Close Menu
Crypto Chain Post
    Trending

    WBTC Delisting Fight Ends: Bit Global Drops Case Against Coinbase

    June 7, 2025

    Huge Outflow on Blackrock’s IBIT Pulls Bitcoin ETFs Into Red Zone

    June 7, 2025

    NFT market makes a modest comeback as Bitcoin hits $105k level

    June 7, 2025

    SHIB Reaches New All-Time High in This Key Metric

    June 7, 2025

    Will It Recover After Significant Losses?

    June 7, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Saturday, June 7
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » Trezor Addresses the Concerns over Its X Account’s Security Breach
    Analysis

    Trezor Addresses the Concerns over Its X Account’s Security Breach

    News RoomBy News RoomMarch 22, 2024No Comments3 Mins Read

    Trezor, a famous hardware wallet developer who stores private keys, has recently experienced a breach into his X account. While addressing the respective issue, the company said that it took instant measures to secure the account without any compromise on the security of the products.

    🚨Update on our X account security incident🚨

    Earlier this week, we experienced a breach of our X account due to a sophisticated phishing attack.

    Immediate actions were taken to secure our account & no product security was compromised.

    For more,
    👉 https://t.co/ZZOHSNtI9u

    — Trezor (@Trezor) March 21, 2024

    Attacker Shares Malicious Posts on Trezor’s X Account after Breaching It

    The firm mentioned that the incident took place despite the 2-factor authentication as well as the resilient passwords. As per the company, a calculated and sophisticated phishing exploit led to the respective breach. It mentioned that the attacker was potentially working on the respective exploit for several weeks. Nonetheless, it clarified that none of the company’s products had any impact.

    In addition to this, it assured the consumers about the hardware wallets along with Trezor Suite. With the provision of the details with complete transparency, Trezor asserted its determination to maintain security. Additionally, it shared a preliminary report regarding the event. It added that the attacker made an array of deceptive posts. They included those requesting clients to transfer funds to an anonymous wallet address.

    Moreover, such posts also included malicious links to fake token presales. The company rapidly detected the respective posts and removed them. This development mitigated the impact of the respective incident in terms of the subsequent damage. The firm revealed that the attacker executed a well-planned action series. According to Trezor, the attacker utilized an X handle that had numerous followers.

    Therefore, the impersonator reached the PR team of the firm over X while asking for an interview with the CEO. The communication between both parties moved forward in several days. In the end, the impersonator shared a malicious link. The team member of the firm opened the link that redirected to a page asking for login credentials. This posed a red flag so the firm immediately ceased the meeting out of suspicion.

    The Company Rapidly Deletes the Malicious Posts and Starts Investigation into the Incident

    After that, the company rescheduled the meeting. This time, while referring to some pretended technical issues, the attacker asked to join the call. This also included a login prompt to link to the impersonator’s app. The team member entered the login credentials in the urgency. To deal with this situation, the firm initially deleted the unauthenticated posts. Furthermore, it also started a thorough security audit to discover the attacker’s approach.

    Read the full article here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related News

    Will It Recover After Significant Losses?

    June 7, 2025

    Shiba Inu Price Signals 28% Crash After Bearish Pattern Breaks

    June 7, 2025

    Solana Price Continues to Struggle Below $164 Whale Moves, What Next?

    June 7, 2025

    Can Bulls Sustain the Recovery Toward $3.40 Resistance?

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    Huge Outflow on Blackrock’s IBIT Pulls Bitcoin ETFs Into Red Zone

    June 7, 2025

    NFT market makes a modest comeback as Bitcoin hits $105k level

    June 7, 2025

    SHIB Reaches New All-Time High in This Key Metric

    June 7, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.