Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Tech Tools & Mobile / Apps»Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds
    Tech Tools & Mobile / Apps

    Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds

    adminBy adminFebruary 17, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Physical letters are replacing emails to deliver hardware wallet phishing campaigns
    • QR codes in envelopes direct victims to fake credential harvesting websites
    • Trezor and Ledger owners receive urgent notices demanding authentication checks

    Experts have warned physical letters are being used in cryptocurrency theft campaigns which rely on QR codes and urgent warnings to trick hardware wallet owners.

    The approach replaces email with printed mail, yet the underlying technique remains traditional phishing, according to cybersecurity expert Dmitry Smilyanets , who detailed receiving one such letter.

    Instead of malicious attachments, victims receive envelopes that appear to come from security teams linked to hardware wallet brands.


    You may like

    QR codes lead to credential harvesting sites

    The letters claiming an Authentication Check or Transaction Check will soon become mandatory for continued wallet access, and instructs users to scan a QR code to avoid disruption, with deadlines stretching into early 2026.

    Once scanned, the codes direct users to malicious websites that imitate official setup pages associated with Trezor and Ledger devices.

    One domain tied to the Ledger theme has already gone offline, while a Trezor — themed domain remains accessible but flagged by Cloudflare as phishing infrastructure.

    The fraudulent site instructs visitors to complete an authentication process before a stated deadline, warning that failure could restrict wallet access or interfere with transaction signing.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    If individuals proceed, they are asked to enter their wallet recovery phrase under the claim that ownership verification is required.

    The page accepts 12, 20, or 24 — word phrases and forwards that information through a backend API endpoint controlled by the attackers.

    With that data, threat actors can import the wallet and transfer funds without further interaction.


    You may like

    It remains unclear how recipients were selected, though previous data breaches involving hardware wallet vendors exposed customer contact details, raising questions about whether leaked mailing addresses are being reused for physical phishing campaigns.

    Hardware wallet recovery phrases function as the textual form of private keys controlling access to cryptocurrency funds.

    Anyone who obtains that phrase gains complete control over the associated wallet.

    Manufacturers state that recovery phrases should only be entered directly on the hardware device during restoration and never on a website or mobile browser.

    Security vendors note that technical safeguards such as firewall software can prevent many unauthorized network connections.

    Strong endpoint protection remains crucial for detecting and blocking suspicious activity on individual devices.

    Users should also maintain updated malware removal tools to ensure that malicious software does not compromise wallets when interacting with any links or downloads.

    The shift to snail mail does not introduce new technical methods, but it shows that attackers continue adapting delivery mechanisms when digital channels become saturated.

    The novelty lies in the envelope, not the exploitation technique — and that distinction may be enough to lower skepticism among recipients.

    Via BleepingComputer


    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

    codes Crypto ditching Email funds hackers handing letters owners physical send tricking Wallet
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
    Next Article 12 Content Marketing Conferences to Attend in 2026
    admin
    • Website

    Related Posts

    I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud

    March 3, 2026

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026

    Google is cutting Chrome’s release cycle in half

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026

    SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (582)
    • Privacy & Online Earning (83)
    • SEO & Digital Marketing (364)
    • Tech Tools & Mobile / Apps (717)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026
    Most Popular
    • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
    • Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
    • EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches
    • SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)
    • I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud
    • Pro-Russia actors team with Iran-linked hackers in attacks
    • 8 Best Student Checking Accounts of March 2026
    • Builderius WordPress Page Builder Integrates Claude AI
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.