- A phishing scam linked to a Ledger Connect Kit exploit is targeting users via Discord and fake Binance support channels.
- Scammers are impersonating support agents and urging users to share sensitive info like passwords and recovery phrases.
- Security experts recommend hardware-based 2FA, strong passwords, and avoiding unverified links to stay protected.
A new phishing scam has emerged in the aftermath of the Ledger Connect Kit exploit, prompting warnings from crypto security experts and Binance founder Changpeng Zhao (CZ). The breach, which affected several Web3 dApps through a compromised front-end library, has now escalated into a broader phishing campaign targeting unsuspecting users.
Notably, a fake Binance support network and a hacked Ledger Discord admin account are central to this expanding threat. Though Binance operations remain unaffected, users face heightened risks due to increasingly sophisticated phishing attempts.
One alarming case involved a message posted by a compromised Ledger Discord admin. The attacker falsely claimed a “recent vulnerability” and urged users to verify their wallet security. Victims were directed to a phishing domain—fake verify-ledger.app changed—and instructed to connect their wallet and input their 24-word recovery phrase. The scam mimicked official Ledger communication, offering a “compensation package” in exchange for completing the fake verification process.
Scammers Exploit Trust Channels Like Discord and Email
The phishing message falsely claimed that user data like addresses, recovery phrases, and transaction history had been leaked. Its urgent tone and appearance in a trusted channel led some users to fall for it, even though Ledger never issued such guidance.
According to CZ, attackers are now also posing as Binance support agents, asking users to hand over login credentials. These impersonators often surface after high-profile security events. They typically approach victims through emails or support chats, where they demand passwords under the guise of technical help.
Essential Tips to Avoid Phishing Scams
Having recognized these threats, CZ encourages users to follow specific precautions. First, they should avoid clicking links sent through email, chat, or social media. Instead they advise users to go to a site by entering its URL or using a reliable link saved as a bookmark.
Second, never reuse passwords across crypto platforms. Instead use unique, strong passwords stored in a reputable password manager which provide stronger protection. These managers not only store credentials securely but also help detect fake domains. If a phishing site mimics a real domain, the manager will not autofill the credentials, offering an early warning sign. Thus, by following these simple steps, users can significantly lower the risk of falling victim to ongoing phishing schemes.
Hardware 2FA: A Strong Shield Against Phishing Attacks
Beyond password practices, hardware-based two-factor authentication (2FA) remains one of the most effective defenses. Devices like YubiKey require a physical action to authorize login attempts, making phishing nearly impossible.
Unlike app-based 2FA, which can be tricked by cloned interfaces, hardware devices function independently. This is because, even with stolen login details, the attacker still cannot go past the second layer unless they have the physical key.
Recent phishing scams, including the Ledger Discord breach and fake Binance support, show how scammers are getting more creative. Though Binance hasn’t been hacked, CZ’s warning stresses staying alert. Using secure logins, careful link checking, and hardware 2FA can keep users safer against these threats.