ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Founded in Paris in 2014, LEDGER is a global platform for digital assets and Web3. Ledger is already the world leader in Critical Digital Asset security and utility. With more than 6M devices sold to consumers in 200 countries and 10+ languages, 100+ financial institutions and brands as customers, 20% of the world’s crypto assets are secured, plus services supporting trading, buying, spending, earning, and NFTs. LEDGER’s products include: Ledger Stax, Nano S Plus, Nano X hardware wallets, LEDGER Live companion app, [ LEDGER ] Market, the world’s first secure-minting and first-sale distribution platform, and Ledger Enterprise. With its ease of use, LEDGER allows a user to begin investing in digital assets and ultimately, achieve financial freedom in a safe and stress-free environment. Headquartered in Paris and Vierzon, with offices in London, New York and Singapore, Ledger has a team of more than 900 professionals developing a variety of products and services to enable individuals and companies to securely buy, store, swap, grow and manage crypto assets – including more than 6 millions devices already sold in 180 countries. Ledger combines either Nano S Plus or Nano X and the Ledger Live app to offer consumers the easiest way to start their crypto journey while maintaining full control over their digital assets. With its ease of use, Ledger allows users to begin investing in digital assets and ultimately, achieve financial freedom in a safe and stress-free environment, with education provided by its Ledger Academy and Quest. In addition to consumer products, Ledger has also developed Ledger Enterprise, a digital asset custody and security solution for institutional investors and financial players.

Ledger A.I CyberSecurity Scoring

Ledger

Company Details

Linkedin ID:

ledgerhq

Employees number:

688

Number of followers:

70,865

NAICS:

541514

Industry Type:

Computer and Network Security

Homepage:

ledger.com

IP Addresses:

0

Company ID:

LED_1170851

Scan Status:

In-progress

AI scoreLedger Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/ledgerhq.jpeg
Ledger Computer and Network Security
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreLedger Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ledgerhq.jpeg
Ledger Computer and Network Security
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Ledger Company CyberSecurity News & History

Past Incidents
4
Attack Types
3
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
LedgerBreach60312/2023
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The Ledger Connect Kit software of the Paris-based business was compromised by a phishing attempt targeting a former worker. During transactions using decentralised applications, or dapps, that utilised the compromised software, the hacker released malicious code that routed user funds to their own wallet.

Ledger / Trezor (Cryptocurrency Wallet Providers)Cyber Attack85411/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The **Nova Stealer** malware campaign targets macOS users by replacing legitimate **Ledger Live** and **Trezor Suite** cryptocurrency wallet applications with malicious counterparts. The attack begins with a dropper downloading a shell script (`mdriversinstall.sh`) from a C2 server, establishing persistence via a hidden directory (`~/.mdrivers`) and a **LaunchAgent** (`application.com.artificialintelligence`). The malware operates stealthily using detached `screen` sessions, ensuring survival across reboots.Key modules include:- **`mdriversfiles.sh`**: Exfiltrates wallet data (e.g., Trezor’s `IndexedDB`, Exodus’ `passphrase.json`, Ledger’s `app.json`).- **`mdriversswaps.sh`**: Replaces genuine wallet apps with **unsigned FAT Mach-O executables** (Swift-based) that render **phishing pages** (`wheelchairmoments[.]com`, `sunrisefootball[.]com`). These pages use **BIP-39/SLIP-39 validation** to harvest **recovery phrases** (12–33 words) via keystroke logging (200–400ms debounce) and real-time tracking (`/track` endpoints).- **`mdriversmetrics.sh`**: Conducts system reconnaissance (installed apps, processes).Victims unknowingly interact with **counterfeit apps** (registered in Dock via `PlistBuddy`), leading to **full compromise of cryptocurrency assets**. The modular design allows remote updates, extending the campaign’s lifespan while evading static detection. The attack focuses on **high-value targets** (crypto users), with potential for **mass financial loss** and **irreversible asset theft** due to exposed recovery phrases.

LedgerCyber Attack10071/2024
Rankiteo Explanation :
Attack that could injure or kill people

Description: In January 2025, **Ledger**, a Paris-based crypto-wallet vendor, fell victim to a **Violence-as-a-Service (VaaS) attack** orchestrated by Russia-linked groups **Renaissance Spider** and **The Com**. The co-founder of Ledger was **kidnapped** in France as part of an extortion scheme tied to cryptocurrency theft. The attack was executed via **Telegram-coordinated networks**, leveraging physical violence, arson threats, and ransom demands. This incident was among **17 recorded VaaS attacks since January 2024**, with **13 occurring in France alone**, prompting **Europol to establish a dedicated taskforce** to counter the escalating threat. The attack not only endangered the executive’s life but also exposed Ledger to **reputational damage, operational disruption, and potential financial losses** due to ransom pressures. The incident underscores the convergence of **cyber extortion and physical violence**, targeting high-profile individuals in the crypto sector to exploit digital and real-world vulnerabilities.

LedgerData Leak85306/2020
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Major cryptocurrency hardware wallet provider Ledger experienced a data breach. The company said it was made aware of the breach on July 14 when a researcher participating in its bounty program reached out with details of a potential vulnerability on their website. While they were able to fix the breach immediately, a further investigation found that an authorized third party carried out a similar action on June 25. The individual used an API key to access the marketing and e-commerce database the company used to send promotional emails. This compromised the email addresses of almost one million people. For a subset of 9,500 customers, details such as first and last name, postal address, and phone number were also exposed.

Ledger
Breach
Severity: 60
Impact: 3
Seen: 12/2023
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The Ledger Connect Kit software of the Paris-based business was compromised by a phishing attempt targeting a former worker. During transactions using decentralised applications, or dapps, that utilised the compromised software, the hacker released malicious code that routed user funds to their own wallet.

Ledger / Trezor (Cryptocurrency Wallet Providers)
Cyber Attack
Severity: 85
Impact: 4
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The **Nova Stealer** malware campaign targets macOS users by replacing legitimate **Ledger Live** and **Trezor Suite** cryptocurrency wallet applications with malicious counterparts. The attack begins with a dropper downloading a shell script (`mdriversinstall.sh`) from a C2 server, establishing persistence via a hidden directory (`~/.mdrivers`) and a **LaunchAgent** (`application.com.artificialintelligence`). The malware operates stealthily using detached `screen` sessions, ensuring survival across reboots.Key modules include:- **`mdriversfiles.sh`**: Exfiltrates wallet data (e.g., Trezor’s `IndexedDB`, Exodus’ `passphrase.json`, Ledger’s `app.json`).- **`mdriversswaps.sh`**: Replaces genuine wallet apps with **unsigned FAT Mach-O executables** (Swift-based) that render **phishing pages** (`wheelchairmoments[.]com`, `sunrisefootball[.]com`). These pages use **BIP-39/SLIP-39 validation** to harvest **recovery phrases** (12–33 words) via keystroke logging (200–400ms debounce) and real-time tracking (`/track` endpoints).- **`mdriversmetrics.sh`**: Conducts system reconnaissance (installed apps, processes).Victims unknowingly interact with **counterfeit apps** (registered in Dock via `PlistBuddy`), leading to **full compromise of cryptocurrency assets**. The modular design allows remote updates, extending the campaign’s lifespan while evading static detection. The attack focuses on **high-value targets** (crypto users), with potential for **mass financial loss** and **irreversible asset theft** due to exposed recovery phrases.

Ledger
Cyber Attack
Severity: 100
Impact: 7
Seen: 1/2024
Blog:
Rankiteo Explanation
Attack that could injure or kill people

Description: In January 2025, **Ledger**, a Paris-based crypto-wallet vendor, fell victim to a **Violence-as-a-Service (VaaS) attack** orchestrated by Russia-linked groups **Renaissance Spider** and **The Com**. The co-founder of Ledger was **kidnapped** in France as part of an extortion scheme tied to cryptocurrency theft. The attack was executed via **Telegram-coordinated networks**, leveraging physical violence, arson threats, and ransom demands. This incident was among **17 recorded VaaS attacks since January 2024**, with **13 occurring in France alone**, prompting **Europol to establish a dedicated taskforce** to counter the escalating threat. The attack not only endangered the executive’s life but also exposed Ledger to **reputational damage, operational disruption, and potential financial losses** due to ransom pressures. The incident underscores the convergence of **cyber extortion and physical violence**, targeting high-profile individuals in the crypto sector to exploit digital and real-world vulnerabilities.

Ledger
Data Leak
Severity: 85
Impact: 3
Seen: 06/2020
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Major cryptocurrency hardware wallet provider Ledger experienced a data breach. The company said it was made aware of the breach on July 14 when a researcher participating in its bounty program reached out with details of a potential vulnerability on their website. While they were able to fix the breach immediately, a further investigation found that an authorized third party carried out a similar action on June 25. The individual used an API key to access the marketing and e-commerce database the company used to send promotional emails. This compromised the email addresses of almost one million people. For a subset of 9,500 customers, details such as first and last name, postal address, and phone number were also exposed.

Ailogo

Ledger Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Ledger

Incidents vs Computer and Network Security Industry Average (This Year)

Ledger has 117.39% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Ledger has 56.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types Ledger vs Computer and Network Security Industry Avg (This Year)

Ledger reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Ledger (X = Date, Y = Severity)

Ledger cyber incidents detection timeline including parent company and subsidiaries

Ledger Company Subsidiaries

SubsidiaryImage

Founded in Paris in 2014, LEDGER is a global platform for digital assets and Web3. Ledger is already the world leader in Critical Digital Asset security and utility. With more than 6M devices sold to consumers in 200 countries and 10+ languages, 100+ financial institutions and brands as customers, 20% of the world’s crypto assets are secured, plus services supporting trading, buying, spending, earning, and NFTs. LEDGER’s products include: Ledger Stax, Nano S Plus, Nano X hardware wallets, LEDGER Live companion app, [ LEDGER ] Market, the world’s first secure-minting and first-sale distribution platform, and Ledger Enterprise. With its ease of use, LEDGER allows a user to begin investing in digital assets and ultimately, achieve financial freedom in a safe and stress-free environment. Headquartered in Paris and Vierzon, with offices in London, New York and Singapore, Ledger has a team of more than 900 professionals developing a variety of products and services to enable individuals and companies to securely buy, store, swap, grow and manage crypto assets – including more than 6 millions devices already sold in 180 countries. Ledger combines either Nano S Plus or Nano X and the Ledger Live app to offer consumers the easiest way to start their crypto journey while maintaining full control over their digital assets. With its ease of use, Ledger allows users to begin investing in digital assets and ultimately, achieve financial freedom in a safe and stress-free environment, with education provided by its Ledger Academy and Quest. In addition to consumer products, Ledger has also developed Ledger Enterprise, a digital asset custody and security solution for institutional investors and financial players.

Loading...
similarCompanies

Ledger Similar Companies

CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

newsone

Ledger CyberSecurity News

November 24, 2025 01:30 PM
Black Friday 2025 cybersecurity deals to explore

Black Friday 2025 is shaping up to be a good moment for anyone thinking about tightening their cybersecurity, so here's deals worth a look.

November 24, 2025 11:00 AM
Cybersecurity threats and data breaches

In an ever-evolving landscape of changing technological advances and increasingly sophisticated cybercrime practices, individuals and...

November 21, 2025 09:38 PM
FatPipe CEO Publishes Letter to Shareholders

SALT LAKE CITY, UTAH / ACCESS Newswire / November 18, 2025 / FatPipe, Inc. (NASDAQ:FATN) (“FatPipe” or the “Company”), a pioneer in enterprise-class,...

October 21, 2025 07:00 AM
Florida Poly creates operations center in partnership with Lakeland cybersecurity firm

Florida Poly and Sittadel, a cybersecurity firm based in Lakeland, will create and operate the Security Operations Center on campus.

October 18, 2025 07:00 AM
US seizes $15bn in bitcoin from Cambodian gang leader, Khmelnytskyi crypto ring and other cybersecurity news

The week's key cybersecurity stories. 18.10.2025 ForkLog. The week's key cybersecurity stories. Hackers have adapted malware for blockchain. Global Ledger:...

October 14, 2025 07:00 AM
Protect your business from cybersecurity risk, MS insurance commissioner says

October is Cybersecurity Awareness Month. Cybersecurity is a hot topic for the insurance sector today and a growing concern for many...

October 14, 2025 07:00 AM
Marshfield senior center offers week-long series of workshops, tips on being tech savvy

The chances of being robbed while using your computer or smart phone increase. Marshfield offers a week of ways to stay safer.

October 14, 2025 07:00 AM
Why Cyber Security Has Become A Leading Concern In Retail Operations

The retail sector has undergone a dramatic transformation driven by digital technologies. From online shopping platforms and mobile payment...

August 19, 2025 07:00 AM
Mississippi breaks ground for new center for cybersecurity and technology

Mississippi breaks ground for new center for cybersecurity and technology · Mississippi broke ground on a new Cyber and Technology Center near...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Ledger CyberSecurity History Information

Official Website of Ledger

The official website of Ledger is https://www.ledger.com.

Ledger’s AI-Generated Cybersecurity Score

According to Rankiteo, Ledger’s AI-generated cybersecurity score is 665, reflecting their Weak security posture.

How many security badges does Ledger’ have ?

According to Rankiteo, Ledger currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Ledger have SOC 2 Type 1 certification ?

According to Rankiteo, Ledger is not certified under SOC 2 Type 1.

Does Ledger have SOC 2 Type 2 certification ?

According to Rankiteo, Ledger does not hold a SOC 2 Type 2 certification.

Does Ledger comply with GDPR ?

According to Rankiteo, Ledger is not listed as GDPR compliant.

Does Ledger have PCI DSS certification ?

According to Rankiteo, Ledger does not currently maintain PCI DSS compliance.

Does Ledger comply with HIPAA ?

According to Rankiteo, Ledger is not compliant with HIPAA regulations.

Does Ledger have ISO 27001 certification ?

According to Rankiteo,Ledger is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Ledger

Ledger operates primarily in the Computer and Network Security industry.

Number of Employees at Ledger

Ledger employs approximately 688 people worldwide.

Subsidiaries Owned by Ledger

Ledger presently has no subsidiaries across any sectors.

Ledger’s LinkedIn Followers

Ledger’s official LinkedIn profile has approximately 70,865 followers.

NAICS Classification of Ledger

Ledger is classified under the NAICS code 541514, which corresponds to Others.

Ledger’s Presence on Crunchbase

Yes, Ledger has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/ledger-2.

Ledger’s Presence on LinkedIn

Yes, Ledger maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ledgerhq.

Cybersecurity Incidents Involving Ledger

As of November 29, 2025, Rankiteo reports that Ledger has experienced 4 cybersecurity incidents.

Number of Peer and Competitor Companies

Ledger has an estimated 2,798 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Ledger ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Cyber Attack and Breach.

How does Ledger detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with fixed the breach immediately, and third party assistance with crowdstrike (threat intelligence), third party assistance with europol (violence-as-a-service taskforce), and law enforcement notified with yes (europol involved for violence-as-a-service threats), and enhanced monitoring with recommended: monitor for detached screen sessions, unusual launchagents, and unsolicited application replacements..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Ledger Data Breach

Description: Major cryptocurrency hardware wallet provider Ledger experienced a data breach. The company said it was made aware of the breach on July 14 when a researcher participating in its bounty program reached out with details of a potential vulnerability on their website. While they were able to fix the breach immediately, a further investigation found that an authorized third party carried out a similar action on June 25. The individual used an API key to access the marketing and e-commerce database the company used to send promotional emails. This compromised the email addresses of almost one million people. For a subset of 9,500 customers, details such as first and last name, postal address, and phone number were also exposed.

Date Detected: 2020-07-14

Type: Data Breach

Attack Vector: API Key Misuse

Vulnerability Exploited: Unauthorized Access to API Key

Threat Actor: Authorized Third Party

Incident : Phishing Attack

Title: Phishing Attack on Ledger Connect Kit Software

Description: The Ledger Connect Kit software of the Paris-based business was compromised by a phishing attempt targeting a former worker. During transactions using decentralised applications, or dapps, that utilised the compromised software, the hacker released malicious code that routed user funds to their own wallet.

Type: Phishing Attack

Attack Vector: Phishing

Vulnerability Exploited: Compromised software via phishing

Threat Actor: Unknown hacker

Motivation: Financial gain

Incident : ransomware

Title: 13% Increase in Ransomware Attacks on European Organizations (2024-2025)

Description: European organizations experienced a 13% increase in ransomware attacks over the past year, with the UK being the most affected. The CrowdStrike 2025 European Threat Landscape Report highlights trends such as 'big-game hunting' (BGH) attacks, ransomware groups like Akira and LockBit, and emerging threats like vishing and 'Violence-as-a-Service.' Over 2100 victims were named on extortion leak sites since January 2024, with 92% involving file encryption and data theft. Russian threat actors leverage GDPR compliance to coerce ransom payments. Initial access brokers advertised access to over 1400 hacked European organizations, and tactics included credential dumping, remote encryption, and Linux ransomware on VMware ESXi infrastructure.

Date Publicly Disclosed: 2025-09-01

Type: ransomware

Attack Vector: phishing (CAPTCHA lures / 'ClickFix' attacks)malvertisingSEO poisoningcredential dumping from backup/restore databasesunmanaged system exploitationvishing (voice phishing, e.g., Scattered Spider)initial access brokers (1400+ hacked organizations advertised)Telegram-coordinated physical attacks (kidnapping, arson, extortion)

Vulnerability Exploited: unmanaged systems (for data theft and ransomware deployment)VMware ESXi infrastructure (Linux ransomware)human vulnerabilities (vishing, native-language social engineering)GDPR compliance leverage (ransom coercion)

Threat Actor: Name: Akira, Type: ransomware group, Origin: likely Russian-affiliated, Victims: 167, Name: LockBit, Type: ransomware group, Origin: likely Russian-affiliated, Victims: 162, Name: RansomHub, Type: ransomware group, Victims: 141, Name: INC Ransomware, Type: ransomware group, Victims: 133, Name: Lynx, Type: ransomware group, Victims: 133, Name: Sinobi, Type: ransomware group, Victims: 133, Name: Scattered Spider, Type: vishing/social engineering group, Targets: ['M&S', 'Co-op Group'], Tactics: native-language voice phishing, Name: The Com, Type: Violence-as-a-Service (VaaS) group, Origin: Russia-linked, Tactics: ['physical attacks', 'arson', 'kidnapping', 'extortion'], Platform: Telegram, Name: Renaissance Spider, Type: Violence-as-a-Service (VaaS) group, Origin: Russia-based, Tactics: ['physical attacks', 'cryptocurrency theft'], Platform: Telegram, Name: Initial Access Brokers (260+ actors), Type: cybercriminal intermediaries, Offerings: access to 1400+ hacked European organizations.

Motivation: financial gain (ransomware payouts, avg. $3.6M)data theft for extortioncryptocurrency theft (Violence-as-a-Service)geopolitical leverage (exploiting GDPR compliance)

Incident : malware

Title: Nova Stealer macOS Malware Campaign Targeting Cryptocurrency Users

Description: A sophisticated new macOS malware campaign dubbed 'Nova Stealer' has emerged, targeting cryptocurrency users through an elaborate scheme that replaces legitimate wallet applications (e.g., Ledger Live, Trezor Suite) with malicious counterparts designed to harvest sensitive recovery phrases and wallet data. The malware employs modular architecture, detached screen sessions for stealth, and a persistent update mechanism via a command-and-control (C2) server. It uses a novel 'application swapping' technique to replace legitimate apps with phishing versions that log keystrokes, exfiltrate recovery phrases, and track user activity in real-time.

Type: malware

Attack Vector: malicious shell script (mdriversinstall.sh) downloaded via C2 (hxxps://ovalresponsibility[.]com)persistent LaunchAgent (application.com.artificialintelligence)application swapping (replacing legitimate Ledger Live/Trezor Suite with counterfeit versions)phishing pages hosted on hxxps://wheelchairmoments[.]com and hxxps://sunrisefootball[.]com

Vulnerability Exploited: user trust in legitimate cryptocurrency wallet applicationslack of code signing verification for replaced applicationspersistent background execution via detached screen sessionsabuse of LaunchAgents for persistence

Motivation: financial gain (theft of cryptocurrency via harvested recovery phrases)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing email targeting former worker, unmanaged systemscompromised credentialsphishing/vishing lures and malicious shell script (mdriversinstall.sh) downloaded from hxxps://ovalresponsibility[.]com.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach LED213813123

Data Compromised: Email addresses, First and last names, Postal addresses, Phone numbers

Incident : Phishing Attack LED743221223

Systems Affected: Ledger Connect Kit Software

Incident : ransomware LED1832718110325

Data Compromised: 2100+ victims (92% involved data theft)

Systems Affected: VMware ESXi infrastructure (Linux ransomware)unmanaged systems (used for lateral movement)backup/restore configuration databases (credential dumping)

Operational Impact: disruption across manufacturing, professional services, technology, industrials/engineering, and retail sectors

Brand Reputation Impact: high (public disclosure of 1380+ victims on leak sites)

Legal Liabilities: potential GDPR violations (used as leverage for ransom)

Identity Theft Risk: high (PII likely exposed in 92% of cases with data theft)

Incident : malware LED5093550111925

Data Compromised: Cryptocurrency wallet recovery phrases (bip-39/slip-39), Trezor suite indexeddb files, Exodus wallet configuration (passphrase.json, seed.seco), Ledger live app.json, Installed applications list, Running processes, Wallet presence indicators

Systems Affected: macOS systems with Ledger Live, Trezor Suite, or Exodus wallets installed

Operational Impact: unauthorized replacement of legitimate applications with malicious counterpartspersistent background monitoring via detached screen sessionsreal-time exfiltration of keystrokes and recovery phrases

Brand Reputation Impact: potential loss of trust in cryptocurrency wallet providers (Ledger, Trezor, Exodus) due to impersonation

Identity Theft Risk: ['high (if recovery phrases are used to drain wallets)']

Payment Information Risk: ['high (direct theft of cryptocurrency assets)']

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email Addresses, First And Last Names, Postal Addresses, Phone Numbers, , Corporate Data, Personally Identifiable Information (Pii), Potential Payment Data, , Cryptocurrency Wallet Recovery Phrases, Wallet Configuration Files (Passphrase.Json, Seed.Seco, App.Json), System Reconnaissance Data (Installed Apps, Processes) and .

Which entities were affected by each incident ?

Incident : Data Breach LED213813123

Entity Name: Ledger

Entity Type: Company

Industry: Cryptocurrency Hardware Wallet

Customers Affected: Almost one million, 9,500 with additional details

Incident : Phishing Attack LED743221223

Entity Name: Ledger

Entity Type: Business

Industry: Technology

Location: Paris

Incident : ransomware LED1832718110325

Entity Name: Unspecified UK Organizations

Entity Type: manufacturing, professional services, technology, industrials/engineering, retail

Industry: multiple

Location: United Kingdom

Incident : ransomware LED1832718110325

Entity Name: Unspecified German Organizations

Entity Type: manufacturing, professional services, technology, industrials/engineering, retail

Industry: multiple

Location: Germany

Incident : ransomware LED1832718110325

Entity Name: Unspecified Italian Organizations

Entity Type: manufacturing, professional services, technology, industrials/engineering, retail

Industry: multiple

Location: Italy

Incident : ransomware LED1832718110325

Entity Name: Unspecified French Organizations

Entity Type: manufacturing, professional services, technology, industrials/engineering, retail

Industry: multiple

Location: France

Incident : ransomware LED1832718110325

Entity Name: Unspecified Spanish Organizations

Entity Type: manufacturing, professional services, technology, industrials/engineering, retail

Industry: multiple

Location: Spain

Incident : ransomware LED1832718110325

Entity Name: M&S (Marks & Spencer)

Entity Type: retail

Industry: retail

Location: United Kingdom

Size: large enterprise

Incident : ransomware LED1832718110325

Entity Name: Co-op Group

Entity Type: retail/consumer cooperative

Industry: retail

Location: United Kingdom

Size: large enterprise

Incident : ransomware LED1832718110325

Entity Name: Ledger (Crypto-Wallet Vendor)

Entity Type: technology/financial services

Industry: cryptocurrency

Location: France

Incident : malware LED5093550111925

Entity Name: Cryptocurrency Users (Ledger, Trezor, Exodus)

Entity Type: individuals

Industry: cryptocurrency

Location: global (macOS users)

Incident : malware LED5093550111925

Entity Name: Ledger

Entity Type: company

Industry: cryptocurrency hardware wallets

Incident : malware LED5093550111925

Entity Name: Trezor

Entity Type: company

Industry: cryptocurrency hardware wallets

Incident : malware LED5093550111925

Entity Name: Exodus

Entity Type: company

Industry: cryptocurrency software wallets

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach LED213813123

Remediation Measures: Fixed the breach immediately

Incident : ransomware LED1832718110325

Third Party Assistance: Crowdstrike (Threat Intelligence), Europol (Violence-As-A-Service Taskforce).

Law Enforcement Notified: yes (Europol involved for Violence-as-a-Service threats)

Incident : malware LED5093550111925

Enhanced Monitoring: recommended: monitor for detached screen sessions, unusual LaunchAgents, and unsolicited application replacements

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through CrowdStrike (threat intelligence), Europol (Violence-as-a-Service taskforce), .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach LED213813123

Type of Data Compromised: Email addresses, First and last names, Postal addresses, Phone numbers

Number of Records Exposed: Almost one million, 9,500 with additional details

Personally Identifiable Information: First and last namesPostal addressesPhone numbers

Incident : ransomware LED1832718110325

Type of Data Compromised: Corporate data, Personally identifiable information (pii), Potential payment data

Number of Records Exposed: 2100+ victims (92% with data theft)

Sensitivity of Data: high (PII, corporate secrets, potential GDPR-regulated data)

Data Exfiltration: yes (92% of ransomware cases)

Data Encryption: yes (92% of cases involved file encryption)

Personally Identifiable Information: likely (used for extortion leverage)

Incident : malware LED5093550111925

Type of Data Compromised: Cryptocurrency wallet recovery phrases, Wallet configuration files (passphrase.json, seed.seco, app.json), System reconnaissance data (installed apps, processes)

Sensitivity of Data: extremely high (direct access to cryptocurrency assets)

Data Exfiltration: recovery phrases sent to /seed and /seed2 endpointspartial keystrokes logged with 200-400ms debounceuser activity beacons sent to /track every 10 seconds

Data Encryption: ['none (data exfiltrated in plaintext via HTTP POST)']

File Types Exposed: JSON (passphrase.json, app.json, seed.seco), IndexedDB, SQLite (Launchpad databases)

Personally Identifiable Information: potentially linked to wallet ownership if recovery phrases are tied to identities

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Fixed the breach immediately.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : ransomware LED1832718110325

Ransomware Strain: AkiraLockBitRansomHubINCLynxSinobi

Data Encryption: yes (92% of cases)

Data Exfiltration: yes (double extortion tactic)

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : ransomware LED1832718110325

Regulations Violated: GDPR (potential violations used as ransom leverage),

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : ransomware LED1832718110325

Lessons Learned: Russian-affiliated threat actors exploit GDPR compliance as ransom leverage., Big-game hunting (BGH) targets large enterprises with high-value data., Initial access brokers play a critical role in facilitating attacks (1400+ organizations advertised)., Vishing and 'ClickFix' CAPTCHA lures are rising attack vectors., Violence-as-a-Service (VaaS) introduces physical threats (kidnapping, arson) tied to cyber extortion., Unmanaged systems and VMware ESXi infrastructure are high-risk targets for ransomware deployment.

Incident : malware LED5093550111925

Lessons Learned: macOS malware is evolving with modular, updateable designs that bypass traditional detection, application swapping techniques can bypass user scrutiny by replacing trusted software, detached screen sessions and LaunchAgents provide persistent, stealthy execution, phishing pages with BIP-39/SLIP-39 validation increase credibility and harvest success rates, real-time keystroke logging and activity tracking enable immediate exploitation of victims

What recommendations were made to prevent future incidents ?

Incident : ransomware LED1832718110325

Recommendations: Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Segment networks to limit lateral movement from compromised unmanaged systems., Update VMware ESXi defenses against Linux-based ransomware strains., Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Collaborate with law enforcement (e.g., Europol) to disrupt Violence-as-a-Service (VaaS) networks., Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers.Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Segment networks to limit lateral movement from compromised unmanaged systems., Update VMware ESXi defenses against Linux-based ransomware strains., Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Collaborate with law enforcement (e.g., Europol) to disrupt Violence-as-a-Service (VaaS) networks., Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers.Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Segment networks to limit lateral movement from compromised unmanaged systems., Update VMware ESXi defenses against Linux-based ransomware strains., Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Collaborate with law enforcement (e.g., Europol) to disrupt Violence-as-a-Service (VaaS) networks., Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers.Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Segment networks to limit lateral movement from compromised unmanaged systems., Update VMware ESXi defenses against Linux-based ransomware strains., Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Collaborate with law enforcement (e.g., Europol) to disrupt Violence-as-a-Service (VaaS) networks., Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers.Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Segment networks to limit lateral movement from compromised unmanaged systems., Update VMware ESXi defenses against Linux-based ransomware strains., Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Collaborate with law enforcement (e.g., Europol) to disrupt Violence-as-a-Service (VaaS) networks., Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers.Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Segment networks to limit lateral movement from compromised unmanaged systems., Update VMware ESXi defenses against Linux-based ransomware strains., Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Collaborate with law enforcement (e.g., Europol) to disrupt Violence-as-a-Service (VaaS) networks., Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers.Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Segment networks to limit lateral movement from compromised unmanaged systems., Update VMware ESXi defenses against Linux-based ransomware strains., Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Collaborate with law enforcement (e.g., Europol) to disrupt Violence-as-a-Service (VaaS) networks., Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers.Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Segment networks to limit lateral movement from compromised unmanaged systems., Update VMware ESXi defenses against Linux-based ransomware strains., Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Collaborate with law enforcement (e.g., Europol) to disrupt Violence-as-a-Service (VaaS) networks., Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers.

Incident : malware LED5093550111925

Recommendations: verify cryptocurrency wallet application integrity (e.g., code signing, checksums) before use, monitor for unusual LaunchAgents (e.g., application.com.artificialintelligence) and detached screen sessions, audit /Applications and ~/Library/LaunchAgents for unauthorized modifications, use hardware wallets with physical confirmation for recovery phrase entry, deploy endpoint detection solutions capable of identifying process injection and screen session abuse, educate users on phishing risks, including fake wallet applications and recovery phrase harvesting, block known malicious domains (ovalresponsibility[.]com, wheelchairmoments[.]com, sunrisefootball[.]com)verify cryptocurrency wallet application integrity (e.g., code signing, checksums) before use, monitor for unusual LaunchAgents (e.g., application.com.artificialintelligence) and detached screen sessions, audit /Applications and ~/Library/LaunchAgents for unauthorized modifications, use hardware wallets with physical confirmation for recovery phrase entry, deploy endpoint detection solutions capable of identifying process injection and screen session abuse, educate users on phishing risks, including fake wallet applications and recovery phrase harvesting, block known malicious domains (ovalresponsibility[.]com, wheelchairmoments[.]com, sunrisefootball[.]com)verify cryptocurrency wallet application integrity (e.g., code signing, checksums) before use, monitor for unusual LaunchAgents (e.g., application.com.artificialintelligence) and detached screen sessions, audit /Applications and ~/Library/LaunchAgents for unauthorized modifications, use hardware wallets with physical confirmation for recovery phrase entry, deploy endpoint detection solutions capable of identifying process injection and screen session abuse, educate users on phishing risks, including fake wallet applications and recovery phrase harvesting, block known malicious domains (ovalresponsibility[.]com, wheelchairmoments[.]com, sunrisefootball[.]com)verify cryptocurrency wallet application integrity (e.g., code signing, checksums) before use, monitor for unusual LaunchAgents (e.g., application.com.artificialintelligence) and detached screen sessions, audit /Applications and ~/Library/LaunchAgents for unauthorized modifications, use hardware wallets with physical confirmation for recovery phrase entry, deploy endpoint detection solutions capable of identifying process injection and screen session abuse, educate users on phishing risks, including fake wallet applications and recovery phrase harvesting, block known malicious domains (ovalresponsibility[.]com, wheelchairmoments[.]com, sunrisefootball[.]com)verify cryptocurrency wallet application integrity (e.g., code signing, checksums) before use, monitor for unusual LaunchAgents (e.g., application.com.artificialintelligence) and detached screen sessions, audit /Applications and ~/Library/LaunchAgents for unauthorized modifications, use hardware wallets with physical confirmation for recovery phrase entry, deploy endpoint detection solutions capable of identifying process injection and screen session abuse, educate users on phishing risks, including fake wallet applications and recovery phrase harvesting, block known malicious domains (ovalresponsibility[.]com, wheelchairmoments[.]com, sunrisefootball[.]com)verify cryptocurrency wallet application integrity (e.g., code signing, checksums) before use, monitor for unusual LaunchAgents (e.g., application.com.artificialintelligence) and detached screen sessions, audit /Applications and ~/Library/LaunchAgents for unauthorized modifications, use hardware wallets with physical confirmation for recovery phrase entry, deploy endpoint detection solutions capable of identifying process injection and screen session abuse, educate users on phishing risks, including fake wallet applications and recovery phrase harvesting, block known malicious domains (ovalresponsibility[.]com, wheelchairmoments[.]com, sunrisefootball[.]com)verify cryptocurrency wallet application integrity (e.g., code signing, checksums) before use, monitor for unusual LaunchAgents (e.g., application.com.artificialintelligence) and detached screen sessions, audit /Applications and ~/Library/LaunchAgents for unauthorized modifications, use hardware wallets with physical confirmation for recovery phrase entry, deploy endpoint detection solutions capable of identifying process injection and screen session abuse, educate users on phishing risks, including fake wallet applications and recovery phrase harvesting, block known malicious domains (ovalresponsibility[.]com, wheelchairmoments[.]com, sunrisefootball[.]com)

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Russian-affiliated threat actors exploit GDPR compliance as ransom leverage.,Big-game hunting (BGH) targets large enterprises with high-value data.,Initial access brokers play a critical role in facilitating attacks (1400+ organizations advertised).,Vishing and 'ClickFix' CAPTCHA lures are rising attack vectors.,Violence-as-a-Service (VaaS) introduces physical threats (kidnapping, arson) tied to cyber extortion.,Unmanaged systems and VMware ESXi infrastructure are high-risk targets for ransomware deployment.macOS malware is evolving with modular, updateable designs that bypass traditional detection,application swapping techniques can bypass user scrutiny by replacing trusted software,detached screen sessions and LaunchAgents provide persistent, stealthy execution,phishing pages with BIP-39/SLIP-39 validation increase credibility and harvest success rates,real-time keystroke logging and activity tracking enable immediate exploitation of victims.

References

Where can I find more information about each incident ?

Incident : ransomware LED1832718110325

Source: CrowdStrike 2025 European Threat Landscape Report

Date Accessed: 2025-09-01

Incident : ransomware LED1832718110325

Source: Infosecurity Magazine - 'Ransomware Payouts Surge to $3.6m Amid Evolving Tactics'

Incident : malware LED5093550111925

Source: GBHackers (GBH)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CrowdStrike 2025 European Threat Landscape ReportDate Accessed: 2025-09-01, and Source: Infosecurity Magazine - 'Ransomware Payouts Surge to $3.6m Amid Evolving Tactics', and Source: GBHackers (GBH).

Investigation Status

What is the current status of the investigation for each incident ?

Incident : ransomware LED1832718110325

Investigation Status: ongoing (report published by CrowdStrike; Europol taskforce active for VaaS threats)

Incident : malware LED5093550111925

Investigation Status: ongoing (analysis of artifacts and C2 infrastructure)

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : malware LED5093550111925

Customer Advisories: Users of Ledger Live, Trezor Suite, or Exodus on macOS should verify application authenticity and check for signs of tampering (e.g., unexpected Dock icons, missing original applications).

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Users Of Ledger Live, Trezor Suite, Or Exodus On Macos Should Verify Application Authenticity And Check For Signs Of Tampering (E.G., Unexpected Dock Icons, Missing Original Applications). and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Phishing Attack LED743221223

Entry Point: Phishing email targeting former worker

Incident : ransomware LED1832718110325

Entry Point: Unmanaged Systems, Compromised Credentials, Phishing/Vishing Lures,

Backdoors Established: likely (used for persistent access)

High Value Targets: Large Enterprises (Bgh), Manufacturing, Professional Services, Technology, Cryptocurrency Sector,

Data Sold on Dark Web: Large Enterprises (Bgh), Manufacturing, Professional Services, Technology, Cryptocurrency Sector,

Incident : malware LED5093550111925

Entry Point: malicious shell script (mdriversinstall.sh) downloaded from hxxps://ovalresponsibility[.]com

Reconnaissance Period: ['extensive (mdriversmetrics.sh collects system/app data)']

Backdoors Established: ['persistent LaunchAgent (application.com.artificialintelligence)', 'hidden directory (~/.mdrivers) with updateable scripts', 'detached screen sessions for stealthy execution']

High Value Targets: Cryptocurrency Wallet Users (Ledger, Trezor, Exodus),

Data Sold on Dark Web: Cryptocurrency Wallet Users (Ledger, Trezor, Exodus),

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Phishing Attack LED743221223

Root Causes: Phishing attack on former worker

Incident : ransomware LED1832718110325

Root Causes: Exploitation Of Unmanaged Systems For Lateral Movement., Effective Use Of Vishing And 'Clickfix' Social Engineering Tactics., Initial Access Brokers Providing Scalable Entry Points To Threat Actors., Geopolitical Targeting Of European Firms Due To Gdpr Leverage Opportunities., Inadequate Segmentation Between High-Value And Unmanaged Systems.,

Corrective Actions: Prioritize Patching And Monitoring Of Vmware Esxi And Unmanaged Systems., Develop Specific Playbooks For Violence-As-A-Service (Vaas) Physical Threats., Enhance Dark Web Monitoring For Initial Access Broker Advertisements., Conduct Red Team Exercises Simulating Bgh And Vishing Attacks., Strengthen Cross-Border Collaboration With Europol And Other Leas.,

Incident : malware LED5093550111925

Root Causes: Lack Of Application Integrity Verification On Macos, Abuse Of Legitimate Macos Features (Launchagents, Screen Sessions) For Persistence, User Trust In Dock/Launchpad Icons As Indicators Of Legitimacy, Dynamic Phishing Pages That Adapt To Recovery Phrase Formats (Bip-39/Slip-39),

Corrective Actions: Enhance Macos Application Sandboxing To Prevent Unauthorized Replacements, Improve Detection Of Detached Screen Sessions And Hidden Directories (E.G., ~/.Mdrivers), Develop Behavioral Signatures For Modular Malware Update Mechanisms, Collaborate With Wallet Providers To Implement Tamper-Evident Application Distributions,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Crowdstrike (Threat Intelligence), Europol (Violence-As-A-Service Taskforce), , Recommended: Monitor For Detached Screen Sessions, Unusual Launchagents, And Unsolicited Application Replacements, .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Prioritize Patching And Monitoring Of Vmware Esxi And Unmanaged Systems., Develop Specific Playbooks For Violence-As-A-Service (Vaas) Physical Threats., Enhance Dark Web Monitoring For Initial Access Broker Advertisements., Conduct Red Team Exercises Simulating Bgh And Vishing Attacks., Strengthen Cross-Border Collaboration With Europol And Other Leas., , Enhance Macos Application Sandboxing To Prevent Unauthorized Replacements, Improve Detection Of Detached Screen Sessions And Hidden Directories (E.G., ~/.Mdrivers), Develop Behavioral Signatures For Modular Malware Update Mechanisms, Collaborate With Wallet Providers To Implement Tamper-Evident Application Distributions, .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Authorized Third Party, Unknown hacker, Name: AkiraType: ransomware groupOrigin: likely Russian-affiliatedVictims: 167Name: LockBitType: ransomware groupOrigin: likely Russian-affiliatedVictims: 162Name: RansomHubType: ransomware groupVictims: 141Name: INC RansomwareType: ransomware groupVictims: 133Name: LynxType: ransomware groupVictims: 133Name: SinobiType: ransomware groupVictims: 133Name: Scattered SpiderType: vishing/social engineering groupTargets: M&S, Targets: Co-op Group, Tactics: native-language voice phishingName: The ComType: Violence-as-a-Service (VaaS) groupOrigin: Russia-linkedTactics: physical attacks, Tactics: arson, Tactics: kidnapping, Tactics: extortion, Platform: TelegramName: Renaissance SpiderType: Violence-as-a-Service (VaaS) groupOrigin: Russia-basedTactics: physical attacks, Tactics: cryptocurrency theft and Platform: TelegramName: Initial Access Brokers (260+ actors)Type: cybercriminal intermediariesOfferings: access to 1400+ hacked European organizations.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2020-07-14.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-01.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Email addresses, First and last names, Postal addresses, Phone numbers, , 2100+ victims (92% involved data theft), cryptocurrency wallet recovery phrases (BIP-39/SLIP-39), Trezor Suite IndexedDB files, Exodus wallet configuration (passphrase.json, seed.seco), Ledger Live app.json, installed applications list, running processes, wallet presence indicators and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were Ledger Connect Kit Software and VMware ESXi infrastructure (Linux ransomware)unmanaged systems (used for lateral movement)backup/restore configuration databases (credential dumping) and macOS systems with Ledger Live, Trezor Suite, or Exodus wallets installed.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was crowdstrike (threat intelligence), europol (violence-as-a-service taskforce), .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Postal addresses, Ledger Live app.json, Trezor Suite IndexedDB files, running processes, Email addresses, cryptocurrency wallet recovery phrases (BIP-39/SLIP-39), wallet presence indicators, Phone numbers, 2100+ victims (92% involved data theft), Exodus wallet configuration (passphrase.json, seed.seco), First and last names and installed applications list.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 9.8K.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was real-time keystroke logging and activity tracking enable immediate exploitation of victims.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Train employees on 'ClickFix' CAPTCHA lure tactics and SEO poisoning risks., Update VMware ESXi defenses against Linux-based ransomware strains., use hardware wallets with physical confirmation for recovery phrase entry, block known malicious domains (ovalresponsibility[.]com, wheelchairmoments[.]com, sunrisefootball[.]com), deploy endpoint detection solutions capable of identifying process injection and screen session abuse, monitor for unusual LaunchAgents (e.g., application.com.artificialintelligence) and detached screen sessions, Segment networks to limit lateral movement from compromised unmanaged systems., audit /Applications and ~/Library/LaunchAgents for unauthorized modifications, Implement multi-factor authentication (MFA) and vishing-resistant protocols (e.g., verification callbacks)., Enhance monitoring of unmanaged systems and backup databases to prevent credential dumping., verify cryptocurrency wallet application integrity (e.g., code signing, checksums) before use, Review GDPR compliance postures to mitigate ransomware leverage risks., Engage third-party threat intelligence (e.g., CrowdStrike) for proactive hunting of initial access brokers., educate users on phishing risks, including fake wallet applications and recovery phrase harvesting, Collaborate with law enforcement (e.g. and Europol) to disrupt Violence-as-a-Service (VaaS) networks..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are CrowdStrike 2025 European Threat Landscape Report, Infosecurity Magazine - 'Ransomware Payouts Surge to $3.6m Amid Evolving Tactics' and GBHackers (GBH).

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (report published by CrowdStrike; Europol taskforce active for VaaS threats).

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Users of Ledger Live, Trezor Suite, or Exodus on macOS should verify application authenticity and check for signs of tampering (e.g., unexpected Dock icons and missing original applications).

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Phishing email targeting former worker and malicious shell script (mdriversinstall.sh) downloaded from hxxps://ovalresponsibility[.]com.

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was extensive (mdriversmetrics.sh collects system/app data).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Phishing attack on former worker, Exploitation of unmanaged systems for lateral movement.Effective use of vishing and 'ClickFix' social engineering tactics.Initial access brokers providing scalable entry points to threat actors.Geopolitical targeting of European firms due to GDPR leverage opportunities.Inadequate segmentation between high-value and unmanaged systems., lack of application integrity verification on macOSabuse of legitimate macOS features (LaunchAgents, screen sessions) for persistenceuser trust in Dock/Launchpad icons as indicators of legitimacydynamic phishing pages that adapt to recovery phrase formats (BIP-39/SLIP-39).

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Prioritize patching and monitoring of VMware ESXi and unmanaged systems.Develop specific playbooks for Violence-as-a-Service (VaaS) physical threats.Enhance dark web monitoring for initial access broker advertisements.Conduct red team exercises simulating BGH and vishing attacks.Strengthen cross-border collaboration with Europol and other LEAs., enhance macOS application sandboxing to prevent unauthorized replacementsimprove detection of detached screen sessions and hidden directories (e.g., ~/.mdrivers)develop behavioral signatures for modular malware update mechanismscollaborate with wallet providers to implement tamper-evident application distributions.

cve

Latest Global CVEs (Not Company-Specific)

Description

Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Description

Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.

Risk Information
cvss4
Base: 8.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from 1.0.0 through 2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

Improper Privilege Management vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from v2.9.0 through v2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Description

File upload vulnerability in HCL Technologies Ltd. Unica 12.0.0.

Risk Information
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ledgerhq' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge