Ich wusste bisher noch gar nichts von dem Datenleck im Sommer. Hab eben eine Mail von "Ledger" bekommen und dachte zuerst die wäre echt. Nachdem ich aber kurz recherchiert habe, bin ich u.a. auf den Thread hier gestoßen und es scheint sich ebenfalls um eine Phising-Mail zu handeln. Hier der genaue Wortlaut:
Diebstahl von Kundendaten - Bitte lesen.
Sehr geehrte Kundin,
Wir bedauern, Ihnen mitteilen zu müssen, dass es in Ledger zu einer Sicherheitsverletzung gekommen ist. Betroffen sind etwa 272.000 unserer Kunden. Leider ist auch das mit Ihrer E-Mail-Adresse verknüpfte Wallet ([Hier steht meine echte Mail-Adresse]) von der Verletzung betroffen.
Am 20. Dezember 2020 hat unser Forensikteam festgestellt, dass mehrere der Verwaltungsserver von Ledger Live mit Malware infiziert sind.
Derzeit ist es technisch unmöglich, die Schwere und Reichweite der Sicherheitsverletzung abschließend festzustellen. Aufgrund dieser Gegebenheiten müssen wir davon ausgehen, dass für Ihre Kryptowährungs-Assets das Risiko besteht, entwendet zu werden.
Sie erhalten diese E-Mail, weil Sie von dem Vorfall ebenfalls betroffen sind. Um Ihre Assets zu schützen, laden Sie bitte die neueste Version von Ledger Live herunter und folgen Sie den Anweisungen, um eine neue PIN für Ihr Wallet festzulegen.
Mit freundlichen Grüßen,
Ledger
Darunter ein Link wo man gebeten wird die neuste Ledger-Software zu installieren. Natürlich führt diese auf einen Download einer Seite die nicht zu Leger gehört.
Genau die selbe Mail habe ich auch erhalten. Vor knapp 10 Minuten. Ich denke, dass sich solche Mails in den nächsten Tagen aber wohl häufen werden. Einige sind vom Aufwand wirklich gut gemacht, einige wiederrum gar nicht.
Deshalb immer genau auf den Absender achten, es gab nämlich heute auch eine offizielle Mail von Ledger selbst.
Ich hoffe, dass du diese auch bekommen hast @tyz
Ansonsten kann ich diese nochmal zur Sicherheit quoten:
What happened?
We contacted our customers last July to tell them that part of our e-commerce marketing database had been leaked.
Yesterday we were informed about the dump of the content of a Ledger customer database on Raidforum. We believe this to be the contents of our e-commerce database from June, 2020. For specific questions please refer to the FAQ, which we will continue to update to address your concerns.
What information was involved?
At the time of the incident, in July, we engaged an external security organisation to conduct a forensic review of the logs available. This review of the logs enabled us to confirm that approximately 1 million email addresses had been stolen as well as 9,532 more detailed personal information (postal addresses, name, surname and phone number) that we were able to specifically identify.
The database publicly released yesterday shows that a larger subset of detailed information has been leaked, approximately 272,000 detailed information such as postal address, last name, first name and telephone number of our customers. These details are not available in the logs that we were able to analyse.
If you are part of the detailed personal information subset, you will receive a specific email notifying you within the next 24 hours (check your spam box). It is important to note that this data breach is not linked to our hardware wallets nor Ledger Live security and your crypto assets are safe and not in peril of being compromised. Due to our comprehensive security scheme, attackers cannot steal your sensitive information like recovery phrases and private keys unless you give it to them. You are the only one in control and able to access this information. DO NOT GIVE YOUR 24 WORDS TO ANYONE. Ledger will NEVER ask you for your 24 words.[/b]
What we are doing
Since July, we notified our clients in several communications via email, blog posts, and Twitter. We are doing everything possible to make Ledger stronger for the future. We have hired a new Chief Information Security Officer (CISO). We are further hardening our already strong systems and have thoroughly reviewed our data policy. We executed penetration tests and forensic analysis with external security firms to test these and find any additional vulnerabilities on our e-commerce systems.
We are continuously working with law enforcement to prosecute hackers and stop these scammers. We have taken down more than 170 phishing websites since the original breach. We have notified the French data protection authority regarding the data breach and are working with other data protection authorities across the world. Our Customer Support team is working 24/7 to answer your questions.
We are doing everything we can to proactively deal with this critical situation and prevent anything similar in the future. We wish we could turn back the hands of time and make this problem disappear. Unfortunately we cannot, so we are focused on today and the future. Please be sure we are more focused than ever on security in every part of our customer experience.
What you can do
We recommend you exercise caution -- always be mindful of phishing attempts by malicious scammers. Ledger will never ask you for the 24 words of your recovery phrase, not even in Ledger Live. Ledger will never contact you via text messages or phone call.
Furthermore, while we do all we can, we suggest you visit the security section of Ledger Academy to educate yourself on general security principles and more precisely our article about phishing attacks. Also, familiarize yourself with the anatomy of these ongoing phishing campaigns and report any phishing you experience on this dedicated page.
If you want to know if your information may have been exposed previously head to
https://haveibeenpwned.com/ We have taken immediate action to resolve the damage, and are diligently working to protect all customer information. We are extremely regretful that this incident impacts our customers and recognize it will take time to restore your confidence. We will do everything in our power to show you that this has made Ledger better, stronger, and more secure.
Sincerely,
Pascal Gauthier
CEO, Ledger
Quelle: http://links.ledger.com/e/evib?_t=62c6a4ea5484430dbb7571e36c7bde50&_m=3ad177eb543b42deb39ba0845b3a54c9&_e=sYFz7veVqFzWbitbOv2OG4kH001v7425luLYrBGvRlYA6uEI_l7t-5f1afo-yKSdYzOfpWLTAhlJh1u15pMKCLoX6Dl8HtOCWpmNbso5DHo%3DJe nachdem, wie sehr man jetzt von diesem Leak betroffen ist, wird man dann noch weiter informiert.
Zum Glück habe ich damals bestimmte Vorkehrungen getroffen und deshalb ist bei mir nur eine unbedeutende Mail davon betroffen.