Tether freezes wallet of Ledger library exploiter; Ledger provides more details

Quick Take

  • Tether froze an address with funds stolen by the Ledger code library exploiter.
  • Ledger said its former employee was compromised in a phishing attack.

Tether, the company behind the USDT +0.26% stablecoin, froze the address of an attacker who drained funds from several protocols, Tether CTO Paolo Ardoino wrote on X on Wednesday. 

The address received around $483,000 of various assets, according to wallet analytics site DeBank, including $44,000 in USDT. The wallet also interacted with the AngelDrainer phishing group and sent 4.334 ETH to its wallets.

Tether freezing the wallet means that it can no longer send any USDT in the wallet to other addresses. The wallet is still able to make other transactions.

Researchers earlier reported that Ledger ConnectKit library, a code repository used by the hardware wallet provider Ledger, was hacked and injected with a malicious code draining victims' wallets. As a result, front-ends of various DeFi protocols became vulnerable. 

Kyber and RevokeCash disabled their front-ends and Sushi Swap CTO Matthew Lilley warned users to not interact with any dapps at all on Wednesday morning.

THE SCOOP

Keep up with the latest news, trends, charts and views on crypto and DeFi with a new biweekly newsletter from The Block's Frank Chaparro

By signing-up you agree to our Terms of Service and Privacy Policy
By signing-up you agree to our Terms of Service and Privacy Policy

A patch is out

Ledger wrote on X that the company has already issued a patch now available in the Ledger Connect Kit version 1.1.8. The company said its former employee fell victim to a phishing attack, which enabled the attacker to gain access to their account and add new code.

"The attacker published a malicious version of the Ledger Connect Kit (affecting versions 1.1.5, 1.1.6, and 1.1.7). The malicious code used a rogue WalletConnect project to reroute funds to a hacker wallet," the ledger team wrote, adding that the company was alerted of the incident and deployed a fix within 40 minutes.

"The malicious file was live for around 5 hours, however we believe the window where funds were drained was limited to a period of less than two hours," Ledger wrote, thanking WalletConnect service, Tether, blockchain analytics firm Chainalysis and on-chain sleuth ZachXBT for help.


Disclaimer: The Block is an independent media outlet that delivers news, research, and data. As of November 2023, Foresight Ventures is a majority investor of The Block. Foresight Ventures invests in other companies in the crypto space. Crypto exchange Bitget is an anchor LP for Foresight Ventures. The Block continues to operate independently to deliver objective, impactful, and timely information about the crypto industry. Here are our current financial disclosures.

© 2023 The Block. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

About Author

Anna is a senior policy reporter at The Block. She has a background in political journalism and covered Russian civil society for a range of news outlets in Moscow, including the award-winning newspaper Novaya Gazeta. Before joining The Block, Anna spent the past five years investigating cryptocurrency policies and adoption around the world at CoinDesk. Anna owns bitcoin and a gift NFT of sentimental value.

Editor

To contact the editor of this story:
Nathan Crooks at
[email protected]