Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Tech Tools & Mobile / Apps»Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds
    Tech Tools & Mobile / Apps

    Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds

    adminBy adminFebruary 17, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Physical letters are replacing emails to deliver hardware wallet phishing campaigns
    • QR codes in envelopes direct victims to fake credential harvesting websites
    • Trezor and Ledger owners receive urgent notices demanding authentication checks

    Experts have warned physical letters are being used in cryptocurrency theft campaigns which rely on QR codes and urgent warnings to trick hardware wallet owners.

    The approach replaces email with printed mail, yet the underlying technique remains traditional phishing, according to cybersecurity expert Dmitry Smilyanets , who detailed receiving one such letter.

    Instead of malicious attachments, victims receive envelopes that appear to come from security teams linked to hardware wallet brands.


    You may like

    QR codes lead to credential harvesting sites

    The letters claiming an Authentication Check or Transaction Check will soon become mandatory for continued wallet access, and instructs users to scan a QR code to avoid disruption, with deadlines stretching into early 2026.

    Once scanned, the codes direct users to malicious websites that imitate official setup pages associated with Trezor and Ledger devices.

    One domain tied to the Ledger theme has already gone offline, while a Trezor — themed domain remains accessible but flagged by Cloudflare as phishing infrastructure.

    The fraudulent site instructs visitors to complete an authentication process before a stated deadline, warning that failure could restrict wallet access or interfere with transaction signing.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    If individuals proceed, they are asked to enter their wallet recovery phrase under the claim that ownership verification is required.

    The page accepts 12, 20, or 24 — word phrases and forwards that information through a backend API endpoint controlled by the attackers.

    With that data, threat actors can import the wallet and transfer funds without further interaction.


    You may like

    It remains unclear how recipients were selected, though previous data breaches involving hardware wallet vendors exposed customer contact details, raising questions about whether leaked mailing addresses are being reused for physical phishing campaigns.

    Hardware wallet recovery phrases function as the textual form of private keys controlling access to cryptocurrency funds.

    Anyone who obtains that phrase gains complete control over the associated wallet.

    Manufacturers state that recovery phrases should only be entered directly on the hardware device during restoration and never on a website or mobile browser.

    Security vendors note that technical safeguards such as firewall software can prevent many unauthorized network connections.

    Strong endpoint protection remains crucial for detecting and blocking suspicious activity on individual devices.

    Users should also maintain updated malware removal tools to ensure that malicious software does not compromise wallets when interacting with any links or downloads.

    The shift to snail mail does not introduce new technical methods, but it shows that attackers continue adapting delivery mechanisms when digital channels become saturated.

    The novelty lies in the envelope, not the exploitation technique — and that distinction may be enough to lower skepticism among recipients.

    Via BleepingComputer


    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

    codes Crypto ditching Email funds hackers handing letters owners physical send tricking Wallet
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
    Next Article 12 Content Marketing Conferences to Attend in 2026
    admin
    • Website

    Related Posts

    Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters

    March 3, 2026

    Google App 17.7.63 APK Download by Google LLC

    March 3, 2026

    Gemini 3.1 Flash-Lite is the fast help you need if you’re a dev with complex data

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters

    March 3, 2026

    4 Best Small-Business Bank Account Promotions & Bonuses of March 2026

    March 3, 2026

    Google App 17.7.63 APK Download by Google LLC

    March 3, 2026

    Google Ads API enforces daily minimum budget for Demand Gen campaigns

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (583)
    • Privacy & Online Earning (84)
    • SEO & Digital Marketing (365)
    • Tech Tools & Mobile / Apps (719)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters

    March 3, 2026

    4 Best Small-Business Bank Account Promotions & Bonuses of March 2026

    March 3, 2026

    Google App 17.7.63 APK Download by Google LLC

    March 3, 2026
    Most Popular
    • Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters
    • 4 Best Small-Business Bank Account Promotions & Bonuses of March 2026
    • Google App 17.7.63 APK Download by Google LLC
    • Google Ads API enforces daily minimum budget for Demand Gen campaigns
    • Gemini 3.1 Flash-Lite is the fast help you need if you’re a dev with complex data
    • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
    • Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
    • EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.