...
I don't want to justify anything but it's mainly the users who are to blame for their losses. They installed a software on their computer from which they do their crypto stuff and wallet handling that they didn't verify to be legit via the original Ledger website. (Yes, I'm aware that Ledger doesn't make it very easy to check their own software via crypto hashes or signatures; another reason to avoid Ledger crap.)
How does that work? Someone installs malware, enters their PIN on the Ledger, doesn't verify the address on the Ledger, and clicks send? If that's the case, why did they bother buying a hardware wallet?
It could be that the victims didn't pay attention to check the transaction details before they confirmed to sign the transaction with their Ledger hardware wallet, i.e. the malware presented a forged transaction to be signed by the hardware wallet. But this is easy to spot if you follow basic best practices.
Or is it much more advanced, like this: The user installs malware, enters their PIN on the Ledger, (fake) Ledger Live extracts the seed phrase and sends it to the attacker? I guess this scenario didn't happen yet, but that's just a matter of time now.
Not likely in my opinion, but of course I don't know what kind of flaws already exist in Ledger's firmware that has the recovery feature already in it. (After reading the technical white paper from Ledger about the recovery service it seems to me that it's not going to be easy to exploit it, but white paper and actual implementation don't need necessarily to match; complex software tends to be buggy, closed-source doesn't make it better.)
My guess is that the fake Ledger Live Web3 shit tricked the users to enter their wallet's recovery words into the malware itself, pretending some "good" reason why this might be necessary. Maybe 1 year free Ledger recovery service, lol.
The stealing transactions could be suspicious to users as they usually don't have any change address in the transaction's outputs. Newbies might not be aware of it, but if I were the malicious actor I wouldn't count on that.
Some blame goes to Micro$oft who allowed such a malware in their security section of the app store without verifying that it actually comes from Ledger, Paris.
But frankly I see the majority of blame on the users themselves: never install and use unverified software on your crypto handling devices! Always check transaction details to be signed solely on the display of your hardware wallet! Never enter your mnemonic recovery words on an online computer or website!