Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»EXCHANGE NEWS»Aftermath: How did The Ledger Hacker’s $484,000 heist happen?
EXCHANGE NEWS

Aftermath: How did The Ledger Hacker’s $484,000 heist happen?

By Crypto FlexsDecember 16, 20233 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Aftermath: How did The Ledger Hacker’s 4,000 heist happen?
Share
Facebook Twitter LinkedIn Pinterest Email

As reported yesterday. Hackers launched a sophisticated attack targeting users of popular Web3 apps such as Zapper, SushiSwap, and Phantom, stealing approximately $484,000 in cryptocurrency funds. The attack focused on Ledger’s Connect Kit, a code library that enables connections between cryptocurrency wallets and decentralized apps.


key point

  • Ledger’s Connect Kit was compromised in a malicious attack, resulting in the theft of approximately $484,000 in funds.
  • The attackers used a phishing attack to gain access to a former Ledger employee’s account and inject malicious code.
  • Malware was distributed when apps such as Zapper, SushiSwap, and Phantom were updated with compromised Connect Kit code.
  • The malware tricked users into authorizing transactions to the attacker’s address rather than the intended app.
  • Ledger has now disabled the malware and declared the Connect Kit safe to use again, but called for continued efforts in signing transactions.

Hackers were able to access a former Ledger employee’s account on the node package manager platform NPMJS through a phishing attack. From this vantage point, the attackers injected malicious code into GitHub’s Ledger Connect Kit update. When vulnerable apps were updated to a compromised Connect Kit version, malware was distributed to unwitting users’ browsers.

Today’s security incident appears to be the culmination of three separate failures at Ledger.

1. Blindly load code without locking in a specific version and checksum.
2. We do not enforce the “two-person rule” when it comes to code review and deployment.
3. We do not revoke access from former employees.

— Jameson Lopp (@lopp) December 14, 2023

The malware allowed the hackers to trick users into approving transactions that would send funds to the attacker’s wallet rather than the intended app.

According to blockchain security platform Cybers, the code likely manipulates transaction data to trick users into confirming payments they don’t fully understand. For example, a user who authorized a token payment to activate an app feature may instead see the payment as authorized to the hacker’s address.

The exact techniques used require further analysis, but it is clear that the attack relied on clever social engineering to induce user error. Ledger and security experts recommend constant caution when approving cryptocurrency transactions and carefully reviewing addresses and details, even when an app appears legitimate.

It seems that after absorbing nearly half a million exploits, the hackers decided to stop working for fear of growing interest. Ledger was able to disable the malware and has now declared the Connect Kit safe for use once again.

However, the fact that these attacks easily compromised the critical infrastructure of popular apps sends a sobering warning to the Web3 community.

As the industry continues to work diligently to increase security and transparency for transactions, remembering the human element will be key.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Race 2.0, Leios and Voltaire Live Voting

May 1, 2026

How to Connect OpenClaw with Binance for Live AI Trading (2026)

April 28, 2026

Ethereum price is struggling to gain pace and recovery remains fragile.

April 22, 2026
Add A Comment

Comments are closed.

Recent Posts

Minnesota bans AI apps that create fake nude images

May 2, 2026

A Year of Colocation with Beeks: Open Access to Low-Latency Transactions

May 1, 2026

Guardian Rewards – Vault12

May 1, 2026

Race 2.0, Leios and Voltaire Live Voting

May 1, 2026

SHRMiner Lights Up London’s Piccadilly Circus, Propelling AI Cloud Mining Into The Mainstream Spotlight

May 1, 2026

Rayls Launches Public Mainnet, Advancing Its Mission To Bring Global Finance Onchain

May 1, 2026

XRP to $10,000? Ripple CTO emeritus rejects bold claims.

May 1, 2026

How AI Is Transforming The Cryptocurrency Ecosystem

May 1, 2026

BitMart x $EAT Trade-to-Feed Competition Pays 4.4 Million USDT to Traders in May 2026

April 30, 2026

Crypto billionaire Justin Sun files suit against Trump-linked World Liberty Financial over ‘wrongly’ frozen tokens

April 30, 2026

VerifyVASP Acquires Sygna, Consolidating The Global Travel Rule Network

April 29, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Minnesota bans AI apps that create fake nude images

May 2, 2026

A Year of Colocation with Beeks: Open Access to Low-Latency Transactions

May 1, 2026

Guardian Rewards – Vault12

May 1, 2026
Most Popular

Cryptocurrency Weekly Update #29 – Ciphertrace

November 25, 2023

Nigerian startup Zone raises $8.5 million in seed funding round

March 20, 2024

The US president’s dinner dinner for the Trump Memoe Holder causes a 52%increase in prices.

April 24, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.