Ledger says attacker conducted phishing attack on former employee
The Ledger attacker was able to upload the malicious code to ConnectKit after phishing a former Ledger employee
Quinten Jacobs/Shutterstock modified by Blockworks
Today’s attack on crypto hardware firm Ledger was traced to an ex-employee who “fell victim to a phishing attack that gained access to their NPMJS account” in an email to Blockworks.
The code was then published to ConnectKit. A fix, according to Ledger, was deployed roughly 40 minutes after they were alerted but not before the malicious code was active for five hours.
The address was connected to a malicious code found in Ledger’s ConnectKit software libraries early Thursday. ConnectKit connects blockchain apps with Ledger devices.
WalletConnect was able to disable the “rogue project.” Chainalysis posted the address and Tether CEO Paolo Ardoino said his team froze the Ledger exploiter address.
Ledger told Blockworks that it is working with customers impacted by the attack as well as law enforcement to track the attacker.
The attack led to SushiSwap and Revoke.cash taking their front-end web apps offline. As Blockworks previously reported, Revoke.cash was impacted by the attack. SushiSwap warned users to avoid interacting with the Sushi page.
Ledger, following the warnings across social media, previously updated that it was able to replace the malicious file with the genuine one.
“In the meantime, we’d like to remind the community to always Clear Sign your transactions — remember that the addresses and the information presented on your Ledger screen is the only genuine information,” Ledger continued.
The hardware firm added that users should stop the transaction “immediately” if there’s a difference between the Ledger device screen and the screen on a computer or phone.
Don’t miss the next big story – join our free daily newsletter.