Ultimate Resource On Trezor Hardware Wallets (#GotBitcoin)
Be careful, buy only from Trezor Shop or authorized resellers. Ultimate Resource On Trezor Hardware Wallets (#GotBitcoin)
However, in recent weeks, we have discovered something more startling. A one-to-one copy of Trezor One. In other words, a fake Trezor device, manufactured by a different, unknown vendor.
While Trezor clones are marketed under a different name, manufactured by (legitimate) legal companies, allowing you to distinguish them from the original, a fake Trezor tries to replicate the original to the bone. It seeks to be as indistinguishable from the original as possible. It is not dissimilar to counterfeit brand clothing.
Similarly to clothing fakes, a fake Trezor One is often sold at a steep discount. This should act as the first red flag. Others will be described below.
More importantly though, let’s have a look at why fake Trezor devices can be a severe threat to your security. As we did not manufacture the device, we cannot guarantee its function. These fake devices are thus unsuitable for secure storage of cryptocurrencies and other digital assets.
You would not entrust your money to somebody who has already cheated you by selling you a different product than you thought you were buying. We, therefore, recommend not to use this device and report it to us, which would help us fight these scams and provide you with a legitimate device.
As soon as we learned about the existence of Trezor fakes, we have started to fervently pursue a number of legal and other steps to prevent those fakes from being produced and distributed, in order to protect you, our customers.
How to check if your device is genuine.
We are warning our customers about the hologram when logging for the first to the wallet.trezor.io.
If you suspect you have bought a fake Trezor One device, do not use the device and contact our support immediately.
Original Trezor One holographic seal (above) in contrast with fake holographic seal (below)
How to shop for a genuine Trezor One device.
The simplest way to procure your genuine Trezor One is to buy it at the official Trezor shop, official Amazon shop or from official resellers. Be very cautious when buying on other marketplaces, such as eBay, Taobao, AliExpress, unknown Amazon resellers or other places. If you are not sure about the authenticity of the seller or the channel, always proceed with the official channels. You can find more information about the security elements both for Trezor One and Trezor Model T on our Wiki.
When It Comes To Your Coins, Keep It Quiet
Have you ever heard the saying “Silence is golden”? In the context of cryptocurrencies, being quiet about your funds will not bring you gold, but it might just save your coins.
Beware of stranger danger.
Let’s suppose that you have invested a lot of money in cryptocurrencies, or that your investments have paid off and your cryptocurrency funds have multiplied.
Obviously, you are pleased about it, and you want to share your success story with other people, so you post a comment about it on Facebook or Reddit.
A random reader of your post might then decide that he or she really wants your riches and starts using a variety of malicious tactics to get them. These might include cyber attacks or even physical violence. (You would be surprised how much information can be mined from your social media, including your physical location.)
Use Common Sense
In the offline face-to-face world, a bit of restraint might come in handy as well.
It is easy to have a few beers and start to be a bit more talkative. Making friends is great, but the contents of your Trezor wallet might not be the best topic to begin with, just like you wouldn’t talk to everyone about your regular bank account balance or your salary.
Don’t Be An Easy Target
Trezor hardware wallet, One or Model T, is a perfectly safe, cryptographically protected place for your coins and keys.
However, keeping a low profile will protect you from other people even trying to steal your funds or harm you. Physical violence or blackmail are things even Trezor cannot protect you from.
What to avoid?
While publicly advocating the benefits of crypto is perfectly fine, boasting about how much you actually own might not be a good idea.
Avoid talking about your account balances with people you do not trust. (Sometimes, you should keep quiet even with people you trust.)
Avoid posting about your personal funds on social media and on internet forums.
Never ever post your recovery seed online or show it to anybody else.
Use a fresh receiving address for your incoming transactions. If not careful, your address may be used to track your balance and transaction history.
Phishing Attacks Used To Steal Your Coins
Ever since the dawn of the internet, there has been a type of malicious activity almost immune to technological advancement in cybersecurity — social engineering. Nowadays, the target of these practices can be even you and your cryptocurrencies.
Phishing is a type of attack which relies on the fallibility of human judgment and perception. Phishing, the most widespread form of attack, is regularly used to extract sensitive data such as credit card numbers, SSN, passwords, and other confidential information from unknowing users online by letting them submit this information directly to the attacker.
Trust Your Device
Your internet browser and software wallets are often susceptible to malware and tricks implemented to mislead you or lure out information which should never get online. Your Trezor device, however, stays offline and is isolated from these attempts to misdirect you. The fundamental purpose of your Trezor device is to keep your recovery seed isolated. You should always look at your device for confirmation of all operations, especially when working with your recovery seed. Your computer should never require the use of your seed without the device knowing it.
Moreover, if you ever need to use the recovery seed to access your accounts, the device will always instruct you to enter the words in a shuffled order. We recommend entering the words of your seed directly on the device to maximize the safety of this operation.
There is a variety of phishing techniques which could be used to carry out an attack. In this article, we offer you some basic knowledge and tips on how to protect yourself against these kinds of malicious attempts.
The Impersonation technique is one of the fastest to carry out and technologically simplest to implement. The attacker usually impersonates a Customer Service agent or Sales representative and tries to lure sensitive information from an unaware user using emails, phone communication or a spoofed website.
Trezor (SatoshiLabs) representatives will never ever ask for your recovery seed (in any form) or a credit card number.
If you ever have a problem with your device or have some questions about Trezor-related issues, be sure to reach out to us only by submitting a ticket in our Support Center.
We do not provide phone call or live technical support. Do not call numbers who claim to be associated with the Trezor Support team.
Many phishing techniques aim to get you to a fraudulent site where all inputs are collected and controlled by the attacker. Similarly to the impersonation techniques, these are also designed to rob you of your private keys.
DNS poisoning technique takes advantage of how the Domain Name System works and sends the visitor off in the wrong direction, making the site appear to be offline or even redirecting users to a server the attacker controls. On the other hand, BGP hijacking is a process of taking control of a group of IP prefixes assigned to a potential victim. Both methods can be identified by an invalid SSL certificate, but users can skip the warning very quickly, leading them to the malicious site. It is, therefore, crucial to be wary of all signs, especially when working with something as important as cryptocurrencies.
The Unicode domain phishing attack, also known as IDN homograph attack, relies on the fact that the affected browsers show Unicode characters used in domain names as ordinary characters, making them virtually impossible to separate from legitimate domains. If an attacker can register a domain that is visually indistinguishable from a legitimate one, he can trick users into trusting the site.
Cybersquatting refers to illegal domain name registration or use. It can have many different forms, but its primary purpose is to steal or misspell a domain name. Cybersquatting can also include advertisers who mimic domain names that are similar to famous, highly trafficked websites.
Never enter your recovery seed online in a straight sequence and never disclose the order of the words.
Trust your device. Look for confirmation on the screen, especially when it involves transactions or your recovery seed.
Make sure the URL is exactly: https://wallet.trezor.io (or https://beta-wallet.trezor.io). Although the “Secure” https lock may not be a guarantee of the authenticity of the website, be alarmed if it is missing.
* Carefully Observe The Website Addresses And Watch Out For Any Misspellings Or Odd Characters.
* Bookmark The https://wallet.trezor.io To Avoid Misspelling It In The Address Bar Of Your Browser.
* Use Updated Security Software, Install Security Patches And Updates As They Are Made Available.
* Avoid Clicking On Links In An Email Or Social Media Unless You Are Absolutely Sure That It Is Authentic. (Hover Above The Links To See The Url Before Clicking On It And Then Enter The Url By Yourself.).
* Pay Particularly Close Attention To Shortened Links, Especially On Social Media.
* Be Vigilant. Do Some Research First Before You Decide To Trust A Third-Party Service With Your Sensitive Information (Even Your Xpub).
SatoshiLabs Rolls Out Bitcoin-Only Firmware for Trezor Wallets
SatoshiLabs, the Prague-based manufacturer of hardware cryptocurrency wallets Trezor, released a beta version of its new firmware that supports Bitcoin (BTC) exclusively.
“Orange Coin Good!”
According to the blog post published on Sept. 9, SatoshiLabs’ new BTC firmware is now available to download for both Trezor One and Trezor Model T.
The company also noted that it aims to introduce a “stable version” of Bitcoin-only firmware in the next month’s release, adding:
“From now on, we will be producing four different versions of firmware — regular (full altcoin support + U2F/WebAuthn) and Bitcoin-only, for both Trezor One and Model T. […] We have created a customized version of both our firmware and Wallet designed for everyone who supports the idea of Bitcoin. Every Bitcoin maximalist can now enjoy the Wallet interface with nothing else but Bitcoin.”
Firmware For Bitcoin Maximalists
Per the announcement, to install the new firmware, users will require Trezor Model T (version 2.1.0 or newer) or Trezor One, access to Trezor Beta Wallet or trezorctl, and a correct firmware installation file.
As Cointelegraph reported on March 11, Trezor’s direct competitor — major hardware crypto wallets manufacturer Ledger — disclosed five reported vulnerabilities in Trezor One and Trezor Model T.
In response, Trezor later claimed that none of the weaknesses revealed by Ledger are “critical” for hardware wallets. It was stated that none of them can be exploited remotely, as the attacks described require “physical access to the device, specialized equipment, time, and technical expertise.”
Trezor Wallets Can Be Hacked, Kraken Reveals
Kraken Security Labs revealed on Jan 31. that Trezor hardware wallets and their derivatives can be hacked to extract private keys. Though the procedure is quite involved, Kraken claims that it “requires just 15 minutes of physical access to the device.”
The attack requires a physical intervention on the Trezor wallet by either extracting its chip and placing it on a special device or soldering a couple of critical connectors.
The Trezor chip must then be connected to a “glitcher device” that would send it signals at specific moments. These break the built-in protection that prevents the chip’s memory from being read by external devices.
The trick allows the attacker to read critical wallet parameters, including the private key seed.
Though the seed is encrypted with a PIN-generated key, the researchers were able to brute force the combination in just two minutes.
The vulnerability is caused by the specific hardware used by Trezor, meaning that the company cannot easily fix it. It would need to completely redesign the wallet and recall all existing models.
In the meantime, Kraken urged Trezor and KeepKey users to not allow anyone to physically access the wallet.
In a coordinated response published by Trezor, the team minimized the impact of the vulnerability. The company argued that the attack would show visible signs of tampering due to the need to open the device, while also noting that the attack requires extremely specialized hardware to perform.
Finally, the team suggested users activate the wallet’s passphrase feature to protect from such attacks. The password is never stored on the device as it is added to the seed to generate the private key on the fly. Kraken also noted that this is a viable alternative, though researchers referred to it as “a bit clunky to use in practice.”
The feature also adds significant responsibility to each user. The passphrase needs to be complex enough to not be easily brute forced as well, and forgetting it would completely lock users out of their money.
Cointelegraph reached out to Kraken for additional details, but had not received a response as of press time. The article will be updated as more information becomes available.
Ledger Reignites Trezor Beef With ‘Dishonest’ Report on Crypto Wallet Hardware
Cryptocurrency hardware wallet manufacturer Ledger has reignited an old feud with competitor Trezor, in a blog post dated Feb. 13 highlighting the claimed benefits of its internal Secure Element chips. Trezor co-founder and CEO of SatoshiLabs, Marek “Slush” Palatinus, hit straight back, in a tweet accusing the post of being “dishonest” and not telling the “whole story.”
The Ledger post compared the three internal chip types common to hardware wallet devices: Microcontroller Units (MCU), Safe Memory chips and its own Secure Elements.
It claimed that the MCUs found in Trezor wallets were intended for general devices such as microwaves and TV remotes, and had no embedded countermeasures against physical security attacks.
Furthermore, it stated that Safe Memory chips, used in certain other manufacturers’ hardware wallets, were not third-party tested, and were vulnerable to side-channel attacks as the private keys were passed to the MCU.
Only part of the story
Palatinus retweeted the post, claiming that Ledger was being “dishonest” and “point[ing] out only part of the whole story.”
A non-disclosure agreement (NDA) for Secure Elements chip vendors prevents wallet manufacturers from discussing security issues, according to the tweet:
“Trezor is using nonNDA chips so we can be fully transparent and act in your best interest.”
Palatinus promised to talk more about the implications of NDAs to end-user security at the Bitcoin 2020 conference in March.
Ledger previously clashed with Trezor last March, when it published a report disclosing five supposed vulnerabilities in Trezor hardware wallets.
As Cointelegraph reported, Trezor was quick to respond, pointing out that none of the vulnerabilities were critical for hardware wallets. Furthermore, none of the weaknesses could be exploited remotely, with all requiring physical access to the device.
Things seemed to have calmed down since then, but with this latest post, Ledger may well have reignited an old beef.
Public Service Announcement. Non-genuine,Public Service Announcement. Non-genuine,Public Service Announcement. Non-genuine,Public Service Announcement. Non-genuine,Public Service Announcement. Non-genuine,Public Service Announcement. Non-genuine,Public Service Announcement. Non-genuine,Public Service Announcement. Non-genuine,
Trezor Claims New “Phishing Proof” Desktop Wallet
The desktop app reportedly provides “more robust protection” than Trezor’s browser-based wallet.
Crypto wallet provider Trezor has launched a new desktop app called Trezor Suite for its hardware wallet.
According to an Oct. 14 blog post, Trezor’s parent company Satoshi Labs claimed its desktop app provides “more robust protection” than its browser-based wallet, and said they have eliminated the risk of phishing attacks that often target crypto users.
“People have the right to privacy and security online but few know how to achieve it,” stated the Trezor blog. “Using Trezor Suite should help everyone take full advantage of Bitcoin more easily and open the door to a more privacy-aware, crypto-competent, and self-sovereign society.”
Hardware wallets — despite being commonly used as a cold storage method — aren’t exempt from data breaches. In January, Kraken Security Labs showed that hackers could extract private keys from a Trezor hardware wallet with just 15 minutes of physical access to the device.
There has been fierce competition among major cryptocurrency wallet providers, with data security often at the forefront of the discussion. Cointelegraph reported in September that hackers had been targeting users on Electrum — a Bitcoin hot wallet — in phishing scams resulting in the loss of millions of dollars. Ledger, another hardware wallet provider, confirmed a data breach in June that compromised more than one million user email addresses.
Trezor noted that its desktop app would be in public beta until January, at which time its old browser-based Trezor Wallet would be deprecated.
Spanish Lawmakers Get Cryptocurrency In A Bid To Promote Industry
All 350 members of Spain’s lower house got 1 euro equivalent in cryptocurrency, and it’s not a donation.
Members of Spain’s lower house of Congress saw a surprise in their inboxes, the equivalent of 1 euro in crypto.
As reported by Spanish news outfit ABC, the plan is spearheaded by Tutellus, a decentralized platform looking to tokenize education technology, and the Blockchain Observatory. The project aims to promote the use of cryptocurrencies in the country.
All 350 members of Spain’s lower house, or the Congress of Deputies, received the equivalent of 1 euro in cryptocurrency in their emails. Miguel Caballero, Tutellus founder, said the goal is to raise awareness about the future role of cryptocurrencies in society:
“We have explained to your honorable members that we are in a time of profound change in the use of money, in addition to highlighting the important role that cryptocurrencies have today.”
Caballero said the cryptocurrency “is not a donation” and acknowledged that some congress members might be more familiar with crypto. But for those who no experience with cryptocurrencies yet, Caballero said, this is an opportunity to learn more.
Spain is not the first country to send cryptocurrencies to lawmakers. The political action committee (PAC) of the Chamber of Digital Commerce sent $50 worth of Bitcoin to all 541 members of Congress in early October, reported Decrypt.
Spanish banks have been more interested in cryptocurrencies and blockchain in the past few years. Santander partnered with Ripple for a blockchain-based payments platform while the Banco Bilbao Vizcaya Argentaria (BBVA) launched a study to explore zero-knowledge proofs and other cryptographic techniques.
The European Central Bank also announced it would look into a digital euro by 2021 and released a report diving into its possible impact on the retail market.
Trezor Crypto Wallet Warns Users Of Doppelgänger Scam App On Google Play
The fake Trezor app has been downloaded by at least 1,000 people on the Android’s app store Google Play.
Trezor, a major hardware cryptocurrency wallet supplier, has warned its users about a fake Trezor application on Google Play.
According to Trezor, the fake app is malicious and has no relation to Trezor or SatoshiLabs, a company that created the Trezor wallet. Announcing the news on Jan. 18, Trezor asked its clients to not install the malicious application, reminding users that they should never share their seed phrase with anyone.
This app is malicious and has no relation to Trezor or SatoshiLabs. Please, don’t install it.
Remember that you should never share your seed with anyone until your Trezor device asks you to do it! pic.twitter.com/6C3iKfPDnR
— Trezor (@Trezor) January 18, 2021
Trezor also provided its users with a short manual on using Trezor wallet with Android. In the manual, the company listed major third-party Trezor apps including Mycelium, Sentinel or Walleth.
At publishing time, the malicious app is still available on Google Play. As of Jan. 18, the app was reportedly downloaded more than 1,000 times. The doppelgänger app also has about 200 reviews on the app store, with the majority warning that it is a scam. “This app is a scam. Never enter your recovery phrase in anything except an official hardware Trezor. Anyone that asks for this phrase (besides a physical Trezor) is trying to scam you),” one supposed user wrote.
Trezor did not immediately respond to Cointelegraph’s request for comment.
This is not the first time that a fake app has been listed on Google Play. In May 2019, Cointelegraph reported on a malicious Google Play app imitating Trezor wallet. The app was found by ESET antivirus researchers, who said that they expect more crypto scam apps to enter the Android store as the crypto market grows.
Online scammers have been targeting other popular crypto companies to impersonate their apps on Google and steal money from users. In May 2020, a cybersecurity researcher discovered 22 malicious Google Chrome extensions imitating crypto services like Trezor’s rival Ledger and major Ether (ETH) wallet MetaMask.
Engineer Hacks Trezor Wallet, Recovers $2M In ‘Lost’ Crypto
Hacker helps Trezor One owner who forgot his wallet passcode and seed phrase to recover cryptocurrency funds valued over $2 million.
A computer engineer and hardware hacker has revealed how he managed to crack a Trezor One hardware wallet containing more than $2 million in funds.
Joe Grand — who is based in Portland and is also known by his hacker alias, Kingpin — uploaded a Youtube video explaining how he pulled off the ingenious hack.
After unsuccessfully trying to guess the security PIN 12 times, they decided to quit before the wallet automatically wiped itself after 16 incorrect guesses.
But with their investment growing to $2 million this year, they redoubled their efforts to access the funds.
Without their wallet’s seed phrase or PIN, the only way to retrieve the tokens was through hacking.
They reached out to Grand who spent 12 weeks of trial and error but eventually found a way to recover the lost PIN.
The key to this hack was that during a firmware update, the Trezor One wallets temporarily move the PIN and key to RAM, only to later move them back to flash once the firmware is installed.
Grand found that in the version of firmware installed on Reich’s wallet, this information was not moved but copied to the RAM, which means that if the hack fails and the RAM is erased, the information about the PIN and key would still be stored in flash.
After using a fault injection attack — a technique that alters the voltage going to the chip — Grand was able to surpass the security the microcontrollers have to prevent hackers from reading RAM, and obtained the PIN needed to access the wallet and the funds. Grand explained:
“We are basically causing misbehavior on the silicon chip inside the device in order to defeat security. And what ended up happening is that I was sitting here watching the computer screen and saw that I was able to defeat the security, the private information, the recovery seed, and the pin that I was going after popped up on the screen.”
According to a recent tweet from Trezor, this vulnerability, which allows the pin to be read from the wallet’s RAM, is an older one that has already been fixed for newer devices. But unless changes are made to the microcontroller, fault injection attacks still can pose a risk.
Trezor Removes Controversial Address Verification Protocol, Other Wallets Follow Suit
One week after introducing the Address Ownership Proof Protocol, or AOPP, the hardware wallet company backtracked on its decision due to customer privacy concerns.
Since 2019, Swiss financial crypto intermediaries have required proof of ownership of an external wallet’s address for Bitcoin withdrawals and deposits to their customers’ non-custodial wallets. One automated mechanism used for this is the Address Ownership Proof Protocol, or AOPP.
The Trezor hardware wallet introduced AOPP signing as part of its latest January update last week, allowing users to generate signatures that conform to the AOPP standard used in certain jurisdictions. On Jan. 28, Trezor announced that it will remove this protocol in the next Trezor Suite update “after careful consideration of recent feedback.”
Recent feedback refers to Reddit and Twitter users who were concerned that the use of AOPP signaled Trezor’s support for greater regulation and a disregard for a potential loss of privacy.
We will remove AOPP in our next Trezor Suite update in February.
More on our decision: https://t.co/hMDenbdjcg
— Trezor (@Trezor) January 28, 2022
In a blog post explaining the removal, Trezor admitted it “underestimated how this feature would be received,” but that the company “welcomes public scrutiny.” The fact that it listened to its users and reacted so quickly demonstrates the power of social media sentiment.
The hardware wallet maker claimed it is against the regulations that concern AOPP, namely the data leak risks associated with using a stringent identification process like Know Your Customer, or KYC, to buy Bitcoin. The company clarified its intent:
“Our sole aim was to make withdrawal to self-custody easier for users in countries with strict regulation, but we acknowledge that more harm than good could be done in the end if this were viewed as proactive compliance with regulations we do not agree with.”
Other hardware wallets such as Sparrow Wallet, Samourai Wallet and BlueWallet have also decided to follow Trezor and remove the automated protocol.
Congrats to these projects for strength & resolve to listen to the community. Congrats to the community who successfully made their desires known https://t.co/RuqnxgbJfu
— Samourai Wallet (@SamouraiWallet) January 28, 2022
While the AOPP protocol may not directly or negatively impact users of non-custodial wallets, decentralization and freedom are central tenets to the crypto community who values privacy. The main concern is that the implementation of AOPP may set a precedent for increased government influence and surveillance.
Trezor Investigates Potential Data Breach As Users Cite Phishing Attacks
Numerous users on Twitter alarmed Trezor of an ongoing email phishing campaign specifically targeting Trezor users via their registered email addresses.
Cryptocurrency hardware wallet provider Trezor has begun investigating a possible data breach that may have compromised users’ email addresses and other personal information.
Earlier on Sunday, several users from the Crypto Twitter community warned about an ongoing email phishing campaign specifically targeting Trezor users via their registered email addresses.
Hey trezor, are you aware of a phishing campaign going on? I just received this email with my actual email on it. It looked very legit. pic.twitter.com/GF0Od6llr2
— josearkaos ⚡️ (@josearkanos) April 3, 2022
In the ongoing attack, several Trezor users have been contacted by unauthorized actors posing as the company — with the ultimate intention to steal funds by misleading unwary investors. As part of the attack, users received an email about downloading an application from the “trezor.us” domain, which is different from the official Trezor domain name, “trezor.io.”
We are investigating a potential data breach of an opt-in newsletter hosted on MailChimp.
A scam email warning of a data breach is circulating. Do not open any email originating from firstname.lastname@example.org, it is a phishing domain.
— Trezor (@Trezor) April 3, 2022
Trezor initially suspected that the compromised email addresses belong to a list of users who opted-in for newsletters, which was hosted on an American email marketing service provider Mailchimp.
Wow, @Trezor, this is the best phishing attempt I have seen in the last few years. I am really lucky I don’t have Trezor, because if I had, I would probably actually download that update. pic.twitter.com/DaBN2Oix11
— Tomáš Kafka (@keff85) April 2, 2022
Through Further Investigation, Trezor Announced:
“MailChimp have confirmed that their service has been compromised by an insider targeting crypto companies.”
While Trezor officially investigates to identify the total number of stolen email addresses, users are advised not to click on links coming from unofficial sources until further notice.
On March 19, New Jersey-based crypto financial institution BlockFi proactively confirmed a data breach to warn investors about the possibility of phishing attacks.
Regarding recent third-party data incident: pic.twitter.com/50z7IrQ1za
— BlockFi (@BlockFi) March 19, 2022
As Cointelegraph reported, hackers gained access to BlockFi’s client data that was hosted on Hubspot, a client relationship management platform. According to BlockFi:
“Hubspot has confirmed that an unauthorized third-party gained access to certain BlockFi client data housed on their platform.”
While specifics on the breached data are yet to be identified and revealed, BlockFi reassured users by highlighting that personal data — including passwords, government-issued IDs and social security numbers — “were never stored on Hubspot.”
Intuit Sued Over Hack That Led To Theft Of Cryptocurrencies
* Trezor Users Fell Victim To Phishing Attack, According To Suit
* Illinois Man Claims He Lost $87,000 Worth Of Cryptocurrencies
Intuit Inc. was sued for failing to secure its email marketing service, which allegedly allowed hackers to steal cryptocurrencies from Trezor users.
Using a sophisticated phishing attack, hackers were earlier this month able to access cryptocurrency wallets sold by the Czech company Trezor, according to the lawsuit, filed Friday in federal court in San Jose.
Intuit’s Mailchimp email marketing service revealed on April 4 that hackers had penetrated its servers and harvested the “audience data” from 102 of its clients, including Trezor, according to the suit.
Using the data, the hackers sent phishing emails to Trezor users, warning them — falsely — that their accounts had been compromised and advising them to download a new version of what they claimed was the Trezor app, according to the suit. The phony app prompted users for their passwords and recovery codes, which the hackers used to clear out their digital wallets.
Intuit declined to comment on the lawsuit.
Alan Levinson, an Illinois man who filed the suit, said the hackers took cryptocurrencies worth $87,000 from his account.
The proposed class-action suit faults Intuit and its subsidiary Rocket Science Group LLC, which operates Mailchimp, but not Trezor. Intuit is accused of disregarding the rights of Trezor account holders by “failing to take adequate and reasonable measures to ensure that its data systems were protected.”
The hackers reportedly gained access to Mailchimp’s email accounts when one of its employees clicked on a malicious link in an email, according to the suit.
“Defendants fell victim to one of the oldest cybertricks in the book,” Levinson claims in the lawsuit.
The suit is Levinson v. Intuit, Inc., 22-cv-02477, in U.S. District Court, Northern District of California (San Jose.)
TurboTax Owner Intuit To Pay $141 Million Over ‘Deceptive’ Marketing Allegations
Software company to send check to nearly 4.4 million users; Intuit didn’t admit to wrongdoing in settlement.
Intuit Inc. agreed to pay $141 million to settle allegations its TurboTax software deceived low-income Americans into paying to file their taxes when they actually qualified to file for free.
As part of the settlement agreement, which was signed Wednesday by attorneys general in all 50 states and Washington, D.C., Intuit will send checks to nearly 4.4 million users who were affected. They will receive about $30 for each year they paid for services from 2016 to 2018. Customers who were affected will automatically receive notices in the mail.
Intuit said in a blog post Wednesday that it didn’t admit to wrongdoing and agreed to pay $141 million to put the matter behind it.
Shares of Intuit fell 2.6% to $419.54 Wednesday morning.
New York Attorney General Letitia James said her office opened an investigation into Intuit after a ProPublica story reported that the company was using deceptive digital tactics to steer low-income tax filers away from the federal free services they qualified for and toward TurboTax’s paid services.
The investigation led by Ms. James found that Intuit paid for online search ads that confused customers, sending those searching for the Internal Revenue Service’s free filing service toward TurboTax’s paid service. It also said TurboTax’s website never displayed or recommended the free filing program from the IRS, even though it promised to find them the right solution. Ms. James said 70% of taxpayers qualify for free filing through the IRS.
“Intuit cheated millions of low-income Americans out of free tax filing services they were entitled to,” said Ms. James. “This agreement should serve as a reminder to companies large and small that engaging in these deceptive marketing ploys is illegal.”
As part of the settlement, the Mountain View, Calif.-based software company was also ordered to pull its “free, free, free” advertising campaign, which allegedly promises free tax preparation services to customers only to later charge the majority of them after they have already inputted their personal and financial information.
The Federal Trade Commission also sued the company in March for misleading advertising. The agency asked a U.S. district court to stop Intuit from advertising that TurboTax users can file their taxes for free, saying that in many cases people don’t qualify for TurboTax’s free filing and are instead pushed to pay for services. Intuit said at the time that the FTC’s allegations weren’t credible.
Intuit said at the time that the FTC’s allegations weren’t credible and that it would challenge the complaint.
U.S. District Judge Charles Breyer last month denied the FTC’s request to stop the ads, saying Intuit had already stopped airing some of the ads.