Sealed boxes, original packaging, online listings that look identical to the real thing —
but inside, the device is a counterfeit. When the victim sets up the wallet and types in
their 24-word recovery phrase, it leaves the device before the screen finishes refreshing.
The fake runs a generic IoT microcontroller (Espressif
ESP32-S3) in place of the secure element that gives a genuine Ledger its name.
The markings on the chip are physically scraped off.
PIN and seed are written to flash memory in plain text
— no encryption, no attestation, no secure boot.
On the other side of the USB or Bluetooth cable, a trojanized Ledger Live clone
(com.ledger.live, v3.99.1) reads eight extra fields the malicious firmware
smuggles into a routine "what version are you" command. Those fields include the seed
phrase itself, the attacker's server URL, and the RSA public key used to encrypt the
payload in transit. The app then uploads the result to a server in China and the
attacker drains the wallet.
No anomalous radio traffic. No suspicious firmware update prompt. No user-visible
indication anything went wrong. The device looks, feels, and behaves like a legitimate
Ledger — except for the one check that a genuine Ledger always passes and this one doesn't.
What made this one different
Previous counterfeit Ledger cases documented one or two layers of the scam. This case
maps the full operation end-to-end: PCB fabrication, firmware implant, mobile application,
three-tier command-and-control, and a Shanghai-based fulfillment entity feeding the
marketplace listings. The cryptocurrency-theft layer and an illegal gambling network
share infrastructure on the same /24 subnet.
Public reporting places confirmed losses at US$ 9.5M+
across 50+ victims, spanning 20 blockchain ecosystems, distributed across five
platforms (hardware, Android, Windows, macOS, and iOS via Apple TestFlight). This report
analyzes the hardware and Android vectors in full technical depth.