Trezor Reveals Phishing Attack Impacting 66,000 Users

Trezor, the well-known hardware wallet, recently revealed a security breach that potentially impacted nearly 66,000 users, as stated in a January 20 announcement.

Trezor Reveals Phishing Attack Impacting 66,000 Users

The breach involved unauthorized access to a third-party support portal on January 17. Trezor disclosed that individuals who had interacted with its support team since December 2021 might have had their data compromised.

"While unconfirmed, we believe it's our duty to inform our affected users about the potential exposure of their contact details and the risk of a phishing attack," Trezor noted. The company took immediate action by emailing all 66,000 contacts to notify them of the incident.

In the aftermath of the breach, at least 41 users received direct email messages from the attacker, soliciting sensitive information regarding their recovery seeds. Additionally, eight individuals who registered on the trial discussion platform of the same third-party vendor had their contact details compromised.

Phishing, a prevalent form of cybercrime, involves attackers posing as a trustworthy entity to extract sensitive information from individuals. This technique is often employed to pilfer critical data like login credentials, credit card numbers, or other personal information.

Trezor reassured users that no recovery seed phrases were disclosed due to the incident. The company also claimed to have promptly alerted users who received emails within an hour of the breach.

Renowned for manufacturing cryptocurrency hardware wallets that offer secure cold storage for digital assets, Trezor has encountered security challenges in the past. In March, it warned users about a phishing attack designed to trick investors into divulging their wallet's recovery phrase on a fraudulent Trezor website. In another incident, scammers selling counterfeit Trezor hardware gained control over users' private keys. The recent breach underscores the ongoing need for vigilance in the realm of cryptocurrency security.

ebba has received a new initiative for her security team to perform an in-house penetration test. what is the first step that ebba should undertake?

what are documents that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?

lykke's supervisor is evaluating whether to use internal security employees to conduct a penetration test. lykke does not consider this a good idea and has created a memo with several reasons they should not be used. which of the following would not be part of that memo?

linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. which team does she want to be placed on?

is crypto a security

phishing in cyber security

tuva's supervisor wants to share a recent audit outside the organization. tuva warns him that this type of audit can only be read by those within the organization. what audit does tuva's supervisor want to distribute?

what is a variation of a common social engineering attack targeting a specific user?

which threat actors violate computer security for personal gain?

you click on the browser bookmark for the webmail site that lets you access your work email account. after two failed login attempts, you verify your password in your password manager and make another attempt. again, the website returns an error that your login information is incorrect. of the three options below, which one is the most likely explanation?

whaling in cyber security

which of the following is not a general information source that can provide valuable in-depth information on cybersecurity?

4 Comments

  1. A digital masterpiece where every detail is in tune, providing a delightful online experience.

    ReplyDelete
  2. The curated collections make it easy to explore specific themes. Saves time on searching.

    ReplyDelete
  3. You've made a complex topic easy to understand. Impressive!

    ReplyDelete
Previous Post Next Post