Bitcoin Forum
September 18, 2025, 02:44:20 PM *
News: Latest Bitcoin Core release: 29.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Data not breached, how were the hackers about to send email?  (Read 120 times)
Oshosondy (OP)
Legendary
*
Offline Offline

Activity: 1946
Merit: 1335


Gamble responsibly


View Profile
September 13, 2025, 10:23:09 PM
Merited by hugeblack (2), The Cryptovator (2)
 #1

Blockstream Green warned its users about phishing attack. The hackers will send emails that Blockstream Jade users should update their firmware. It was a fake email coming from hackers.




Are they sure that no data like email of their customers that bought the hardware wallet device directly from Blockstream website was not leaked?

How were the hackers targeting users email?

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io   Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
Bitcoin_Arena
Copper Member
Legendary
*
Offline Offline

Activity: 2408
Merit: 1911


฿itcoin for all, All for ฿itcoin.


View Profile
September 13, 2025, 10:45:52 PM
 #2

The data could have leaked or not.
Maybe they just got a report from a couple of random users who received the fake message. It doesn't mean blockstream had a data breach.  For example, if there is a CoinMarketCap data breach, the hacker assumes that whoever registered with CoinMarketCap has a high interest in crypto trading, and therefore they could start sending users of Binance exchange phishing messages or something like that.

 
.Winna.com..

░░░░░░░▄▀▀▀
░░


▐▌▐▌
▄▄▄▒▒▒▄▄▄
████████████
█████████████
███▀▀███▀

▄▄

██████████████
████████████▄
█████████████
███▄███▄█████▌
███▀▀█▀▀█████
████▀▀▀█████▌
████████████
█████████████
█████
▀▀▀██████

▄▄
THE ULTIMATE CRYPTO
...CASINO & SPORTSBOOK...
─────  ♦  ─────

▄▄██▄▄
▄▄████████▄▄
██████████████
████████████████
███████████████
████████████████
▀██████████████▀
▀██████████▀
▀████▀

▄▄▄▄

▄▄▀███▀▄▄
▄██████████▄
███████████
███▄▄
▄███▄▄▄███
████▀█████▀███
█████████████████
█████████████
▀███████████
▀▀█████▀▀

▄▄▄▄


.....INSTANT.....
WITHDRAWALS
 
...UP TO 30%...
LOSSBACK
 
 

   PLAY NOW   
nestex_one
Member
**
Offline Offline

Activity: 189
Merit: 14

aka kojagiri


View Profile WWW
September 13, 2025, 11:34:17 PM
 #3

Blockstream Green warned its users about phishing attack. The hackers will send emails that Blockstream Jade users should update their firmware. It was a fake email coming from hackers.




Are they sure that no data like email of their customers that bought the hardware wallet device directly from Blockstream website was not leaked?

How were the hackers targeting users email?

If the email sent by the hackers starts with something like "Dear user" or "Dear client" or suchlike, there's a chance Blockstream's user data was not compromised.

Phishing scammers usually try to make the email as realistic as possible, so they would have used "Dear [your name]" if they had access to that information.

Not saying Blockstream's data wasn't leaked at all; but it's also possible your email id was in some 'list of emails' bundle out there and the phisher got a hold of it.

Learning more about crypto every single day.
TryNinja
Legendary
*
Offline Offline

Activity: 3332
Merit: 8646


♻️ Automatic Exchange


View Profile WWW
September 14, 2025, 03:41:19 AM
Merited by hugeblack (2), ABCbits (1)
 #4

How were the hackers targeting users email?
They could be blindly shooting those emails to every crypto email list they have.

CoinMarketCap, CoinTracker, Ledger, ... just to name a few big crypto websites that had data leaks in the past and have probably been grouped together into a single list. If they know you are a CMC user, they will send you emails about Blockstream's Jade, Trezor, Ledger, etc... beceuase they know there will always be a few hits.

░░░░▄▄████████████▄
▄████████████████▀
▄████████████████▀▄█▄
▄██████▀▀░░▄███▀▄████▄
▄██████▀░░░▄███▀▀██████▄
██████▀░░▄████▄░░░▀██████
██████░░▀▀▀▀▄▄▄▄░░██████
██████▄░░░▀████▀░░▄██████
▀██████▄▄███▀░░░▄██████▀
▀████▀▄████░░▄▄███████▀
▀█▀▄████████████████▀
▄████████████████▀
▀████████████▀▀░░░░
 
 CCECASH 
 
    ANN THREAD    
 
      TUTORIAL      
hugeblack
Legendary
*
Offline Offline

Activity: 3010
Merit: 4275



View Profile WWW
September 14, 2025, 06:30:53 AM
Merited by nestex_one (1)
 #5

So it's always best to use an email provider that allows you to create dozens of aliases that you can freeze, isolate or stop them when such attacks occur (it should be assumed that such data is always leaked).

░░░░▄▄████████████▄
▄████████████████▀
▄████████████████▀▄█▄
▄██████▀▀░░▄███▀▄████▄
▄██████▀░░░▄███▀▀██████▄
██████▀░░▄████▄░░░▀██████
██████░░▀▀▀▀▄▄▄▄░░██████
██████▄░░░▀████▀░░▄██████
▀██████▄▄███▀░░░▄██████▀
▀████▀▄████░░▄▄███████▀
▀█▀▄████████████████▀
▄████████████████▀
▀████████████▀▀░░░░
 
 CCECASH 
 
    ANN THREAD    
 
      TUTORIAL      
The Cryptovator
Legendary
*
Offline Offline

Activity: 2660
Merit: 2372


www.bitz.io


View Profile WWW
September 14, 2025, 01:18:04 PM
 #6

Blockstream Green warned its users about phishing attack. The hackers will send emails that Blockstream Jade users should update their firmware. It was a fake email coming from hackers.

Are they sure that no data like email of their customers that bought the hardware wallet device directly from Blockstream website was not leaked?

How were the hackers targeting users email?
It could be without a data breach as well. Because sometimes I receive some emails where I haven't registered ever. So this would happen from other platforms' data breaches as well. From the breached data some users might use their wallet, so they might be confused by that kind of email. However, even if a data breach happened on the Blockstream website, they might try to hide it. But it's good to see they warned their users about fake emails.

Whatever the reason, we should always update from the website or from the official sources like the Play Store. Even if I receive mail from Ledger, I don't bother to click there. Instead, I visit the office website, not even from a Google search. Then try to update the wallet software.


███████▄▄███▄███▄
███▄▄████████▌██
▄█████████████▐██▌
██▄███████████▌█▌
███████▀██████▐▌█
██████████████▌▌▐
████████▄███████▐▐
█████████████████
███████████████▄██▄
██████████████▀▀▀
█████▀███▀▀▀

▄▄▄██████▄▄▄███████▄▄▄
███████████████████████████
███▌█████▀███▌█████▀▀███████████▄▄▄▄▄▄▄▄
███▌█████▄███▌█████▄███▐███████████████████▄
▐████████████▀███████▄██████████▀▀▀▀▀▀▀▀████▀
▐████████████▄██▄███████████▌█████████▄████▀
▐█████████▀█████████▌█████████████▄▄████▀
██████████▄███████████▐███▌██▄██████▀
██████████████▀███▐███▌██████████████████████
████▀██████▀▀█████████▌███▀▀▀▀███▀▀▀▀▀▀▀████▌
 
      P R E M I E R   B I T C O I N   C A S I N O   &   S P O R T S B O O K      

█▀▀









▀▀▀

▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

  98%  
RTP

 
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

▀▀█









▀▀▀

█▀▀









▀▀▀

▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

 HIGH 
ODDS

 
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

▀▀█









▀▀▀
 
..PLAY NOW..
Z-tight
Legendary
*
Online Online

Activity: 1358
Merit: 1199


Daily Cashbacks 🐳


View Profile
September 14, 2025, 02:11:40 PM
 #7

Phishing emails like this can look so legitimate and the scammers have a high chance of successfully hitting one or two people. So they would not mind randomly sending it to every email address they have gathered from a crypto service breach.

About a week ago a developer was hacked through a 2fa update phishing link and it led to a huge NPM hack. It just goes to show that even the experienced can be pwned sometimes, so we have to be very careful and verify everything.

███████████▄
████████▄▄██
█████████▀█
███████████▄███████▄
█████▄█▄██████████████
████▄█▀▄░█████▄████████
████▄███░████████████▀
████░█████░█████▀▄▄▄▄▄
█████░█
██░█████████▀▀
░▄█▀
███░░▀▀▀██████
▀███████▄█▀▀▀██████▀
░░████▄▀░▀▀▀▀████▀
 

█████████████████████████
████████████▀░░░▀▀▀▀█████
█████████▀▀▀█▄░░░░░░░████
████▀▀░░░░░░░█▄░▄░░░▐████
████▌░░░░▄░░░▐████░░▐███
█████░░░▄██▄░░██▀░░░█████
█████▌░░▀██▀░░▐▌░░░▐█████
██████░░░░▀░░░░█░░░▐█████
██████▌░░░░░░░░▐█▄▄██████
███████▄░░▄▄▄████████████
█████████████████████████

█████████████████████████
████████▀▀░░░░░▀▀████████
██████░░▄██▄░▄██▄░░██████
█████░░████▀░▀████░░█████
████░░░░▀▀░░░░░▀▀░░░░████
████░░▄██░░░░░░░██▄░░████
████░░████░░░░░████░░████
█████░░▀▀░▄███▄░▀▀░░████
██████░░░░▀███▀░░░░██████
████████▄▄░░░░░▄▄████████
█████████████████████████
.
...SOL.....USDT...
...FAST PAYOUTS...
...BTC...
...TON...
examplens
Legendary
*
Offline Offline

Activity: 3780
Merit: 4064


Daily Cashbacks 🐳


View Profile WWW
September 14, 2025, 03:26:32 PM
 #8

It doesn't have to be a leak or any hack. It is enough for one employee to accidentally or intentionally share their passwords/access codes somewhere. When there are similar cases, it is always about a human mistake.
Given that there are only a few phishing emails, an internal investigation may not even be conducted.

███████████▄
████████▄▄██
█████████▀█
███████████▄███████▄
█████▄█▄██████████████
████▄█▀▄░█████▄████████
████▄███░████████████▀
████░█████░█████▀▄▄▄▄▄
█████░█
██░█████████▀▀
░▄█▀
███░░▀▀▀██████
▀███████▄█▀▀▀██████▀
░░████▄▀░▀▀▀▀████▀
 

█████████████████████████
████████████▀░░░▀▀▀▀█████
█████████▀▀▀█▄░░░░░░░████
████▀▀░░░░░░░█▄░▄░░░▐████
████▌░░░░▄░░░▐████░░▐███
█████░░░▄██▄░░██▀░░░█████
█████▌░░▀██▀░░▐▌░░░▐█████
██████░░░░▀░░░░█░░░▐█████
██████▌░░░░░░░░▐█▄▄██████
███████▄░░▄▄▄████████████
█████████████████████████

█████████████████████████
████████▀▀░░░░░▀▀████████
██████░░▄██▄░▄██▄░░██████
█████░░████▀░▀████░░█████
████░░░░▀▀░░░░░▀▀░░░░████
████░░▄██░░░░░░░██▄░░████
████░░████░░░░░████░░████
█████░░▀▀░▄███▄░▀▀░░████
██████░░░░▀███▀░░░░██████
████████▄▄░░░░░▄▄████████
█████████████████████████
.
...SOL.....USDT...
...FAST PAYOUTS...
...BTC...
...TON...
TryNinja
Legendary
*
Offline Offline

Activity: 3332
Merit: 8646


♻️ Automatic Exchange


View Profile WWW
September 14, 2025, 09:34:50 PM
 #9

So it's always best to use an email provider that allows you to create dozens of aliases that you can freeze, isolate or stop them when such attacks occur (it should be assumed that such data is always leaked).
Another option for most people who uses Gmail is to use the + sign after your email which delivers the email to your main email and can be identified.

For example:

hugeblack@gmail.com -> hugeblack+blockstream@gmail.com

If the leak is from blockstream, you'll see the phishing emails coming from the above email.

You can't disable them to stop the incoming spam, though... so your option is better if the provider supports it.

░░░░▄▄████████████▄
▄████████████████▀
▄████████████████▀▄█▄
▄██████▀▀░░▄███▀▄████▄
▄██████▀░░░▄███▀▀██████▄
██████▀░░▄████▄░░░▀██████
██████░░▀▀▀▀▄▄▄▄░░██████
██████▄░░░▀████▀░░▄██████
▀██████▄▄███▀░░░▄██████▀
▀████▀▄████░░▄▄███████▀
▀█▀▄████████████████▀
▄████████████████▀
▀████████████▀▀░░░░
 
 CCECASH 
 
    ANN THREAD    
 
      TUTORIAL      
nestex_one
Member
**
Offline Offline

Activity: 189
Merit: 14

aka kojagiri


View Profile WWW
September 14, 2025, 09:43:07 PM
Merited by hugeblack (2), ABCbits (1), TryNinja (1)
 #10

For example:
hugeblack@gmail.com -> hugeblack+blockstream@gmail.com

If the leak is from blockstream, you'll see the phishing emails coming from the above email.

You can't disable them to stop the incoming spam, though... so your option is better if the provider supports it.


Gmail does have rules/filters to block incoming email based on a + alias, so this can actually work

Learning more about crypto every single day.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!