trezor 👉
🛒 Get The Finest Offers In Crypto 👉

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

– TIMESTAMPS –
0:00 Intro
2:02 What Occurred?
4:09 Ledger Breach
6:20 Information Dump
8:04 Phishing Makes an attempt
10:51 Potential Dangers
13:29 Defending Your self
15:29 Pockets Suggestions
17:54 Upgrading Safety
19:43 Conclusion

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⛓️ 🔗 Useful Hyperlinks & Sources 🔗 ⛓️

► Have I been Pwned:
► Ledger Preliminary Disclosure:
► Ledger Dump:
► Organising Trezor:
► Passphrase Trezor :
► SimSwap Assault:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

🤔 What Occurred? 🤔

Ledger had their database hacked again in June the place the hacker was in a position to get away with 1 million electronic mail addresses and 250,000 private info (identify, deal with and so forth).

This was then used with a view to run phishing schemes on the Ledger customers. They did this by electronic mail in addition to telephone messages.

This was then leaked on a hackers discussion board on the twentieth of December accessible for anybody to see. Customers began getting quite a lot of private emails that had been making an attempt to extort them.

😨 Dangers From Hack 😨

The primary threat that exists is that individuals know the place you reside they usually know that you’ve crypto. They may come to your home and drive you to enter your password and hand over the crypto.

The phishing assaults are additionally a threat because the hacker will attempt to get you to obtain some malware that may steal your non-public keys or your seed phrases.

These phishing assaults have additionally prolonged past simply {hardware} wallets because the hackers have focused customers with trade phishing makes an attempt.

Lastly, there may be additionally the chance that they may get sim swapped on these exchanges. That is when the hacker will commandeer the cellphone and bypass the 2 issue authentication.

There have been additionally makes an attempt to phish the seed phrases from those that held a trezor machine. The hackers knew that the majority who had a ledger most certainly additionally had a trezor as nicely.

❓ What To Do? ❓

Do not obtain any hyperlinks from any {hardware} pockets producer that emails you. You also needs to not reply to any emails or extortion makes an attempt. They may take that as a sign that you simply reply to those and ship extra of them to you.

You also needs to change your electronic mail deal with on the different exchanges when you’ve got used the identical electronic mail for ordering the ledger.

If you happen to do have any trade accounts, then you’ll in all probability additionally need to keep away from utilizing sim primarily based authentication and somewhat go for one thing like Google Authenticator or Authy. Each of those generate an OTP in your telephone regionally.

🔓 How I Improve Opsec 🔓

Firstly, let’s begin with how I ordered that ledger machine. I used a separate electronic mail deal with from the one which I exploit personally on all my different accounts. I had set this to auto ahead any electronic mail that I did get from ledger concerning monitoring with my parcel.

Then, when it got here to the transport deal with, I do personal a put up field right here in London. I’ve used this for various different deliveries that I needed to take with out individuals understanding the place I reside.

I additionally didn’t hand over a contact phone quantity for them to name me. I’m extremely cautious of giving my quantity to anybody and in addition to – they’d my electronic mail so that they did not want to really attain out to me on the telephone.

Additionally, you will need to just remember to do not order your Ledger machine from any kind of third get together vendor. It is because they may have tampered with it.

💯 Subsequent Stage Safety 💯

If you happen to purchase a Trezor machine you possibly can set your self a separate passphrase which is able to let you go right into a secret pockets that nobody else is ready to see. This can be utilized in any time the place you might be beneath duress.

You also needs to think about getting a protected deposit field the place you possibly can retailer two halves of each of your seed phrases. This will make it possible for nobody else is ready to get close to that crypto. You can even think about inserting these two bins in separate areas.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

📜 Disclaimer 📜

The knowledge contained herein is for informational functions solely. Nothing herein shall be construed to be monetary authorized or tax recommendation. The content material of this video is solely the opinions of the speaker who isn’t a licensed monetary advisor or registered funding advisor. Buying and selling Foreign exchange, cryptocurrencies and CFDs poses appreciable threat of loss. The speaker doesn’t assure any specific consequence.

#Ledger #Bitcoin #Hack #crypto #databreach #cryptocurrency #trezor #hardwarewallet

Source: Coin Bureau

46 Responses

  1. If you want to hear my ongoing thoughts about the Ledger hack and its implications, you can join my social channels 👉 https://guy.coinbureau.com/socials/

    Quick few points:
    1. If you ordered a Ledger after June of this year then your data was not accessed and you should be ok. You can still check it out by visiting the leak checking site in the description.
    2. If your email is in the ledger breach, then you can check whether your phone number is as well here: https://www.argent.xyz/ledgerhack/
    3. Buying from a third party seller is not too safe given the points I raised. However, if you are sure the box has not been tampered with and the seeds are autogenerated it could be ok. Be sure to check out the hardware wallet setup instructions.
    4. People asking if ledger goes out of business, what then? Well, you can always restore a wallet from a seed on a wallet that supports BIP39. Trezor does so your seeds should work there.

  2. The worst part about this is that in countries like sweden, all this information is public, your address, name, previous addresses, phone number, all your information is public, your entire life can be accessed by the public.

  3. Meshtoolz🪐com team 0n internet has just made my day I'm so excited to them for recovering my lost BTC, I saw some positive comment and information about them and I decided to message them and they got my lost Bitcoin back.. .

  4. Meshtoolz🪐com team 0n internet has just made my day I'm so excited to them for recovering my lost BTC, I saw some positive comment and information about them and I decided to message them and they got my lost Bitcoin back.. .

  5. Believe you me bitcoin is for real and scammer are real too, but all thanks to exceptionalcyber who gave me full assurance and recovered my bitcoin for me, I really appreciate you bro because you are d best, when to hacking:

  6. Words are short for me to express how I feel right now exceptionalcyber on iG just helped me recovered my lost bitcoin, less than half an hour, you are the best hacker so far that I have ever seeing 💯 sure*

  7. Words are short for me to express how I feel right now exceptionalcyber on iG just helped me recovered my lost bitcoin, less than half an hour, you are the best hacker so far that I have ever seeing 💯 sure*

Leave a Reply to Cisco Kid Cancel reply

Stay Connected
Category

To stay on top of the ever-changing world of cryptocurrency, subscribe now to our newsletters.

Subscribe To Our Weekly Newsletter

Get notified for our latest news
We’ll never spam your inbox

At Upshot Firm, we can help your business automate using latest technologies, like New Website Development, Applications (Apps) Creation, Blockchain Integration, Artificial Intelligence (AI) process managment. We also have experience in Smart Marketing and have access to influencer.