Author

Topic: Watch out for Fake Trezor Suite! (Read 253 times)

legendary
Activity: 2730
Merit: 7065
April 05, 2022, 08:03:08 AM
#20
More common things in these attacks are they are performing slowly to tackle the situation as in this case they have known this one on 26th March that some bad actor was gaining access to the software they should have taken instant actions to detect the fraud sending notice to all their clients to be safe and issue warning.
One thing is sure. If that breach happened on 26 March, MailChimp has not mentioned it publicly on their Twitter feed. But to be fair, we don't know what has been communicated to their clients. Their clients are Trezor and over 300 other companies. Trezor has already stated that MailChimp admitted there was a breach and an inside job. Therefore, they have revealed the problem to the affected companies, but not to the general public.
legendary
Activity: 1960
Merit: 2124
April 05, 2022, 06:14:16 AM
#19

This seems to bear a lot of resemblance to the HubSpot hack I posted about a couple of weeks ago here: Another day, another data leak - more phishing likely

Access gained through an employee's account, gaining access to a large number of corporate accounts, focusing on crypto related businesses and clients, mass phishing emails rapidly following the breach. I wonder if the two are related through more than just timing?

Regardless, it gives a clear picture of what centralized services are doing with your data - handing it off to a bunch of third parties and doing no due diligence whatsoever in to those third parties' security. You can expect this kind of behavior from sketchy entities like BlockFi, but you expect better from hardware wallet manufacturers.
Yes i was also astonished to see that another employee id was used in hacking the data of the customers and this time the target is big corporates who must be having million of users but the fact is they won't disclose it easily to the public in order to maintain their reputation in the market and profitability could be affected.

There was past vulnerability in Trezor wallet through which one youtuber was able to hack it and get $2 million also which i remembered and he said the PIN and key were copied and moved to RAM which he used as hacking techniques.But after it was viped out.

These companies depending on the third party softwares are already going into full risk of data breach anytime the company is hacked like this one or employee selling the information to some hackers for money.Using these services always have a risk and the main problem is people's fund are at stake.

More common things in these attacks are they are performing slowly to tackle the situation as in this case they have known this one on 26th March that some bad actor was gaining access to the software they should have taken instant actions to detect the fraud sending notice to all their clients to be safe and issue warning.Recently Ronin network was hacked for $625 million and they were unaware about it for 5 days until one person tries to withdraw 5k ETH so what security levels they all are having? Seriously these phising attacks are increasing like the first one for Ledger and now Trezor.


Let’s see if there are reports on the keylogger (and RAT) are confirmed, which would make it quite a sophisticated phishing+malware combo attack. I’d have expected BleepingComputer to have detected it by now, as they are normally quite thorough in their tests.
This attack was more of well executed phising attack as they got access to the API and then mailing list directly without accessing the MailChimps customer portal.

Meantime, we’ve got some alleged cases of victims. This one claims having lost 55K quids to the phishing:
There will be many more with such amounts and this hack might be big until we have the real amounts disclosed but don't think it will be public.Have also seen many people on twitter complaining about the Trezor hack so don't know how many have lost funds.

I wish there was a perfect way to make everyone understand seed phrases should be taken care of as much as you would take care of a credit card.  You do not give the credentials to a stranger who is asking you for it.  You do not put these things into a random website or software.  This should be the FIRST thing a Cryptocurrency newbie has to learn and be continuously reminded of.
Self awareness is necessary to be safe from these scams and you need to be educated and technically updated also.Like you said about credit cards then people know that they don't need to share their PIN or CCV number on the back with anyone but have seen many people still falling for fake calls asking for details as your bank account is linked to mobile.Or they fill out it on some fake websites which is why they loose funds.Same is the need here with your seeds but it should have proper back-up offline without sharing it with anyone.Your cards lost can be blocked and issued new one's but there's no such thing with seeds so be sure not to loose them.

This is the worst part of these recent scams.  I mean even the YouTube and Twitter ones.  You do not even have to steal money from someone by yourself.  The victims are literally giving them access to their own coins or are sending the coins by themselves, using their own hands.  Only thing that is able to fix this problem is education and some minimum level of paranoia we all should have.  You just NEVER give your seed up to a software, you NEVER type your Hardware Wallet seed through anything except the Hardware Wallet itself.  Be cautious, for God sake!

-
Regards,
PrivacyG
Actually i would say that hackers are trying new methods in these types of hacks that most newbies and even old users have no idea about the hacks like in this one.They have also the phishing warning on the top of page to make it look legit :



But there were many fake things like domain name, signing not with Satoshi labs and enter your seeds and then they must have used keylogger as discussed above to do this scam.So you see how well they are managing these scams to make you fool.But it must be kept in mind that you don't need to give your seeds or fill out them anywhere until you investigate the matter in detail.The hackers take one step but the main security is compromised on our end by giving them access to wallets or seeds.This needs to be spread awareness among mass to tackle these scams.
hero member
Activity: 882
Merit: 1873
Crypto Swap Exchange
April 04, 2022, 02:54:27 PM
#18
I wish there was a perfect way to make everyone understand seed phrases should be taken care of as much as you would take care of a credit card.  You do not give the credentials to a stranger who is asking you for it.  You do not put these things into a random website or software.  This should be the FIRST thing a Cryptocurrency newbie has to learn and be continuously reminded of.

This is the worst part of these recent scams.  I mean even the YouTube and Twitter ones.  You do not even have to steal money from someone by yourself.  The victims are literally giving them access to their own coins or are sending the coins by themselves, using their own hands.  Only thing that is able to fix this problem is education and some minimum level of paranoia we all should have.  You just NEVER give your seed up to a software, you NEVER type your Hardware Wallet seed through anything except the Hardware Wallet itself.  Be cautious, for God sake!

-
Regards,
PrivacyG
legendary
Activity: 2338
Merit: 10802
There are lies, damned lies and statistics. MTwain
April 04, 2022, 01:25:48 PM
#17
<…>
Let’s see if there are reports on the keylogger (and RAT) are confirmed, which would make it quite a sophisticated phishing+malware combo attack. I’d have expected BleepingComputer to have detected it by now, as they are normally quite thorough in their tests.

Meantime, we’ve got some alleged cases of victims. This one claims having lost 55K quids to the phishing:
https://www.reddit.com/r/Bitcoin/comments/tvhu4n/i_fell_victim_to_the_trezor_phishing_scam/

Note: Ledger -> Trezor
legendary
Activity: 2730
Merit: 7065
April 04, 2022, 12:59:50 PM
#16
Besides what we already know about the email being sent to Ledger Newsletter recipients...
When I say hack you say Ledger. HACK - LEDGER, HACK - LEDGER. Sorry, I had to do it. However, this time Trezor users got affected, not Ledger (yet).

No lateral additional malware has yet been reported as a side-effect of installing the fake app (i.e. keylogger).
Judging by this reddit post, there are reports of a Snake keylogger being part of the package. I assume the AVs are still not picking it up, and time is needed before it gets recognized and flagged as malware. 

I like Passport hardware wallet more and more every day!
First they are still using open source code that coldcard ditched for common clause, and they are improving their air-gapped device all the time.
I think they are doing it the right way, using everything that is good from other HW manufacturers and improving what's not good.
Unfortunately, none of that matters if customer data can be obtained from a server somewhere, and it can. We have now witnessed how both open-source and closed-source hardware wallets were owned. The positive thing is that Passport claims they use in-house servers for customer data. However, that's still a centralized attack vector that could be abused.
legendary
Activity: 2268
Merit: 18711
April 04, 2022, 11:53:33 AM
#15
-snip-
This seems to bear a lot of resemblance to the HubSpot hack I posted about a couple of weeks ago here: Another day, another data leak - more phishing likely

Access gained through an employee's account, gaining access to a large number of corporate accounts, focusing on crypto related businesses and clients, mass phishing emails rapidly following the breach. I wonder if the two are related through more than just timing?

Regardless, it gives a clear picture of what centralized services are doing with your data - handing it off to a bunch of third parties and doing no due diligence whatsoever in to those third parties' security. You can expect this kind of behavior from sketchy entities like BlockFi, but you expect better from hardware wallet manufacturers.
legendary
Activity: 2338
Merit: 10802
There are lies, damned lies and statistics. MTwain
April 04, 2022, 11:46:49 AM
#14
According to claims made by TechCrunch, MailChimp’s Chief Information Security Officer has stated that:

-   MailChimp was aware of the intrusion since March 26th.

-   Hackers social engineered their way to gaining access to the system through employees credentials.

-   Hackers gained access to roughly 300 MailChimp accounts (i.e. corporate customers, being Trezor just one …).

-   Hackers targeted crypto and financial entities.

-   Hackers downloaded data, but worse still, gained access to APIs, potentially enabling hackers to impersonate the sender from their own account on the platform (now disabled).


The above is derived from what is published in the first link below. The second link specifies in addition that:

-   The total number of accessed Mailchimp accounts is specifically 319, but data was exported from only a subset of 102.


As a result, if the above is so, there are at least 102 corporations that need to comunicate with their lead/prospect/customer ...

See:
https://techcrunch.com/2022/04/04/mailchimp-internal-tool-breach/
https://therecord.media/hacker-accessed-319-crypto-and-finance-related-mailchimp-accounts-company-said/

<…>
It does indeed, and the timing seems too close for it to be a coincidence. Likely, these hackers know how to weave their way into corporations through social engineering, and the jackpot is bigger if they get away with multiple accounts (corporations) by just opening one door.
legendary
Activity: 2212
Merit: 7064
April 04, 2022, 05:41:43 AM
#13
One important additional thing to be wary of here, as noted on this thread, is the fact that Trezor claims that MailChimp’s service was compromised, deliberately targeting crypto companies. That means that targeting Trezor customers are just one of the potential attack sets, but other crypto company customers could just as well be targeted with a custom email in the coming days.
I don't know any other crypto companies that work with Mailchimp but I am sure there are more of them going to be exposed in next few days, biggest concern is with exchanges and hardware wallets.
Best solution I found is by using alias email addresses or some email relays, that keeps everything separated and I can always terminate any address that gets exposed.

It's always good to know that in the mist of hardware wallet providers we can find some[1] that decide to take a different route regarding outsourcing these kind of works:
I like Passport hardware wallet more and more every day!
First they are still using open source code that coldcard ditched for common clause, and they are improving their air-gapped device all the time.
I think they are doing it the right way, using everything that is good from other HW manufacturers and improving what's not good.

However, playing the devil's advocate role for a moment, self-hosted solutions still rely on the trust that the company puts on their employers - What protects companies from rogue employers attacks/leaks?
It's much less chance of rouge Passport worker exposing something, compared to big companies like Mailchimp that has that same rouge worker problem, and they are attacked all the time by hackers.
You don't have to count on any of them to protect your data, use alternative emails, fake names, PO Boxes, and other techniques to improve your privacy and security.
There are ways to better protect yourself if you want, and if you don't want.... well get ready for trouble in future.

- A file called  "Trezor-Suite-22.4.0-win-x64.exe" is downloaded. The file is signed by "Neodym Oy" instead of the usual "Satoshi Labs, s.r.o." signature.
Good catch!
I downloaded that file and virus total scanned it as clean, but I forgot to check signature... rookie mistake.
Note that I never wanted to install this crap, all I was doing was testing to see if this file was malware or not.


legendary
Activity: 1960
Merit: 2124
April 04, 2022, 05:23:42 AM
#12
Whether they outsource their marketing needs to some third party company or host the email servers themselves, there is always a centralized aspect of things and that can be attacked. There will always be people who operate and maintain these servers or do other work in their vicinity. The chances of someone turning bad are equally the same if they work for Trezor (in this case) or a third party who offers certain services. An angry or dissatisfied employee or more of them is all that is needed to cause havoc. We have seen it with Shopify and now with MailChimp.
Hosting the data to any third party is easily prone to hacks or we could say they often involve themselves into selling of this information so we can't trust these services but as you see in this case Trezor outsourced this service to MailChimp and they were targeted by insider crypto trading company.We have witnessing similar cases most often now a days where these centralised service providers will come with that their servers were hacked or employee id was compromised resulting in the data breaches.Like recently we have seen HubSpot phising attack resulting in customers getting similar mails.

But the point is the hackers can't even access your funds if you are aware and keen observer of these fake links like in this one dot after e and com which was the fake trezor suite.Moreover the original one won't ask for your keys but if you have downloaded the wrong one it's your mistake on your end as these third party or centralised services can't be fully trusted.

- A file called  "Trezor-Suite-22.4.0-win-x64.exe" is downloaded. The file is signed by "Neodym Oy" instead of the usual "Satoshi Labs, s.r.o." signature.
Yeah they have already spotted the difference by which this fake app attempted to scam the people as the legit one is linked to Satoshi labs as you can see in this image:



It's hard for people to spot the difference if they are unaware about these minor details and then proceed on to next step of entering your seed phrases which you are unintentionally giving to the hackers who will have access to your funds then.

The Trezor app is working with the cyber cell to investigate the matter and has said they are not communicating with any newsletter until the situation is cleared and don't respond to the any of them while they have brought down some of the scam domains:



Although the data is still not cleared and it might not be shown in exact numbers but still we can presume many have fall prey for this phising scam attempt and lost funds which can be taken as idea from this tweet:




People needs to bookmark the official pages and atleast once do proper investigation after they received certain mails before jumping into conclusions and downloading the malicious apps which are scam attempts to hack their seeds and funds.So those who have not download it be safe.

legendary
Activity: 2338
Merit: 10802
There are lies, damned lies and statistics. MTwain
April 04, 2022, 04:18:02 AM
#11
BleepingComputer has described the procure behind the phishing attempt. Besides what we already know about the email being sent to Ledger Trezor Newsletter recipients, when you proceed to download the app ("Get desktop app") from the link on the fake site one is directed to, the following happens:

- A file called  "Trezor-Suite-22.4.0-win-x64.exe" is downloaded. The file is signed by "Neodym Oy" instead of the usual "Satoshi Labs, s.r.o." signature.

- The file contains a modified Trezor Suite app, that semms to look identical to the original.

- And as expected, … as soon as you connect the Trezor device to the app, you’ll be asked to type-in your 12/24 word seed, sending the data over to the hackers.

No lateral additional malware has yet been reported as a side-effect of installing the fake app (i.e. keylogger).
legendary
Activity: 2730
Merit: 7065
April 04, 2022, 02:06:38 AM
#10
Considering that MailChimp already confirmed that this was an inside job[2], we just have to assume that every company is prone to suffer an attack like this in the long run. Will we ever have a 100 % fail proof system that will still be able to be self-hosted by the company but at the same time protected against inside jobs?
Whether they outsource their marketing needs to some third party company or host the email servers themselves, there is always a centralized aspect of things and that can be attacked. There will always be people who operate and maintain these servers or do other work in their vicinity. The chances of someone turning bad are equally the same if they work for Trezor (in this case) or a third party who offers certain services. An angry or dissatisfied employee or more of them is all that is needed to cause havoc. We have seen it with Shopify and now with MailChimp.
legendary
Activity: 1148
Merit: 3117
April 03, 2022, 05:45:19 PM
#9
It's always good to know that in the mist of hardware wallet providers we can find some[1] that decide to take a different route regarding outsourcing these kind of works:



However, playing the devil's advocate role for a moment, self-hosted solutions still rely on the trust that the company puts on their employers - What protects companies from rogue employers attacks/leaks? Considering that MailChimp already confirmed that this was an inside job[2], we just have to assume that every company is prone to suffer an attack like this in the long run. Will we ever have a 100 % fail proof system that will still be able to be self-hosted by the company but at the same time protected against inside jobs?

[1]https://nitter.net/zachherbert/status/1510634779976290315?cxt=HHwWlsCy3YSV7fYpAAAA
[2]https://nitter.net/Trezor/status/1510558771944333312
legendary
Activity: 2338
Merit: 10802
There are lies, damned lies and statistics. MTwain
April 03, 2022, 09:52:23 AM
#8
One important additional thing to be wary of here, as noted on this thread, is the fact that Trezor claims that MailChimp’s service was compromised, deliberately targeting crypto companies. That means that targeting Trezor customers are just one of the potential attack sets, but other crypto company customers could just as well be targeted with a custom email in the coming days.

Trezor customers are likely one of their highest rating potential targets. It will be important to see the modus operandi behind the downloadable app. I’ve read someone warn that it ends-up asking for the seed  (setting a new pin is a just part of the excuse to ge you there), but I’d like to see that confirmed from multiple sources before making the claim good. Additionally, we’d need to be sure that there are no lateral malware elements installed that go under the radar.

I’ve also seen a sparse reference pointing to the email grabbing IPs through an embedded image tacker.
member
Activity: 201
Merit: 31
KUWA.ai
April 03, 2022, 09:22:10 AM
#7
Same as usual, not just from Trezor only there are other mails from trust wallet, blockchain wallet, ledger and so on, I have used my email for many airdrops and form filling online I guess that's why these scammers are able to target my email address.
member
Activity: 185
Merit: 14
April 03, 2022, 05:59:34 AM
#6
Open your eyes scammers aren't playing around, they take their job way very serious its why it's painful to see people losing money to them, we need to be strict with any crypto-related decision making, think twice and do as twice investigations before making that decision.
staff
Activity: 3500
Merit: 6152
April 03, 2022, 05:18:41 AM
#5
-snip-
Quote
We are investigating a potential data breach of an opt-in newsletter hosted on MailChimp.

I could be wrong but I don't think it's the case. I started receiving this type of email from all kinds of services (Coinbase, Trustwallet, MetaMask, etc.) since Coinmarketcap's email addresses leak back in October[1] so it's possible that the scammers simply decided to target more wallet providers.

[1] https://www.coindesk.com/business/2021/10/25/over-3-million-coinmarketcap-email-addresses-leaked-to-dark-web/
legendary
Activity: 2212
Merit: 7064
April 03, 2022, 05:03:00 AM
#4
I got a couple of emails this morning as well from:
Welcome to the club Smiley
I don't know if some emails got leaked from Trezor or not, but I would never associate any normal email address with hardware wallet (better use temporary or dedicated address).
This is official tweet from Trezor, looks like it's possible that MailChimp got hacked and they are partners of Trezor used for newsletters.

This will protect you from such homograph attacks, but obviously does nothing to protect you from just visiting the wrong site. You should never be clicking on links from emails or using search engines to find import sites - bookmark the real site and only visit via the bookmark or manually entering the correct URL.
I have this punycode reveal enabled by default in my Librewolf browser (great firefox fork), but interesting thing I noticed is that I am now getting redirected to official Trezor website.
Maybe scammers are intentionally doing this or they are changing domain address to something new, because I saw a bunch of similar punycode domains selling cheap for €1 or even less!


https://be.godaddy.com/domainsearch/find?domainToCheck=suite.tr%E1%BA%B9zor.com



Latest update:

https://twitter.com/Trezor/status/1510558771944333312
legendary
Activity: 2268
Merit: 18711
April 03, 2022, 04:47:30 AM
#3
On Firefox, Tor, and other Firefox forks:

  • Open a new tab
  • Type "about:config" (without quotations) in to the address bar and hit enter
  • Accept the warning if you get one
  • Search for "network.IDN_show_punycode" (without quotations) and toggle it from false to true

This will protect you from such homograph attacks, but obviously does nothing to protect you from just visiting the wrong site. You should never be clicking on links from emails or using search engines to find import sites - bookmark the real site and only visit via the bookmark or manually entering the correct URL.
staff
Activity: 3500
Merit: 6152
April 03, 2022, 04:40:10 AM
#2
I got a couple of emails this morning as well from:

Code:
trezor.com
trezor.us

And of the email was redirecting me to:

Code:
https://alsyahd.com/trezor/

Only one of these domains is using Whois guard, but I'm guessing the credentials are fake.
legendary
Activity: 2212
Merit: 7064
April 03, 2022, 04:25:10 AM
#1
Today I noticed new fake website and phishing application for Trezor Suite with new domain registered few days ago using punycodes to look like real Trezor domain.
Website looks almost identical to original Trezor Suite website but if you look carefully you will notice letter is used instead of regular letter e.
They are using second domain for fake web wallet, and based on domain search I found out that IP address is coming from Russian Federation with IP address 95.142.46.115.
All domains are registered in 2022 and I even went so far that I downloaded their fake exe wallet file, and virustotal showed no malicious files, but I don't recommend anyone to download or install this.

Code:
https://suite.trẹzor.com
https://suite.xn--trzor-o51b.com/
https://web.trezorwallet.org

Archive:
https://archive.is/WW2C6
https://archive.ph/R0HaT




Code:
Domain Name: XN--TRZOR-O51B.COM
Registry Domain ID: 2684687829_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois-service.virtualcloud.co
Registrar URL: http://sav.com
Updated Date: 2022-03-27T11:09:32Z
Creation Date: 2022-03-27T11:09:17Z
Registry Expiry Date: 2023-03-27T11:09:17Z
Registrar: Sav.com, LLC

Code:
Domain Name: TREZORWALLET.ORG
Registry Domain ID: D402200000019431098-LROR
Registrar WHOIS Server: whois.ccdomain.co.kr
Registrar URL: www.cosmotown.com
Updated Date: 2022-03-27T07:06:10Z
Creation Date: 2022-03-27T07:03:32Z
Registry Expiry Date: 2023-03-27T07:03:32Z
Registrar Registration Expiration Date:
Registrar: Cosmotown, Inc

Quote
This website contacted 3 IPs in 2 countries across 3 domains to perform 25 HTTP transactions. The main IP is 95.142.46.115, located in Russian Federation and belongs to VDSINA-AS, RU
https://urlscan.io/result/ff765b01-3306-4c94-a76e-5254f43e4d1d/

File Trezor-Suite-22.4.0-win-x64.exe downloaded from fake wallet
https://www.virustotal.com/gui/file/bfb45d952f8849153e41475adaf57ac886ffd794991c1c39339ff97e5fd2129a

If you receive any email claiming that Trezor experienced some and that you are affected by the breach, know that this is a scam.
Here is one example of phishing email they are sending from [email protected] email via mailjet service:

Quote
Dear customer,
We regret to inform you that Trezor has experienced a security incident involving data belonging to 106,856 of our customers, and that the wallet associated with your e-mail address is within those affected by the breach.
Namely, on Saturday, April 2nd, 2022, our security team discovered that one of the Trezor Suite administrative servers had been accessed by an unauthorized malicious actor.
At this moment, it's technically impossible to accurately assess the scope of the data breach. Due to these circumstances, if you've recently accessed your wallet using Trezor Suite, we must assume that your cryptocurrency assets are at risk of being stolen.
In the spirit of transparency, we wanted to make our customers aware of this incident before malicious actors could utilize this information to their detriment. We felt time was of the essence, and we are expediently working through our investigation.
If you're receiving this e-mail, it's because you've been affected by the breach. In order to protect your assets, please download the latest version of Trezor Suite and follow the instructions to set up a new PIN for your wallet.
Sincerely,
Trezor


Always double check address bar in your browser, bookmark important websites you use, and NEVER enter your seed phrase words on any website.
Jump to: