How Crypto Gets Stolen - And How To Avoid It | Ledger (2024)

By Kirsty Moreland

How Crypto Gets Stolen - And How To Avoid It | Ledger (1)

May 10, 2022 | Updated Oct 24, 2022

Read 5 min

Beginner

How Crypto Gets Stolen - And How To Avoid It | Ledger (2)
Key Takeaways:
— There are some threats even a hardware wallet can’t protect you from – so understanding threat vectors is key to knowing how to protect your crypto yourself

— Cyber attacks are online and hackers will use the internet to get access to your keys.

— Social engineering attacks are done by scammers who will get you to relinquish control of your keys by gaining your trust.

— Hardware wallet theft and sophisticated physical attacks like power glitching and side-channel attacks rely on (1) the ability to physically compromise your device.

Crypto offers a powerful way for people to gain control of their own money, but that power comes with great responsibility. There are a number of different ways clever scammers can steal your crypto, here we do a full audit on every angle, so you know exactly how to protect yourself.

We all know the drill: the security of your crypto depends on your wallet. But listen, there are still some threats even a wallet cannot protect you from – not even your Ledger.

The only way to really be sure you’ve properly secured your precious crypto is to understand the different types of threat that exist, and what type of defense – your wallet, or your own knowledge – needs to be deployed in order to avoid it.

So here, we’ve broken down different crypto threat vectors into three distinct categories,with an explanation of what’s needed to protect yourself against it. Ready for the ultimate crypto security glossary? Let’s dive in!

Cyber threats (hacking, malware): The vulnerability of the internet

Your internet connection is the biggest threat to your private keys. Anything connected to the internet – including your crypto wallet – is vulnerable to cyber threats. It’s that simple.

There are a couple of ways this can happen:

  • Let’s say you’re using a hot wallet or holding your crypto using an exchange. If the platform is hacked, your keys are at risk of being stolen through the internet.
  • Clicking on a malicious link could provide the hacker with remote access to your device and extract things such as your private key or your seed phrase.

How to protect yourself From Online Threats

Since crypto wallets can be subject to hacks, the only way of really keeping your keys safe is by using a wallet that’s not connected to the internet.

The whole premise of a hardware wallet like the Ledger Nano is to keep both your private keys and your seed phrase offline and away from cyber threats.

Never Expose your Private Keys, Even When You Transact

And what about when you’re interacting with online applications? Even here, your Nano also acts as a venue for transactions to be signed offline, meaning your data lives safely in your device even while the important information is communicated online to make the transaction happen. Here’s how that works.

Generate your Recovery Phrase Offline – and Keep It There

Securing your crypto is not just about moving your existing private keys offline – it’s about making sure they are never online to start with.

A Ledger device generates your recovery phrase (the shorthand for all of the private keys in your wallet) offline from the very beginning, communicating it to you in a completely offline environment, via the screen of the device. This gives you complete control over your wallet, while still ensuring that none of your sensitive data is ever exposed to an online environment.

But ultimately, how you store that seed phrase is down to you – storing it on a connected device will defeat the whole purpose of using a Ledger.

Online Threats = Offline Wallet

So in short, your crypto is vulnerable to this category of threats any time your private keys are online – but don’t worry, that can easily be solved by using a Ledger to secure your private keys. As long as you use the device properly and secure your seed phrase safely, these threats can be completely overcome, leaving you free to forget your worries and explore the ecosystem.

Physical threats: theft or attack of your hardware device

Using a hardware device to keep your private keys offline is a great move. But it does mean you need to be mindful of a new threat vector – theft or probing of the device itself.

Say your hardware wallet is taken from you; how can you be sure your precious crypto will remain safe, even if the device is in strange hands? Let’s check it out.

A PIN Code Set By You

A hardware wallet is only as secure as its PIN code. It’s the front line of defense against intruders and it’s the only part of security that you set for yourself.

This is why Ledger allows you to set your own code and even determine its length, up to eight digits. This ensures that no matter who has your Nano, only you can access it. And if the wrong PIN code is entered three times, the device automatically bricks (performs a factory reset), meaning your device keeps out even the most opportunistic thief.

Advanced Passphrase

Most devices have a 24-word recovery phrase as a backup. Ledger has a 25th word passphrase on top of that too. It’s an advanced security feature that adds an extra layer of security to keep your funds secret even if you’re under duress. This 25th word allows you to access a secondary, “secret” wallet from your regular device, allowing you to leave the bulk of your crypto in this secret wallet and protect it in any situation.

Physical Hacks to the Hardware

If your device falls into the wrong hands, you may face a more sophisticated threat – a physical hack of the device. With sophisticated attacks from expert hackers such as power glitching, side-channel attacks, and software hacks like attacking a Hardware Security Module, hardware wallets can be vulnerable if they don’t have the right fortification.

Ledger’s hardware wallets are designed to protect your sensitive data against online AND physical attacks, with features in place to offer the very highest level of security. There are a couple of important factors that set Ledger devices apart in their layers of protection against physical attacks:

Secure Element: The Impenetrable Chip

Ledger uses a Secure Element chip, which is found in things like passports and credit cards where high-end security is needed. Ledger hardware wallets are the only wallets in the industry that uses a Secure Element chip, protecting you and your private keys against attacks like laser attacks, electromagnetic tampering, and power glitches.

BOLOS Operating System: Isolating Each Application

The problem with some hardware wallets is that they use a monolithic system, managing all of the applications they contain as one. Ledger’s custom operating system, BOLOS, ensures that all of the apps and crypto accounts within your Ledger device are managed separately. For you, this means that even if an application was ever compromised via an attack, the damage would be isolated to that application, and would not impact the rest of your wallet.

The Donjon: Constantly Checking Your Security

To make sure your wallets are always safe from hacking, we have a team of internal good-guy hackers to test and find any potential chinks in our armour. The Ledger Donjon is our internal security evaluation team made up of security experts to conduct constant, extensive hacks to the hardware, establishing any possible point of failure that might impact your security. The Donjon work hand-in-hand with Ledger’s Firmware development and hardware team to scrutinize the security of the devices, make sure only state-of-the-art security measures are in place that can withstand any attempts to attack, and constantly upgrade our system accordingly.

Physical Threats Require The Safest Hardware Device

Using a hardware device to secure your private keys protects you from online threats but could potentially leave you open to physical attacks on the device. That’s why it’s so crucial to choose a device that not only uses the safest components but continually seeks to improve its systems to ensure absolutely nothing can permeate the device.

By choosing a Ledger, you can secure your private keys and forget about them – the components and system keep your wallet airtight from physical attacks.

Social engineering threats – YOU are the weak link

Some hackers don’t play the internet or the code, they play the people. In social engineering attacks, scammers will create a fake situation to gain your trust, getting you to open the door and let them access your data under false pretenses. We see this approach in attacks like phishing and pharming (site addresses that look the same as a legit site but aren’t).

Blind Signing: Scammers’ Paradise

Smart contracts enabled the whole ecosystem of Dapps we now enjoy, but they came with a bit of a caveat.

Some smart contracts can’t be properly read by certain crypto wallets, meaning you can’t be 100% sure what you’re actually signing. It becomes a blind spot and you have to trust the other person behind the smart contract. Scammers use this blind spot by creating scenarios that will convince you to approve a transaction that’s not legitimate. You might think that you’re minting an NFT, but instead the smart contract is drawn to take a precious NFT of yours.

Clear Signing with Ledger’s Ecosystem

Ledger is more than just a crypto wallet – it’s a safe gateway to Web3. Ledger Live is Ledger’s platform of integrated applications; for each integration, users are able to clear sign transactions using their Ledger Nano and see exactly what they’re agreeing to each time. This gives you more transparency than ever when you interact through the Ledger ecosystem, and adds a huge layer of protection from social engineering scams.

BUT no matter how secure and transparent our wallets are, Ledger won’t be able to prevent a scammer accessing your private keys if you’re the one giving them access. This is why it is so important to understand how crypto works and how to assess a transaction for yourself – and we’re here to help you do that.

The One Thing Ledger Can’t Protect you From

Even Ledger can’t completely protect you from social engineering scams – here, only YOU can defend your crypto, and this means understanding it deeply for yourself. Learning how to read a smart contract, avoiding blind signing and taking a cautious approach to anything suspicious is a fantastic start to securing yourself against social attacks.

To that end, Ledger’s Academy is a treasure trove of information on crypto security, taking a deep dive into how to keep your keys safe sets you up nicely to identify anything that comes your way. So although Ledger can’t offer you complete protection from clever scammers, by bringing you clear signing and a raft of educational materials, Ledger gives you the tools you need to be the ultimate gatekeeper for your crypto.

You Are the Gatekeeper

Congratulations! You just complete a full audit of how crypto gets stolen and you’re in a perfect position to explore Web3. Understanding the crypto ecosystem – and your role in your own cryptocurrency’s security – is crucial to the safety of your coins and tokens.

Ledger wallets are the safest option for anyone using crypto, but even a Nano cannot protect you from every threat. That’s why we’re here to make sure you understand exactly how you can protect yourself. So get free and KEEP ON LEARNING, in crypto you are the master of your own destiny.

LFG!

Knowledge is power.

Blind signing is one of the biggest threats you face as a crypto holder – here, we explain in detail, so you can protect yourself. Thanks School of Block.

How Crypto Gets Stolen - And How To Avoid It | Ledger (2024)

FAQs

How does cryptocurrency get stolen? ›

An attacker—or group of attackers—could take over a blockchain by controlling a majority of the blockchain's computational power, called its hashrate. If they own more than 50% of the hashrate, they can introduce an altered blockchain in what is called a 51% attack.

How do hackers get your crypto? ›

In addition to attacking crypto wallets directly, hackers can use phishing attacks to get personal information from wallet holders. For instance, people who use the popular MetaMask wallet may have received phishing emails asking for personal information in 2022.

How can you protect your crypto? ›

Cold storage can protect your digital assets by taking them offline and harboring your crypto in a digital wallet. Since these digital wallets aren't connected to the internet, they're less susceptible to hacks.

What is a 24 word recovery phrase? ›

Your 24-word recovery phrase serves as a backup to all your private keys. As long as you have your recovery phrase, you will always be able to regain access to your crypto assets. You can restore any Ledger device from your recovery phrase to recover the wallet configuration and access your funds.

How common is crypto theft? ›

According to blockchain analysis company Chainalysis, 0.15% of known cryptocurrency transactions conducted in 2021 were involved in illicit activities like cybercrime, money laundering and terrorism financing, representing a total of $14 billion.

Can stolen crypto be recovered? ›

Will I get my money back? Once your virtual currency has been stolen it is incredibly unlikely that you will be able to recover it.

How do hackers steal crypto from wallet? ›

Modified versions of crypto wallet apps used with emulators and simulators, or on device malware can be used by hackers to create fake accounts, perform malicious trades, or transfer cryptocurrency from one wallet app to another.

How do hackers cash out crypto? ›

A major way criminals in the crypto world launder money is by sending digital assets across blockchains, bypassing a centralized service that can trace and freeze transactions. They use so-called cross-chain bridges to make it happen, and the dollar amounts are getting large.

What is BIP39? ›

BIP39 is a design implementation that lays out how cryptocurrency wallets create the set of words (or "mnemonic codes") that make up a mnemonic sentence, and how the wallet turns them into a binary "seed" that is used to create encryption keys, which are then are used to execute cryptocurrency transactions.

What is a secret recovery phrase? ›

Your Secret Recovery Phrase (SRP) is a unique 12-word phrase that is generated when you first set up MetaMask. Your funds are connected to that phrase. If you ever lose your password, your SRP allows you to recover your wallet and your funds.

What happens if you lose your crypto Ledger? ›

No problem! Losing your Ledger device does not mean losing your crypto! Your PIN – which only you can ever know – prevents anyone else from using the device, while your securely stored recovery phrase keeps you linked with your precious blockchain addresses, so you can access your accounts no matter what.

Can I get my crypto back from scammer? ›

Once you pay with cryptocurrency, you can usually only get your money back if the person you paid sends it back. Before you buy something with cryptocurrency, know the seller's reputation, by doing some research before you pay. Some information about your transactions will likely be public.

Will Coinbase refund if scammed? ›

With an active Coinbase One subscription, you may be eligible to receive a one-time reimbursem*nt for up to $1,000,000 (U.S. Dollars) of actual losses (or the U.S. Dollar equivalent thereof, in the case such losses were in the form of Digital Currency) that you sustain due to a compromise of your Coinbase Account login ...

How do I not get scammed on crypto? ›

  1. Do your homework. ...
  2. Be careful who you trust. ...
  3. Make sure your crypto wallet is secure. ...
  4. Take advantage of multi-factor authentication. ...
  5. Keep a close eye on website URLs. ...
  6. Consider gaining crypto exposure through more traditional investments.
Jul 25, 2022

What is the safest crypto wallet? ›

We chose Trezor as best for security because it comes with the strongest security features and track record of any reviewed hardware wallet. Trezor, like Ledger, is a name synonymous with crypto cold wallet storage. Its Model T is the second generation of hardware wallets they have created.

How do people steal trust wallets? ›

However, Trust Wallet is still a hot wallet, and is accordingly subject to phishing scams. Through phishing websites, phishers can easily steal seed phrases and gain access to a user's wallet. Due to the decentralized nature of crypto, lost funds can never be recovered.

Which crypto wallet can be hacked? ›

Coinomi's key security feature is why most users tout it as one of the best noncustodial wallets for crypto storage. Coinomi stores your private keys locally on your device rather than on its online servers. In this way, your keys are entirely under your control and not stored in a network that can be hacked.

What is 25 word seed phrase? ›

The term 25th word means nothing without any context. It refers to adding an optional “passphrase” or extra word(s) to our 24 word seed. The option is given to us when we generate a new seed using particular BIP39 compliant wallets.

What is 25 word recovery phrase? ›

The passphrase is an advanced feature that allows you to add an additional word to your recovery phrase. For this reason, it's also commonly referred to as the 25th word. Unlike the regular recovery phrase, you would choose the 25th word. There are no limitations for which word you'd like to choose.

What is the 12-word phrase? ›

The 12-word phrase is your secret master seed that generates all your wallet's addresses and private keys. It is incredibly important for you to keep your 12-word phrase safe. If you would like to know more about your 12-word phrase, please click here.

Can stolen crypto be traced? ›

Thanks to the transparency of the blockchain, it is possible to easily track money flows. If the identity behind a wallet address is known, then the transactions made can be traced back and traced in the future. All these transactions can be viewed in detail.

Does Coinbase refund stolen crypto? ›

In order to request reimbursem*nt under the Coinbase Account Protection, please contact us via the Coinbase Help Center to lock your Coinbase Account and report that someone gained unauthorized access to your Coinbase account and withdrew your funds without your permission.

Can scammed crypto be recovered? ›

Anyone claiming they can get your crypto back from a scammer is a scammer themselves. Crypto can never be retrieved once it is sent. So, anyone saying otherwise is trying to scam you. Be especially cautious if you are asked for either an upfront fee or your wallet information.

Who investigates crypto theft? ›

In 2021, the Department of Justice formed a National Cryptocurrency Enforcement Team to specifically investigate and prosecute the criminal misuse of cryptocurrency. Similarly, the FBI and other federal investigative agencies have established special units to investigate violations involving cryptocurrency.

How do I recover crypto sent to a scammer? ›

If you are a victim of a crypto scam, joining a class action lawsuit can help you in recovering some or all of your funds. A class action lawsuit pools together many victims who have suffered similar crypto losses. This makes it easier to hold the perpetrators accountable and seek justice.

Top Articles
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 5927

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.