Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Tech Tools & Mobile / Apps»Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds
    Tech Tools & Mobile / Apps

    Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds

    adminBy adminFebruary 17, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers are ditching email to send physical letters with QR codes, tricking crypto wallet owners into handing over funds
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Physical letters are replacing emails to deliver hardware wallet phishing campaigns
    • QR codes in envelopes direct victims to fake credential harvesting websites
    • Trezor and Ledger owners receive urgent notices demanding authentication checks

    Experts have warned physical letters are being used in cryptocurrency theft campaigns which rely on QR codes and urgent warnings to trick hardware wallet owners.

    The approach replaces email with printed mail, yet the underlying technique remains traditional phishing, according to cybersecurity expert Dmitry Smilyanets , who detailed receiving one such letter.

    Instead of malicious attachments, victims receive envelopes that appear to come from security teams linked to hardware wallet brands.


    You may like

    QR codes lead to credential harvesting sites

    The letters claiming an Authentication Check or Transaction Check will soon become mandatory for continued wallet access, and instructs users to scan a QR code to avoid disruption, with deadlines stretching into early 2026.

    Once scanned, the codes direct users to malicious websites that imitate official setup pages associated with Trezor and Ledger devices.

    One domain tied to the Ledger theme has already gone offline, while a Trezor — themed domain remains accessible but flagged by Cloudflare as phishing infrastructure.

    The fraudulent site instructs visitors to complete an authentication process before a stated deadline, warning that failure could restrict wallet access or interfere with transaction signing.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    If individuals proceed, they are asked to enter their wallet recovery phrase under the claim that ownership verification is required.

    The page accepts 12, 20, or 24 — word phrases and forwards that information through a backend API endpoint controlled by the attackers.

    With that data, threat actors can import the wallet and transfer funds without further interaction.


    You may like

    It remains unclear how recipients were selected, though previous data breaches involving hardware wallet vendors exposed customer contact details, raising questions about whether leaked mailing addresses are being reused for physical phishing campaigns.

    Hardware wallet recovery phrases function as the textual form of private keys controlling access to cryptocurrency funds.

    Anyone who obtains that phrase gains complete control over the associated wallet.

    Manufacturers state that recovery phrases should only be entered directly on the hardware device during restoration and never on a website or mobile browser.

    Security vendors note that technical safeguards such as firewall software can prevent many unauthorized network connections.

    Strong endpoint protection remains crucial for detecting and blocking suspicious activity on individual devices.

    Users should also maintain updated malware removal tools to ensure that malicious software does not compromise wallets when interacting with any links or downloads.

    The shift to snail mail does not introduce new technical methods, but it shows that attackers continue adapting delivery mechanisms when digital channels become saturated.

    The novelty lies in the envelope, not the exploitation technique — and that distinction may be enough to lower skepticism among recipients.

    Via BleepingComputer


    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

    codes Crypto ditching Email funds hackers handing letters owners physical send tricking Wallet
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
    Next Article 12 Content Marketing Conferences to Attend in 2026
    admin
    • Website

    Related Posts

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Home Assistant’s intimidating reputation is completely undeserved once you survive the first week

    April 19, 2026

    I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Home Assistant’s intimidating reputation is completely undeserved once you survive the first week

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,400)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,675)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026
    Most Popular
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    • NIST to stop rating non-priority flaws due to volume increase
    • Home Assistant’s intimidating reputation is completely undeserved once you survive the first week
    • The Complete Guide To Agentic Commerce
    • I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome
    • This $10 accessory has completely transformed my Pixel 10
    • Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.