Skip to content
CLASSIFICATION · CONFIRMED CRIMINAL OPERATION · CRITICAL RISK

Anatomy of a $9.5M Hardware Wallet Scam.

A counterfeit Ledger Nano S Plus. A trojanized mobile app. Three command-and-control servers. One chain of evidence assembled from a single device purchased on a Chinese marketplace.

Investigation
March 2026
Attributed origin
China · Shanghai shell entity
Scope analyzed
Hardware + Android APK
0
Stolen from victims
Public press reporting · Apr 2026
0
Confirmed victims
Public press reporting
0
Attack vectors
Hardware, Android, Windows, macOS, iOS
0
Blockchains targeted
BTC, ETH, SOL, XRP, TRON + 15 more

Authored by High Code Security Research · @vini_bit (founder) · @anarchyysm (co-founder)

§ 01 · The scam

The scam, in plain English

Sealed boxes, original packaging, online listings that look identical to the real thing — but inside, the device is a counterfeit. When the victim sets up the wallet and types in their 24-word recovery phrase, it leaves the device before the screen finishes refreshing.

The fake runs a generic IoT microcontroller (Espressif ESP32-S3) in place of the secure element that gives a genuine Ledger its name. The markings on the chip are physically scraped off. PIN and seed are written to flash memory in plain text — no encryption, no attestation, no secure boot.

On the other side of the USB or Bluetooth cable, a trojanized Ledger Live clone (com.ledger.live, v3.99.1) reads eight extra fields the malicious firmware smuggles into a routine "what version are you" command. Those fields include the seed phrase itself, the attacker's server URL, and the RSA public key used to encrypt the payload in transit. The app then uploads the result to a server in China and the attacker drains the wallet.

No anomalous radio traffic. No suspicious firmware update prompt. No user-visible indication anything went wrong. The device looks, feels, and behaves like a legitimate Ledger — except for the one check that a genuine Ledger always passes and this one doesn't.

What made this one different Previous counterfeit Ledger cases documented one or two layers of the scam. This case maps the full operation end-to-end: PCB fabrication, firmware implant, mobile application, three-tier command-and-control, and a Shanghai-based fulfillment entity feeding the marketplace listings. The cryptocurrency-theft layer and an illegal gambling network share infrastructure on the same /24 subnet.

Public reporting places confirmed losses at US$ 9.5M+ across 50+ victims, spanning 20 blockchain ecosystems, distributed across five platforms (hardware, Android, Windows, macOS, and iOS via Apple TestFlight). This report analyzes the hardware and Android vectors in full technical depth.

§ 02 · How it was discovered

A Chinese marketplace, a failed Genuine Check, and six hours of teardown.

The story of the investigation, in six beats — from the package arriving sealed to the command-and-control infrastructure being mapped end-to-end.

  1. Beat 01 The purchase

    A sealed Nano S Plus on JD.com

    As part of an ongoing research effort into hardware supply-chain integrity, our team acquired a Ledger Nano S Plus from a JD.com listing. The box, the seals, the printed inserts, even the holographic QR code on the packaging insert — everything visually matched a retail unit from ledger.com. Price was at parity with the official store.

  2. Beat 02 First plug-in

    Genuine Check fails on the first pairing

    On a clean Windows workstation with an official download of Ledger Live, the device paired over USB HID and identified itself as "Nano S+". The Genuine Check — the cryptographic attestation handshake between Ledger Live and the device's secure element — returned a failure. A legitimate Nano S Plus passes this check on every pairing. Failure on a sealed, retail-packaged unit from an unsanctioned marketplace is the canonical counterfeit signal.

  3. Beat 03 The decision

    Open it up

    Rather than return the unit, we opened it. Two screws, a plastic clip, and the PCB was out. The first observation wasn't the chip — it was the antenna trace: a Wi-Fi/BLE antenna on a device that Ledger explicitly does not ship with Wi-Fi capability. Something was wrong at the substitution layer, not just the firmware.

  4. Beat 04 The chip

    ESP32-S3 under scraped markings

    The main microcontroller had its silkscreen markings mechanically abraded — a flat matte finish where a factory laser engraving should be. Package geometry, pin count, and boot banner all pointed to an Espressif ESP32-S3: a general-purpose IoT SoC with no secure element and no hardware-level isolation for key material. The substitution was complete.

  5. Beat 05 The flash

    PIN and seed in plain text

    Using esptool over the internal UART test points, we extracted the full 4 MB flash image. The NVS partition held the PIN (348962) at two offsets and two 24-word BIP39 mnemonics — in plain text, with no cryptographic protection whatsoever. No commercial hardware wallet stores this material unencrypted. The counterfeit didn't just lack a secure element — it lacked any pretense of one.

  6. Beat 06 The infrastructure

    Three servers, one chain

    Plaintext strings in the firmware pointed to kkkhhhnnn.com as the primary exfiltration endpoint, Cloudflare-fronted with a Java backend. The companion Android APK, signed with an Android SDK debug certificate, revealed two more: an Alibaba Cloud Hong Kong instance running RuoYi and an nginx property co-hosted with a Chinese gambling network. Same DNS provider across both APK C2s. Same /24 subnet as the gambling front. The operation had been active since at least 2018.

The full forensic analysis — including decompiled malicious components, the six-phase attack chain, attribution evidence, and IoCs — is documented in the technical whitepaper. Download it below ↓

§ 03 · Five attack vectors

Five platforms.
One operation.

The same adversary is distributing malicious software across every platform a Ledger user might run. This report covers the hardware implant and the Android APK in depth. The Windows, macOS, and iOS (TestFlight) vectors are confirmed by press coverage and are outside the technical scope of this analysis.

Vector 01
Hardware
Analyzed

Counterfeit Ledger Nano S Plus

ESP32-S3 general-purpose MCU swapped in for the secure element. Chip markings scraped off. PIN and seed stored in plain text in NVS flash.

  • Genuine Check fails on first pairing
  • Scraped chip markings on the main IC
  • No secure element — generic IoT microcontroller
  • PIN 348962 recovered in plaintext
Vector 02
Android
Analyzed

Trojanized Ledger Live APK

React Native / Hermes bundle posing as com.ledger.live v3.99.1. Signed with Android debug certificate. Parses 8 malicious TLV fields injected into the APDU response and exfiltrates the seed via RSA.

  • Signed by android@android.com (debug key)
  • CAMERA + RECORD_AUDIO permissions requested
  • SHA-256: 62723c30…bc54f3
  • 3 active C2 servers
Vector 03
Windows
Press-confirmed

Trojanized Desktop Installer

Windows variant confirmed by press coverage. Not analyzed by the High Code team at publication. Technical artifact not in our possession.

  • Press-confirmed
  • Analysis pending
Vector 04
macOS
Press-confirmed

Trojanized Desktop Installer

macOS variant confirmed by press coverage. Not analyzed by the High Code team at publication. Technical artifact not in our possession.

  • Press-confirmed
  • Analysis pending
Vector 05
iOS
Press-confirmed

TestFlight Distribution

iOS build distributed via Apple TestFlight, bypassing App Store review. Most concerning vector — TestFlight bypass is rare and extends the operation's reach to sealed Apple devices.

  • Bypasses App Store review
  • Apple TestFlight channel
  • Analysis pending
§ 03 · Teardown

Hardware teardown

Opened, desoldered, and flash-dumped. Captions travel with the data, not the images.

Top view of a green double-layer PCB with a microcontroller whose markings have been mechanically removed
01
PCB top view — ESP32-S3 with scraped-off markings
Bottom side of the PCB showing USB-C connector and exposed test pads
02
PCB bottom — USB-C connector, test points TP1/TP2
Close-up of a quartz oscillator labelled 40.000 545PA YXC
03
40MHz crystal — YXC (Yangxing Tech, Shenzhen)
Macro photograph of the main chip, a generic MCU instead of a secure element
04
ESP32-S3 macro — no secure element present
Workbench with USB-to-UART adapter extracting flash contents from the counterfeit device
05
4 MB flash dump — NVS + app0 + app1 + SPIFFS partitions
Disassembled device enclosure with two halves of the plastic case
06
Case opened — identical shell to a genuine Ledger Nano S Plus
Close-up of the two physical buttons and small OLED display panel
07
Buttons and SPI display — counterfeit exterior mimics original UX
Hex editor screenshot showing mnemonic words recovered from the NVS partition
08
NVS keys — test seeds stored in plain text

8 frames · replace files in public/teardown/ with real high-resolution JPGs (≥ 2000px wide).

§ 04 · Timeline

Operation timeline

The bundle carries its own archaeology. 11 datable anchors — from wallet birth to detection — map an operation prepared for years.

  1. Sep 2018 [expand]
    Attacker TRON wallet created

    Wallet TMWUs3PiSDkEXuXRwQi9ixoURH8vBSbioQ created — indicates a veteran actor, not a first-time attempt.

  2. Jan 2024 [expand]
    Oldest timestamp in Hermes bundle

    Earliest date found inside the React Native bundle of ledapp.apk — the codebase has been in development for at least 14 months before distribution.

  3. 14 May 2024 [expand]
    Domain s6s7smdxyzbsd7d7nsrx.icu registered

    Secondary C2 domain registered via Hefei Juming Network Technology Co., Ltd (China). Resolves to 47.243.165.24 (Alibaba Cloud HK).

  4. 04 Dec 2024 [expand]
    Intermediate compilation date

    Second reference date embedded in the Hermes bundle — likely an intermediate build.

  5. 18 Aug 2025 [expand]
    TLS certificate issued for primary C2

    Certificate for C2 #1 issued by Certum (Poland). Valid through 09/2026.

  6. 20 Aug 2025 [expand]
    Most recent compile timestamp

    Most recent date embedded in the shipped Hermes bundle — release candidate window.

  7. 23 Sep 2025 [expand]
    Gambling server 3377 last modification

    Linked gambling network (3377947f.app, 3377 Sports) confirms financial monetization rail.

  8. Oct 2025 [expand]
    Fake Ledger hardware built

    Firmware build tag 20251016 — PCB + ESP32-S3 units rolled off a scaled production run.

  9. 12 Mar 2026 [expand]
    Secondary C2 domain updated

    .icu domain record updated 11 days before forensic analysis — operation still actively maintained.

  10. 22 Mar 2026 · 04:06 [expand]
    Malicious APK distributed

    User vini_bit [HIGH] receives and triages the APK link delivered via Telegram/Discord. The [HIGH] tag marks the High Code researcher who captured the sample — not the attacker.

  11. 22–23 Mar 2026 [expand]
    Forensic analysis conducted

    Complete reverse engineering of firmware, Hermes bytecode, APK, and C2 infrastructure — published by High Code Security Research.

§ 05 · C2 Infrastructure

Public C2 addresses

All three servers are active as of the analysis date. Published for blocking, sinkholing, and correlation — do not probe.

Active command-and-control servers identified in the operation.
# Domain · Endpoint Status
1
kkkhhhnnn.com
/api/open/postByTokenpocket
Hardware C2 — receives RSA-encrypted seed phrases
Response body: {"code":"500","msg":"(Chinese)","enMsg":"error","indinMsg":""} — response bodies localized in Chinese, English and Indonesian.
ACTIVE — HTTP 500 (API responds)
2
s6s7smdxyzbsd7d7nsrx.icu
/api/hard
APK C2 #1 — metadata + firmware update disguise
Exposes /druid/login.html and /login (admin panel in zh-CN). TLS fingerprint F3:77:A1:EE:89:C2:64:B4:A6:A7:0B:8A:E9:A1:51:BE:FE:EF:A2:42.
ACTIVE — HTTP 200
3
www.ysknfr.cn
/helpers/scripts/pack_data
APK C2 #2 — packed exfiltration payloads
Redirects to gambling property 3377947f.app (156.239.121.247) on the same /24 — monetization linkage confirmed.
ACTIVE — HTTP 200
Download iocs.json ✓ Copied

Legal notice: Published for defensive purposes. Do not probe these endpoints — assume adversary monitoring.

§ 10 · Indicators of Compromise

Consolidated IoCs

Every hash, domain, wallet, certificate and function name extracted during analysis. Machine-readable export: iocs.json.

Hashes (3)
Kind Algorithm Value
APK SHA-256 62723c30f17be2e0e59a529b7adc1a7d602a78973b9acc68a5a076eadcbc54f3
Firmware ELF SHA-256 93d2d28f2d46e626172fa592acee84aa5ec7c1076d59e69608ba03abfab4812a
Flash dump SHA-256 8fdddbaefbc014b4377725290c2e3c69c3ff211d71cfa1d7b8d1c41b764539ba
Domains & URLs (6)
kkkhhhnnn.com
https://kkkhhhnnn.com/api/open/postByTokenpocket
Hardware C2 — receives RSA-encrypted seeds
s6s7smdxyzbsd7d7nsrx.icu
https://s6s7smdxyzbsd7d7nsrx.icu/api/hard
APK C2 #1 — metadata + fake firmware updates (47.243.165.24)
www.ysknfr.cn
http://www.ysknfr.cn/helpers/scripts/pack_data
APK C2 #2 — packed exfiltration payloads (156.239.121.224)
3377947f.app
https://3377947f.app/
Linked gambling network (156.239.121.247)
prod-4go95ae3e2a5071b-1391497608.tcloudbaseapp.com
https://prod-4go95ae3e2a5071b-1391497608.tcloudbaseapp.com/led/index.htm
Distribution site (Tencent CloudBase, now 404)
inlnk.ru
https://inlnk.ru/84PnYo
Russian URL shortener referenced in bundle (Mercuryo widget)
Wallets & tokens (3)
TRON TMWUs3PiSDkEXuXRwQi9ixoURH8vBSbioQ
Attacker primary wallet — created Sep 2018, balance ~628.94 TRX
Ethereum 0xc443930Ecd59e55e42Efe976B8a4bA0658f5c50a
Attacker test token SODIUM (ERC-20)
Ethereum 0x34DF29Dd880e9fe2cec0f85f7658B75606fB2870
Attacker test token NAVYSEAL (ERC-20)
Certificates & identifiers (10)
APK Cert Serial 93:6e:ac:be:07:f2:01:df
APK Cert Owner android@android.com (Android debug certificate — NOT Ledger SAS)
TLS SHA-1 (C2 #1) F3:77:A1:EE:89:C2:64:B4:A6:A7:0B:8A:E9:A1:51:BE:FE:EF:A2:42
DNS servers ns1.julydns.com, ns2.julydns.com (shared across C2 #1 and #2)
Registrar Hefei Juming Network Technology Co., Ltd
Baidu Analytics ID #1 80a56e249de1b31e4e235cbcdecf31c1
Baidu Analytics ID #2 622e807c8e78252a0eb835eec4d62ba1
Hardware serial (test unit) 72654036432549
Hardware test PIN 348962
Sentry Debug ID (bundle) 7d5c3676-89c1-4e2e-ba4b-5c2d23ce79b7
Malicious function names (9)
Function Lines Description
verifyDeviceMnemonic 610451, 720025 Exfiltration entry point
_verifyDeviceMnemonic 718912 Async generator core implementation
submitMnemonic 719061 (module 9775) POST to primary C2 with RSA-encrypted seed
parseGetVersionResponse 711507–712188 Parses 8 malicious APDU fields
mmdLog 718764 Internal malware logger — 'mmd' prefix
normalizeCiyuType 720008 Ciyu = 词语 (word/phrase) — mnemonic type normalizer in romanized Chinese
storedMnemonic 610333, 712184 Field holding the victim's seed phrase
verifyMnemonicBaseUrl 610328, 712174 Injected field carrying the C2 URL
verifyMnemonicRsaPublicKey 610332, 712182 Injected field carrying the RSA public key
§ 07 · Video

Live teardown analysis

[ video · embed will appear here once published ]
● LIVE TEARDOWN
§ 06 · Genuine check

Have I been pwned?
— but for hardware wallets.

No data leaves your browser. Check runs locally as a placeholder until the lookup service is live.

Fraud signals to look for
  • Chip with scraped-off markings on the main IC
  • APK signed with android@android.com (debug cert)
  • Runtime permissions CAMERA + RECORD_AUDIO
  • APK SHA-256 matches 62723c30…bc54f3
  • Sold outside official ledger.com channel
  • Device ships pre-initialized with a seed
Lookup not yet live

Genuine check database coming soon

A high-confidence lookup service is in development. Meanwhile, verify manually:

  • Your firmware hash must match the official ledger.com hashes.
  • Counterfeit APK hash: 62723c30…bc54f3
  • Counterfeit firmware on an ESP32-S3 — no secure element present.
  • Suspicious serial? Submit the device below for analysis.
§ 08 · How to protect yourself

Six things, in order of priority.

The counterfeit operation is active and actively maintained. These steps are how the research team protects its own hardware and how anyone holding a hardware wallet should protect theirs.

01
Critical

Buy only from ledger.com

No Ledger device is legitimately sold through JD.com, Taobao, AliExpress, or any Chinese marketplace. Reject third-party listings even if the price matches.

02
Critical

Run the Genuine Check immediately

On first USB/BLE pairing, Ledger Live runs a cryptographic attestation against the device's secure element. Any failure means the device is not authentic — stop using it.

03
Critical

Download Ledger Live only from ledger.com

Verify the installer SHA-256 against the hashes published on ledger.com. The counterfeit APK (com.ledger.live v3.99.1) is signed with an Android SDK debug certificate — android@android.com — and never with Ledger SAS production credentials.

04
High

Never type your seed into any app or website

No legitimate wallet, exchange, or support team will ever ask for your 24 words. Recovery phrases are entered on the hardware device's screen and buttons only.

05
High

If you suspect your device was compromised

Move funds immediately to a new wallet with a new seed generated on a verifiably-genuine hardware device. Do not attempt to reset or reuse the counterfeit — it was never trustworthy.

06
Recommended

Got a suspicious device? Send it for analysis

If you received a hardware wallet under unclear provenance, submit it to our team via the form below before connecting it to anything. Every sample strengthens community indicators.

If you suspect you received a counterfeit device, do not ship it until we confirm a case via the intake form. Physical mail-in details are shared only after a researcher acknowledges the submission. Submit a device below ↓

§ 01 · Report

Download the report

English · PDF · 28 pages
relatorio_ledger.pdf

Published for defensive and educational purposes. Treat every indicator as actively adversary-monitored — do not probe endpoints from attributable infrastructure.

§ 09 · Submit

Got a suspicious Ledger?

Send it in. We'll triage hardware, firmware, and APK evidence under NDA when required. Every submission feeds back into public indicators.

Do not ship devices until we confirm a case. Physical mail-in details are shared after a researcher acknowledges your submission.

Response within 48 business hours.

§ 11 · About

This is what we do.

High Code Security Research

High Code is a hardware-focused cybersecurity company. Our proximity to the global electronics supply chain gives us direct access to emerging threats in hardware security — counterfeit consumer devices, trojanized firmware, compromised distribution channels.

This report is the kind of work we do every day. Teardown, firmware extraction, bytecode reverse engineering, infrastructure reconnaissance — documented in public so the community has machine-readable indicators to defend with.

Headquarters
Delaware, USA
R&D operations · supply-chain proximity
Shenzhen, China

Working on a hardware-security problem?

If your project needs teardown analysis, firmware reverse engineering, or threat intelligence on counterfeit hardware in Asian supply chains, we're open to inquiries.

§ 11 · Credits

Researchers

High Code Security Research
Founder
Vinícius Pinheiro
@vini_bit
Co-founder
Emanuel Magalhães
@anarchyysm

This research was conducted after Vinícius acquired a counterfeit Ledger Nano S Plus from the JD.com Chinese marketplace and the device failed the official Ledger Genuine Check on first pairing. The full forensic analysis — hardware teardown, firmware dump, and reverse engineering of the trojanized APK — was documented jointly by the High Code team and published in the technical whitepaper.