List of Flash News about hardware wallet security
| Time | Details |
|---|---|
| 16:12 |
Crypto Investor’s Portfolio Drained by Fake Game App: Wallet-Draining Malware Risk and Trading-Safety Checklist
According to the source, a Singapore entrepreneur lost his entire crypto portfolio after installing a fake game that delivered wallet‑draining malware, underscoring elevated operational risk in self‑custody, source: the provided source. For active traders, irreversible on-chain transfers mean losses from compromised wallets cannot be clawed back, making custody hygiene a core part of risk management, source: Ethereum Foundation documentation. Mitigation steps include holding long-term funds on hardware wallets, using small-balance hot wallets for dApps, verifying apps only from official stores, and avoiding sideloaded or unknown installers, source: Ledger Academy security guidelines and Singapore Police Force malware advisories. If compromise is suspected, immediately migrate assets to a new seed on a clean device, revoke token approvals, rotate passwords and 2FA, and conduct malware scans before re-entering markets, source: MetaMask security support and Singapore Police Force advisories. |
|
2025-09-09 02:15 |
NPM Supply Chain Attack: Malicious Code in 1B+ Downloads Swaps Crypto Addresses, Traders Urged to Avoid On-Chain Activity
According to @rovercrc, a compromised NPM account injected malicious code into widely used packages with more than 1 billion cumulative downloads, indicating an active software supply chain attack (source: @rovercrc on X, Sep 9, 2025). The malware reportedly swaps crypto addresses to redirect funds and may also target software wallets, creating direct theft risk during transactions (source: @rovercrc on X, Sep 9, 2025). The source advises hardware wallet users to double-check every transaction before signing and recommends non-hardware wallet users avoid on-chain transactions for now (source: @rovercrc on X, Sep 9, 2025). For traders, this advisory signals heightened operational risk for on-chain executions and wallet interactions until the compromised packages are identified and remediated (source: @rovercrc on X, Sep 9, 2025). |