Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
  • CASINO
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
  • CASINO
Crypto Flexs
Home»EXCHANGE NEWS»Aftermath: How did The Ledger Hacker’s $484,000 heist happen?
EXCHANGE NEWS

Aftermath: How did The Ledger Hacker’s $484,000 heist happen?

By Crypto FlexsDecember 16, 20233 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Aftermath: How did The Ledger Hacker’s 4,000 heist happen?
Share
Facebook Twitter LinkedIn Pinterest Email

As reported yesterday. Hackers launched a sophisticated attack targeting users of popular Web3 apps such as Zapper, SushiSwap, and Phantom, stealing approximately $484,000 in cryptocurrency funds. The attack focused on Ledger’s Connect Kit, a code library that enables connections between cryptocurrency wallets and decentralized apps.


key point

  • Ledger’s Connect Kit was compromised in a malicious attack, resulting in the theft of approximately $484,000 in funds.
  • The attackers used a phishing attack to gain access to a former Ledger employee’s account and inject malicious code.
  • Malware was distributed when apps such as Zapper, SushiSwap, and Phantom were updated with compromised Connect Kit code.
  • The malware tricked users into authorizing transactions to the attacker’s address rather than the intended app.
  • Ledger has now disabled the malware and declared the Connect Kit safe to use again, but called for continued efforts in signing transactions.

Hackers were able to access a former Ledger employee’s account on the node package manager platform NPMJS through a phishing attack. From this vantage point, the attackers injected malicious code into GitHub’s Ledger Connect Kit update. When vulnerable apps were updated to a compromised Connect Kit version, malware was distributed to unwitting users’ browsers.

Today’s security incident appears to be the culmination of three separate failures at Ledger.

1. Blindly load code without locking in a specific version and checksum.
2. We do not enforce the “two-person rule” when it comes to code review and deployment.
3. We do not revoke access from former employees.

— Jameson Lopp (@lopp) December 14, 2023

The malware allowed the hackers to trick users into approving transactions that would send funds to the attacker’s wallet rather than the intended app.

According to blockchain security platform Cybers, the code likely manipulates transaction data to trick users into confirming payments they don’t fully understand. For example, a user who authorized a token payment to activate an app feature may instead see the payment as authorized to the hacker’s address.

The exact techniques used require further analysis, but it is clear that the attack relied on clever social engineering to induce user error. Ledger and security experts recommend constant caution when approving cryptocurrency transactions and carefully reviewing addresses and details, even when an app appears legitimate.

It seems that after absorbing nearly half a million exploits, the hackers decided to stop working for fear of growing interest. Ledger was able to disable the malware and has now declared the Connect Kit safe for use once again.

However, the fact that these attacks easily compromised the critical infrastructure of popular apps sends a sobering warning to the Web3 community.

As the industry continues to work diligently to increase security and transparency for transactions, remembering the human element will be key.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Are Monero in danger? Five orphan blocks were found during the Cubic Mining War.

August 7, 2025

Mara raises hashrates, reaches 50K Bitcoin, and plans to expand

August 4, 2025

Best visa stable coin encryption card

August 1, 2025
Add A Comment

Comments are closed.

Recent Posts

The New Bybit Web3 Is Here–Fueling On-Chain Thrills With $200,000 Up For Grabs

August 8, 2025

Stella (XLM) Eye 35% Rally and Ripple and SEC END 5 years legal battle

August 8, 2025

Builders Are Proving What’s Possible With CARV’s AI Stack

August 8, 2025

Caldera Announces Partnership With EigenCloud To Integrate EigenDA V2

August 7, 2025

Are Monero in danger? Five orphan blocks were found during the Cubic Mining War.

August 7, 2025

One Card To Seamlessly Bridge Web3 Assets And Real-World Spending

August 7, 2025

Coinbase’s USDC fee, encryption or other banks?

August 7, 2025

Protocol Update 001 -scale L1

August 7, 2025

As you challenge the mixed technology signal, OnDo Price Hovers challenges the August Bullish predictions.

August 7, 2025

XRP struggles for $ 3: Do Whale Offroads attract it lower?

August 7, 2025

Bybit’s Ben Zhou Charts Bold New Course To Rewrite Crypto Success At Mid-Year Keynote

August 6, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

The New Bybit Web3 Is Here–Fueling On-Chain Thrills With $200,000 Up For Grabs

August 8, 2025

Stella (XLM) Eye 35% Rally and Ripple and SEC END 5 years legal battle

August 8, 2025

Builders Are Proving What’s Possible With CARV’s AI Stack

August 8, 2025
Most Popular

FixFloat denies any insider role in the $26 million hack and vows to pay out pending orders.

February 19, 2024

Crypto analyst says Ethereum rivals will rip prices higher and predicts outlook for Dogecoin and ETH rivals.

May 16, 2024

Chainlink takes on Dogecoin on key indicators as mysterious whale pushes LINK upwards.

February 12, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.