Ledger CTO raises alarm over NPM supply chain attack targeting crypto users

2025-9-9 12:03

A major supply chain attack has rocked the crypto ecosystem, threatening users globally. Ledger’s CTO Charles Guillemet is sounding the alarm, urging caution and hardware wallet use. The attack, which began with a hacked Node Package Manager (NPM) account, has… origin »

Supply Shock (M1) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 0.00 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Доступно / Всего 0 M1

attack ledger crypto chain users supply alarm

attack ledger → Результатов: 52


Keanu Reeves “HODL”, Swiss Federal Councilor’s Data Leaked in Ledger Hack, Crypto Protocols Continue Be Exploited

Last week, cross-chain NFT marketplace Vulcan Forged lost $100 million in an attack, EOS-based Pizza reached a settlement with the hacker, and AscendEX promised to reimburse 100%. The post Keanu Reeves “HODL”, Swiss Federal Councilor’s Data Leaked in Ledger Hack, Crypto Protocols Continue Be Exploited first appeared on BitcoinExchangeGuide.

2021-12-14 18:05


Фото:

Ledger Patches Nano X Supply Chain Vulnerability

The Ledger security team has patched a hardware exploit that could compromise Ledger Nano X wallets as a part of a supply chain attack. Following a report from Kraken Security Labs, a cybersecurity division of Kraken, that showed that the Ledger hardware wallet was susceptible to a supply chain attack, the device manufacturer has announced […] The post Ledger Patches Nano X Supply Chain Vulnerability appeared first on BeInCrypto.

2020-7-9 12:12


Фото:

Crypto Wallet Manufacturer Ledger Detects Malware Targeting its Desktop Application

Ledger, a crypto wallet startup, tweeted Friday, April 25, 2019, that they have detected a malware that could possibly replace the Ledger Live desktop application with a malicious one. “Only” a Phishing Attack After detecting the malware that had affected their systems, Ledger was quick to warn its users through their tweet.

2019-4-29 21:00


Ledger Reveals Five Vulnerabilities in Competitor Trezor’s Wallets

Ledger, a major crypto hardware wallet manufacturer based in France, revealed five security vulnerabilities found in the Trezor Model T and Model One, major competitors to the Nano Ledger. Ledger’s Attack Lab Discovered Vulnerabilities in Trezor’s Hardware Wallets The market for cryptocurrency hardware wallets is a rather competitive one due to the nature of cryptocurrencies.

2019-3-13 13:00


Фото:

Ledger: Аппаратные криптовалютные кошельки от Trezor имеют множественные уязвимости

Ведущий производитель криптовалютных аппаратных кошельков Ledger рассказал об уязвимостях, выявленных в устройствах своего прямого конкурента Trezor. Об этом говорится в сообщении, распространенном французской компанией в понедельник, 11 марта.

2019-3-12 09:47


Ledger обнаружил уязвимости в аппаратных кошельках Trezor

Производитель аппаратных кошельков Ledger опубликовал обнаруженные уязвимости в устройствах Trezor, своего основного конкурента. Уязвимости были обнаружены в Attack Lab — отделе компании, который занимается взломом как собственных устройств, так и устройств конкурентов для повышения безопасности.

2019-3-12 08:33


Фото:

Разработчики Ledger раскрыли 5 уязвимоcтей криптокошельков Trezor

Сотрудники лаборатории Attack Lab, входящей в состав французской компании-производителя аппаратных криптокошельков Ledger, обнародовали 5 уязвимостей в продукции конкурента – компании Trezor. Как сообщается, ошибки были обнаружены в ходе тестирования оборудования двух торговых марок.

2019-3-11 22:30


Компания Ledger заявила о ряде уязвимостей в аппаратных кошельках Trezor

Ведущий производитель криптовалютных аппаратных кошельков Ledger рассказал об уязвимостях, выявленных в устройствах своего прямого конкурента Trezor. Об этом говорится в сообщении, распространенном французской компанией в понедельник, 11 марта.

2019-3-12 21:32


Absurdistan: For $2.5k per day, you can attack Verge (XVG). For $44k you can shut down Electroneum (ETN) as well.

A 51% attack means that 51% of the ‘computer processing power’ used to verify transactions is controlled by one entity, and once this number (51%) has been reached, they can create a new ledger (blockchain ‘fork’ basically) so that they can double spend their own coins (among a few other capabilities).

2019-3-1 01:51


Ripple’s executive gloating after 51% on ETC. But can XRP ledger be measured with the same rod as other cryptocurrencies?

In the light of the 51% attack on another minor proof of work chain, other consensus mechanism proponents jumped on the opportunity to thump bitcoin’s consensus mechanism of choice while simultaneously tooting their own horns with heaped praise of proof of stake or Ripple’s consensus mechanism.

2019-1-8 09:00


Фото:

Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3

In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack.

2019-1-1 19:15


Report Links 74% of Bitcoin Mining to China, Sees Threat to Network

Bitcoin, the world’s most sought-after cryptocurrency, could be at the wish and whim of Asia’s economic giant. A recent study titled “The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin,” jointly researched by Princeton University and Florida International University researchers, suggests China’s mining scene has an overwhelming influence over Bitcoin, something that could invite network manipulation.

2018-10-11 00:29


Фото:

Bank of Canada: Double Spending is “Unrealistic” in Blockchain Technology

A study released in July 2018 by the Bank of Canada (BoC) concludes the dreaded “double spending” attack on public blockchains is an “unrealistic” outcome. Blockchain Technology Scrutinized The research study, titled “Incentive Compatibility on the Blockchain,” examines incentive rewards for maintaining a distributed ledger and models the behavior of a “cheating” participant who tampers […] The post Bank of Canada: Double Spending is “Unrealistic” in Blockchain Technology appeared first on CryptoSlate.

2018-7-24 10:00


Фото:

Governance, Part 2: Plutocracy Is Still Bad

Coin holder voting, both for governance of technical features, and for more extensive use cases like deciding who runs validator nodes and who receives money from development bounty funds, is unfortunately continuing to be popular, and so it seems worthwhile for me to write another post explaining why I (and Vlad Zamfir and others) do not consider it wise for Ethereum (or really, any base-layer blockchain) to start adopting these kinds of mechanisms in a tightly coupled form in any significant way.

2018-7-21 23:03