Hardware Wallet Users Targeted by Sophisticated Physical Phishing Campaign

Feb 16, 2026, 12:44 p.m. 13 sources negative

Key takeaways:

  • Sophisticated phishing campaigns highlight growing risks for hardware wallet users despite their security reputation.
  • Investors should verify all communications directly with manufacturers as social engineering tactics evolve offline.
  • Past data breaches at major wallet providers continue to pose indirect threats to crypto asset security.

Security researchers have uncovered a sophisticated and relatively rare phishing campaign targeting users of the leading hardware wallet brands, Trezor and Ledger. The campaign involves hackers sending physical letters via postal mail to potential victims, impersonating official communications from the wallet companies.

The fraudulent letters are printed on official-looking letterhead and use convincing logos. They create a false sense of urgency by claiming recipients must complete mandatory procedures such as an "Authentication Check" or "Transaction Check" by a specific deadline, with one Trezor-themed letter citing February 15, 2026. The letters warn that failure to comply will result in lost device functionality or disruption to services like Trezor Suite.

These letters direct users to scan embedded QR codes, which lead to malicious phishing websites. The sites are designed to mimic legitimate wallet interfaces and request users to enter their 12-, 20-, or 24-word recovery seed phrases under the pretense of verifying device ownership or enabling new features. Cybersecurity expert Dmitry Smilyanets, who received one such fake Trezor letter, noted the sophisticated social engineering tactics employed.

Once a victim enters their recovery phrase, the data is transmitted to the attackers' backend servers. This grants the threat actors full control over the victim's cryptocurrency wallet, allowing them to import the wallet onto their own devices and drain all funds. The phishing sites are crafted to accept recovery phrases in multiple formats, increasing their effectiveness.

This offline tactic is designed to bypass traditional digital security filters for email and SMS phishing. The targeting criteria for the mailings remains unclear, but it is suspected to be linked to past data breaches at both Trezor and Ledger, which exposed customer contact and mailing address information to potential attackers.

Both companies have reiterated fundamental security principles in response: hardware wallet manufacturers never ask users to share, enter, scan, or upload their recovery seed phrases through any channel. Seed phrases should only ever be entered directly on the physical hardware wallet device itself during a restoration process, never on a computer, mobile device, or website.

Disclaimer

The content on this website is provided for information purposes only and does not constitute investment advice, an offer, or professional consultation. Crypto assets are high-risk and volatile — you may lose all funds. Some materials may include summaries and links to third-party sources; we are not responsible for their content or accuracy. Any decisions you make are at your own risk. Coinalertnews recommends independently verifying information and consulting with a professional before making any financial decisions based on this content.