Trezor Data Breach Exposes Email and Names of 66,000 Users

The latest Trezor data breach places users at risk of phishing scams, potentially leading to the theft of additional login credentials.

Trezor, the hardware wallet manufacturer, has disclosed a data breach involving unauthorized access to a third-party support portal used by the company.

In a worrying development for cryptocurrency enthusiasts, hardware wallet manufacturer Trezor disclosed a data breach on January 20, 2024, that potentially exposed the contact information of nearly 66,000 users.

While the company assures that no user funds were compromised, the incident highlights the importance of cybersecurity even for hardware wallets, which are often touted as the most secure way to store digital assets.

What Happened?

The breach involved unauthorized access to a third-party support portal used by Trezor. The incident occurred on January 17, 2024, and potentially affected users who interacted with the support team since December 2021. The exposed information included email addresses and usernames, however, Trezor confirmed that the attacker did not access the phone numbers or postal addresses of victims.

We are making every effort to work with the third-party service provider to comprehensively investigate the incident. However, our internal audit of the incident suggests potential access to contact details, limited to email and name/nickname.

Trezor

Why is This Concerning?

Even though user funds and addresses remain safe, the exposed contact information puts users at risk of phishing attacks. Hackers could use this information to send targeted emails impersonating Trezor and attempt to steal users’ login credentials or private keys. These keys are essential for accessing and managing cryptocurrency holdings, and if compromised, could lead to significant financial losses.

Trezor Data Breach Exposes Email and Names of 66,000 Users
Here is an image capturing the email sent to users by the malicious actor during the security breach. (Screenshot via Trezor’s blog post)

What Trezor is Doing

Trezor has taken several steps in response to the breach:

  • Notified all 66,000 potentially affected users via email.
  • Emphasized that user funds were not compromised.
  • Investigated the incident and took steps to prevent future breaches.
  • Advised users to be wary of phishing attempts and to take steps to protect their online accounts.

What Users Can Do

If you are a Trezor user and received an email about the breach, here are some steps you can take to protect yourself:

  1. Be cautious of any emails claiming to be from Trezor. 
  2. Do not click on any links or open any attachments in suspicious emails.
  3. Change your Trezor PIN and password immediately.
  4. Enable two-factor authentication for your Trezor account.
  5. Regularly update your software and operating system.
  6. Report any suspicious activity to Trezor support.

Impact of the Breach

The Trezor data breach is a reminder that no system is foolproof, even for hardware wallets. While user funds were not compromised in this incident, it serves as a wake-up call for the cryptocurrency community to be vigilant about cybersecurity. Users should be aware of the risks associated with phishing attacks and take steps to protect themselves.

  1. 6 of the Best Crypto Bug Bounty Programs
  2. Outdated Wallets Threatening Billions in Crypto Assets
  3. Crypto Scammers Exploit Gaza Crisis in Donation Scam
  4. We Need Smarter Smart Contracts To Prevent DeFi Hacks
  5. Scammers Use Fake Ledger App on Microsoft Store to Steal $800K
  6. Inferno Drainer Phishing Nets Scammers $80M from Crypto Wallets
  7. “Get Paid to Like Videos”? This YouTube Scam Leads to Empty Wallets
Total
0
Shares
Related Posts
Read More

New SystemBC malware targets Windows PCs by evading detection

While finding and removing malware on your computer system may indeed be a joyous moment, there's a new malware out there that will give you a headache instead. To know why, a dive through is needed into SystemBC, a malware written in C++ that has been discovered by researchers at Proofpoint and dubbed so because the word is a part of the URI path found in one of the malware's advertisements.