Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Counterfeit Ledger Wallets in China Pose Crypto Security Threat

Counterfeit Ledger Wallets in China Pose Crypto Security Threat

Posted on April 17, 2026 By CWS

A recent discovery by a Brazilian cybersecurity expert has uncovered a widespread supply chain scam involving fake Ledger Nano S Plus hardware wallets. These counterfeit devices, available on Chinese marketplaces, have been designed to covertly siphon cryptocurrency from about 20 different blockchains.

Details of the Sophisticated Scam

The findings, shared on Reddit by user u/Past_Computer2901, have shocked the crypto security industry, revealing a meticulously orchestrated scheme. This operation merges tampered hardware, compromised software, and cross-platform malware into a single phishing strategy.

The researcher purchased the counterfeit wallet at a price similar to the official Ledger store, with packaging and product descriptions appearing genuine. Alarm bells rang when the device failed Ledger’s Genuine Check after being connected to a legitimate Ledger Live installation, leading to a complete physical disassembly.

Inside the Counterfeit Device

Upon inspection, the deception was evident. The original secure element chip had been swapped with an ESP32-S3 microcontroller from Espressif Systems, a component unsuitable for hardware security purposes. Furthermore, the chip markings were erased to prevent identification, and the device included a WiFi/Bluetooth antenna not found in authentic Ledger units.

During boot, the device initially mimicked a genuine Ledger product but later revealed its true identity as an Espressif Systems chip. A full firmware dump showed that every entered PIN and generated seed phrase was stored in plaintext and sent to attacker-controlled servers.

Wider Implications and Protective Measures

The fraudulent firmware was labeled as “Nano S+ V2.1,” a non-existent version in Ledger’s official firmware, misleading users to believe in its legitimacy. The operation targeted wallets across various blockchain networks simultaneously, utilizing a QR code to direct users to a phishing site for a trojanized Ledger Live app.

This fake app, equipped with a hardcoded success in its Genuine Check, tricked new crypto users into thinking their device was secure. The app also extracted wallet data without user knowledge. The threat extended to malware deployment across Android, Windows, macOS, and iOS, with the iOS variant bypassing App Store reviews via Apple’s TestFlight program.

To safeguard against such scams, users are advised to purchase from Ledger’s official website or verified resellers, and download Ledger Live exclusively from ledger.com. Running the Genuine Check upon first use and reporting any suspicious devices are crucial steps.

This incident stands as one of the most intricate hardware wallet supply chain attacks recorded, with financial damages from the fraudulent app alone exceeding $9.5 million from over 50 victims.

Stay informed by following us on Google News, LinkedIn, and X for daily cybersecurity updates. Share your stories with us for broader visibility.

Cyber Security News Tags:Blockchain, counterfeit products, crypto security, Cryptocurrency, Cybersecurity, hardware wallets, Ledger, Malware, Phishing, supply chain attack

Post navigation

Previous Post: Email Worms Target Industrial Control Systems Globally
Next Post: Mirai Malware Exploits Vulnerable TP-Link Routers

Related Posts

CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits CISA releases New ICS Advisories Surrounding Vulnerabilities and Exploits Cyber Security News
CISA Alerts to DarkSword Apple Vulnerabilities CISA Alerts to DarkSword Apple Vulnerabilities Cyber Security News
Critical Flaws Found in Major Cloud Password Managers Critical Flaws Found in Major Cloud Password Managers Cyber Security News
Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider Cyber Security News
GitGuardian Secures M to Enhance AI and Security Solutions GitGuardian Secures $50M to Enhance AI and Security Solutions Cyber Security News
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • White House to Discuss AI Advancements with Anthropic CEO
  • Anthropic Launches Claude Opus 4.7 with Enhanced Security Features
  • Mirai Malware Exploits Vulnerable TP-Link Routers
  • Counterfeit Ledger Wallets in China Pose Crypto Security Threat
  • Email Worms Target Industrial Control Systems Globally

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • White House to Discuss AI Advancements with Anthropic CEO
  • Anthropic Launches Claude Opus 4.7 with Enhanced Security Features
  • Mirai Malware Exploits Vulnerable TP-Link Routers
  • Counterfeit Ledger Wallets in China Pose Crypto Security Threat
  • Email Worms Target Industrial Control Systems Globally

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark