Monero Observer – Trezor users exposed to unicode domain phishing attack

Monero Observer – Trezor users exposed to unicode domain phishing attack

Monero
November 18, 2022 by keithhill530
106
[ad_1] 3 Apr 2022 | Updated 4 Apr 2022 [security] [wallets] Trezor users have been exposed to an unicode domain phishing attack: A scam email warning of a data breach is circulating. Do not open any email originating from noreply@trezor.us, it is a phishing domain. The email has a clear subject line (Your Trezor Suite
trezor-phishing-email.png

[ad_1]

3 Apr 2022 | Updated 4 Apr 2022

[security]

[wallets]

Trezor users have been exposed to an unicode domain phishing attack:

A scam email warning of a data breach is circulating. Do not open any email originating from noreply@trezor.us, it is a phishing domain.

The email has a clear subject line (Your Trezor Suite might be compromised) and attempts to direct users to fake domains (suite.trẹzor.com/suite.xn--trzor-o51b.com/trezor.us) in order to download a bogus software update and steal their private seeds.

It appears that Trezor has been using a third party service (MailChimp) for their opt-in newsletter, which lead to this situation:

We are investigating a potential data breach of an opt-in newsletter hosted on MailChimp.

MailChimp have confirmed that their service has been compromised by an insider targeting crypto companies.

Sethforprivacy has admitted falling for this type of attack for the first time ever:

Tonight I fell for a phishing email for the first time ever.

I wasn’t affected at all, but I did raise an embarrassing false alarm on Twitter and apologize for that.

Thankful for all those that corrected me and pointed out it was a phishing email.

A lot of Trezor users that have received the scam email are insisting that they have not opted into any newsletter, including Seth:

Leaked from MailChimp, apparently, though I didn’t sign up for any newsletters [..]

Users that did not click the link in the email, download the bogus update or share the private seed were not affected.

It might be pragmatic to assume that all Trezor email addresses are already circulating in an email list somewhere, and thus compromised/a target for future attacks.

This is not the first time Trezor disappoints its users this year. Read my previous reports to learn more about the AOPP fiasco.


[ad_2]

Source link

Add a comment

You have not selected any currencies to display