company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Hardware Wallet

Crypto

loading..
loading..
loading..

66,000 Customers Exposed: Trezor Support Site Faces Data Breach

Discover the impact of Trezor's massive data breach—personal data exposed for 66,000 customers. Learn about the security measures in place

22-Jan-2024
3 min read

Trezor, a prominent hardware cryptocurrency wallet vendor, in a recent security alert disclosed a data breach originating from unauthorized access to their third-party support ticketing portal on January 17. While assuring users that their digital assets remain secure, Trezor acknowledged that a subset of 66,000 users who interacted with Trezor Support since December 2021 may have had their names, usernames, and email addresses exposed.

Breach Details

The compromised data includes potentially sensitive information, such as postal addresses and phone numbers, although Trezor asserts these were likely unaffected. Nevertheless, the company confirmed 41 cases where attackers exploited exposed data. These malicious actors targeted users with a sophisticated phishing approach, attempting to trick them into revealing their recovery seeds – the critical 24-word phrases securing cryptocurrency wallets.

Phishing Tactics

Attackers employed a deceptive strategy, sending seemingly automated support reply emails to Trezor users. These messages requested users to disclose their 24-word seed phrase under the guise of firmware validation. The phishing attempts assured users that this information would not be accessible by humans. Succumbing to such requests could enable attackers to restore victims' wallets on any DIP39-compatible hardware wallet device, leading to irreversible cryptocurrency theft.

Response and Mitigation

Trezor promptly responded to the breach, terminating unauthorized access to its support system on January 17 at 20:20 CET. The company undertook extensive efforts to notify all potentially affected users, cautioning them against phishing attacks aiming to obtain recovery seeds. While Trezor reported no instances of successful attacks, it remains crucial for users, especially those who contacted support after December 2021, to remain vigilant against potential phishing and scamming attempts.

User Vigilance

The company emphasized the importance of safeguarding seed phrases, reminding users that wallet providers would never request such sensitive data for operational or support-related reasons. Trezor users are urged to exercise extreme caution and never disclose their seed phrases. This confidential information must remain exclusively with the user to ensure the security of their cryptocurrency holdings.

Technical Implications

Examining the technical aspects, the attackers' exploitation of exposed data highlights the sophistication of modern phishing tactics. The seemingly legitimate automated support replies showcases the need for enhanced email security measures. Trezor's mention of firmware validation adds a layer of complexity, potentially misleading users into divulging critical information.

Code-based Security Measures

To strengthen security, hardware wallet providers like Trezor should consider implementing robust code-based security measures. This involves stringent validation of firmware requests and ensuring that sensitive operations, such as seed phrase verification, require multi-factor authentication or physical confirmation on the device itself.

def validate_firmware_request(request):
	# Code to validate the authenticity of firmware requests
	if request.source == "legitimate_source" and request.timestamp < current_time:
    	return True
	return False

This code snippet illustrates a simplified example of firmware request validation. The actual implementation would involve more intricate checks and verifications.

Enhanced Email Security

Given the attackers' use of phishing emails mimicking automated support replies, strengthening email security is paramount. Implementing advanced email authentication protocols like DMARC (Domain-based Message Authentication, Reporting, and Conformance) can help verify the authenticity of emails sent on behalf of the company.

# DMARC Policy Example
_dmarc_policy = "v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@example.com; ruf=mailto:dmarc-forensics@example.com"

This snippet represents a DMARC policy, specifying that emails failing authentication should be quarantined and reports sent to designated addresses.