🔎 RESEARCH: Attackers are shipping fake hardware wallets with tampered components and pre-set recovery phrases to steal funds. Kaspersky documented similar cases involving counterfeit Trezor devices designed to leak seed phrases after setup. The device itself becomes the attack. Avoid wallets with pre-generated seeds, altered packaging, or unusual setup flows. Always buy directly from manufacturers or authorized sellers, generate your own recovery phrase, and never use one provided to you.
3h ago•
bullish:
0
bearish:
0
Share

🔎 RESEARCH: Attackers are shipping fake hardware wallets with tampered components and pre-set recovery phrases to steal funds. Kaspersky documented similar cases involving counterfeit Trezor devices designed to leak seed phrases after setup.
— Cointelegraph (@Cointelegraph) Apr 7, 2026
The device itself becomes the attack.
Avoid wallets with pre-generated seeds, altered packaging, or unusual setup flows. Always buy directly from manufacturers or authorized sellers, generate your own recovery phrase, and never use one provided to you.
3h ago•
bullish:
0
bearish:
0
Share
Securely connect the portfolio you’re using to start.
