Update: Addressing concerns around our recent X (Twitter) account breach

2024-3-26 15:58

This post aims to address concerns surrounding a breach of our official X (formerly, Twitter) account earlier this week. Despite stringent security protocols, including strong passwords and two-factor authentication, we detected unauthorized activity on our X account at 11:53 PM on Tuesday 19 March. The breach appears to have arisen from a sophisticated and calculated phishing attack that was in the works for weeks.

We want to stress here that the security of all our products remains unaffected. This incident has in no way impacted or compromised the security of Trezor hardware wallets or any of our other products. Your Trezor device and Trezor Suite remain safe to use.

In the spirit of full transparency and to address any concerns around our commitment to security, we felt it necessary to share a preliminary report on the incident. Please note, that the investigation is ongoing.

SummaryWhat we knowSteps takenAn appealFAQsSummary

Despite our robust security measures recommended by the platform, including the use of strong passwords and two-factor authentication (2FA), our X account (https://twitter.com/Trezor) was compromised on the evening of Tuesday 19 March (We want to clarify that we do not make use of SMS for 2FA, and instead employ more secure methods of authentication). The attackers pushed out a series of unauthorized and misleading posts, including asking users to send funds to an unknown wallet address, with nefarious links to a fraudulent token presale.

We were alerted to the breach at 11:53 PM, and the fraudulent posts were quickly identified and removed shortly after their appearance, mitigating the extent of the damage.

What we knowThe breach of our X account has unfolded to be a sophisticated phishing attack, planned over the course of weeks.From our investigation, we have understood that the attackers engaged in a calculated scheme that began on February 29, 2024, posing as a credible entity from the crypto space, complete with a well-crafted social media presence and a seemingly genuine interest in dialogue.The impersonator, using an X handle with thousands of followers, approached our PR team over X, under the guise of scheduling an interview with our CEO.Over several days, the conversation advanced with credible back-and-forth communication.This set the stage for a call, that culminated in the sharing of a malicious link, disguised as a Calendly invite.Our team member, upon clicking the link, was redirected to a page requesting X login credentials, a red flag that prompted immediate suspicion and cessation of the interaction.The meeting was rescheduled.At the time of the meeting, the attacker feigned technical issues and urged our team member to “authorize” joining the call. The authorization was however a prompt to connect the attacker’s Calendly app with our X account. In the urgency of the moment, our team member confirmed the connection. The breach has been traced in X’s authentication logs.As the Calendly app was under the attacker’s possession, they were able to send the fraudulent tweets on our behalf.Internal steps takenOur initial focus was on mitigating the impact of the incident.We swiftly deleted the unauthorized posts and revoked all active sessions, including those of third-party apps, to prevent further unauthorized access.We have also initiated a comprehensive security audit to fully investigate the breach, focusing on identifying the method used by the attackers to bypass our security measures.An appeal

Trezor, as the world’s pioneering hardware wallet, has been serving the Bitcoin and cryptocurrency space since 2013. We want to affirm that the core of what we’ve built over these years is unwavering security. In light of the recent incident, it is crucial to understand that the security of all our products and our internal systems remains intact.

We realize there are some concerns. However, the breach of our X account should not reflect on the integrity of our products. Here’s why,

Trezor wallets are designed to keep your digital assets offline and safe from online vulnerabilities.Our security architecture ensures that critical operations, like transaction signing, occur within the secure confines of your Trezor device, never exposing your private keys.The trust in our products is built upon rigorous, industry-leading security practices, which include regular audits and continuous testing.This is why we have opted to keep our software and hardware open-source and public, ready for any kind of testing if need be.

This is what has helped us earn the trust of over 1.5 million customers globally.

FAQsWhat measures are being taken to secure Trezor’s social accounts?

We have always taken utmost care across all of our communication channels. Even before the current incident, we had put in place stringent security protocols, including strong passwords and two-factor authentication. Our investigation has revealed the sophisticated nature of the attack that was in the works for weeks. Going ahead, we will continue to implement enhanced security protocols for all our external communications channels.

Can such breaches affect the security of my Trezor wallet?

No.
Your funds remain safe. However, as always, such incidents serve as reminders to exercise caution when dealing with unauthorized links. Do not enter your recovery seed anywhere unless in your Trezor device upon recovery. Also, please note, that under no circumstance will any Trezor representative seek your recovery seed, over email, customer support, website, or any form of communication. And, there are no plans for any kind of token sale, whatsoever.

Will this incident affect the way Trezor interacts with third-party applications moving forward?

Unfortunately, in the global business landscape, collaboration with third-party platforms (X, in this case) remains essential, though it comes with inherent challenges. We continue to re-evaluate our security protocols concerning third-party apps.

Update: Addressing concerns around our recent X (Twitter) account breach was originally published in Trezor Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.

Similar to Notcoin - TapSwap on Solana Airdrops In 2024

origin »

Medium (MDM) íà Currencies.ru

$ 0.0639872 (+0.02%)
Îáúåì 24H $1
Èçìåíåèÿ 24h: 0.05 %, 7d: -0.01 %
Cåãîäíÿ L: $0.0639872 - H: $0.0639872
Êàïèòàëèçàöèÿ $0 Rank 7002
Äîñòóïíî / Âñåãî 0 MDM

need all hardware wallet keep safe medium

need all → Ðåçóëüòàòîâ: 126


Uniswap Launches UniswapX As AI Crypto InQubeta Hogs All Attention Amid Wildly Successful Presale

The InQubeta (QUBE) project’s presale has been extremely successful, with over $1. 7 million in tokens sold so far during its initial stages. The project focuses on making investment opportunities in artificial intelligence (AI) more accessible while sending more capital to startups in the industry that need it.

2023-7-30 11:00


Court says it doesn’t need to “wordsmith” Binance and SEC’s announcements

The court handling the SEC’s ongoing case against Binance said that it is not necessary to revise either party’s public statements on June 26. The relevant order, signed by Judge Amy Berman Jackson, declared: “While all of the lawyers in this case should adhere to their ethical obligations … it is not … necessary or […] The post Court says it doesn’t need to “wordsmith” Binance and SEC’s announcements appeared first on CryptoSlate.

2023-6-27 02:16


U.S. vs China Battle for Financial Dominance: What’s the Impact on the Cryptocurrency Landscape?

As a seasoned cryptocurrency analyst, it’s clear that the international financial system is at a critical juncture. The geopolitical tensions between the U. S. and China, the rise of CBDCs, and the need for regulation in the crypto market are all factors that could significantly impact the global economy and the crypto market.

2023-6-27 22:00