{"id":7055,"date":"2021-06-17T11:53:06","date_gmt":"2021-06-17T15:53:06","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=7055"},"modified":"2021-08-03T10:52:07","modified_gmt":"2021-08-03T14:52:07","slug":"criminals-are-stealing-cryptocurrency-with-ledger-devices","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/criminals-are-stealing-cryptocurrency-with-ledger-devices\/","title":{"rendered":"Criminals Are Stealing Cryptocurrency With Ledger Devices"},"content":{"rendered":"\n<p>As Ledger has recently become a popular target for scammers, cyber attackers are now sending fake replacement devices to Ledger customers who were exposed to a recent data breach used to steal wallets for cryptocurrencies.<\/p>\n\n\n\n<p>After receiving a Ledger Nano X device in his email, a Ledger user shared a sneaky scam on Reddit that shows a device supplied in authentic-looking packaging with a poorly written letter explaining that the device was sent to replace the existing device after a data leak.<\/p>\n\n\n\n<p>Although the letter was filled with grammar and spelling errors, there was a slightly convincing explanation for sending the new device, as the data of 272,835 people who had purchased a Ledger device was already published in the RaidForums hacker forum in December 2020.<\/p>\n\n\n<p>For more information, read the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/cryptocurrency\/criminals-are-mailing-altered-ledger-devices-to-steal-cryptocurrency\/\" target=\"_blank\" rel=\"noopener\">original story<\/a> in Bleeping Computer.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber attackers are sending fake replacement devices to Ledger customers to steal wallets for cryptocurrencies.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-7055","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/7055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=7055"}],"version-history":[{"count":4,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/7055\/revisions"}],"predecessor-version":[{"id":7075,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/7055\/revisions\/7075"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=7055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=7055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=7055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}