April 02, 2026 ChainGPT

Connecticut U.S. Attorney Seizes $600K+ in USDT From Ledger Hardware-Wallet Phishing Scam

Connecticut U.S. Attorney Seizes $600K+ in USDT From Ledger Hardware-Wallet Phishing Scam
Headline: Connecticut U.S. Attorney’s Office Seizes Over $600K in USDT from Ledger Phishing Scam The U.S. Attorney’s Office for the District of Connecticut has recovered and forfeited more than $600,000 in cryptocurrency tied to a phishing scheme that targeted a Ledger hardware wallet user, marking another high-profile digital-asset seizure by federal authorities. What happened - In September 2025, a Connecticut resident who owned a Ledger hardware wallet received a letter purporting to be from “Ledger Security & Compliance,” instructing the recipient to complete a mandatory security check. Following the letter’s instructions allowed scammers to compromise the user’s hardware wallet; roughly $234,000 in crypto was stolen from the victim’s account. - The FBI and Connecticut State Police traced the flow of funds and moved to seize approximately $600,000 in USDT stablecoin. That amount is now the subject of a civil forfeiture complaint alleging the funds were proceeds of wire fraud and money laundering, according to a Department of Justice release. Context: a growing trend of physical phishing - This incident echoes a wider trend in which attackers combine physical mail with online phishing. Recent campaigns have used realistic-looking postal letters—complete with company logos, holograms and QR codes—to direct hardware wallet owners to malicious sites. Cybercrime consultant David Sehyeon Baek told reporters that physical mail “borrows credibility” from the postal system, and that a letter bearing your name and address can make victims much more likely to trust and act on the message. - Hardware wallet manufacturers have endured multiple data exposures that enable targeted scams. Notable incidents include Ledger’s 2020 e-commerce breach that leaked more than one million email addresses and a January 2026 breach at a Ledger e-commerce partner that exposed order data. Trezor has also had customer data leaks, including a 2022 MailChimp insider exploit and a later third‑party support portal breach affecting roughly 66,000 users—events that have helped fuel ongoing phishing campaigns. Wider enforcement activity - The Connecticut forfeiture is part of a recent string of law-enforcement actions against crypto-enabled fraud. Federal authorities sought forfeiture of about $200,000 in USDT tied to a Tinder “pig butchering” scam, while Florida officials seized roughly $1.5 million in Dogecoin, Pepe and Solana tokens in a case involving a Chinese national. Industry response - Decrypt and other outlets contacted Ledger for comment; at the time of reporting the company had not responded. The U.S. Attorney’s Office publicly announced the forfeiture via its social channels on April 1, 2026. Practical takeaways for users - Be skeptical of unsolicited communications—especially physical letters—asking you to perform security checks or scan QR codes. - Never reveal your seed phrase or private keys to anyone, and only follow instructions from official vendor channels (verify via the company’s published contact methods). - When in doubt, contact the hardware wallet vendor directly through verified support pages before taking action. This seizure underscores how physical and digital social-engineering tactics continue to evolve—and how investigators are increasingly able to follow on-chain trails to recover and forfeit illicit proceeds. Read more AI-generated news on: undefined/news