Ledger Data Breach Strikes Again — Customer Names and Contact Details Exposed in Latest Security Failure
Ledger's security woes deepen as another breach spills customer data—names, emails, and physical addresses now floating in the digital ether.
Another week, another crypto security headache. The hardware wallet giant confirms its systems were compromised—again—exposing sensitive customer information. No funds were stolen this time, but the privacy violation hits hard for users who paid premium prices for 'bank-grade' security.
What Actually Leaked?
Customer names, email addresses, phone numbers, and shipping addresses—enough for targeted phishing campaigns and real-world harassment. The breach stems from a third-party vendor's compromised system, a familiar refrain in crypto's ongoing security theater.
The Pattern Emerges
This isn't Ledger's first rodeo. Remember the 2020 breach? Over a million email addresses leaked. The company's response then—and now—follows the same script: acknowledge, apologize, promise improvements. Meanwhile, users bear the risk.
Self-Custody Irony
Hardware wallets sell themselves on taking control away from centralized exchanges. Yet here's Ledger—a centralized company—becoming the single point of failure. The very institution meant to replace banks now mimics their data-breach tendencies.
Security in crypto remains a brutal game of whack-a-mole. Each fix reveals three new vulnerabilities. Ledger's latest stumble reminds us: in digital asset storage, there are no safe havens—only varying degrees of risk. Maybe that's the real decentralized finance—spreading the risk around until everyone gets hacked equally.
Ledger Breach Raises Phishing Concerns Despite No Wallet Impact
ZachXBT reported that victimized customers were sent an email informing them that Global-e had noticed suspicious activity in some part of its cloud environment.
The payment company claimed that it was fast enough to lock down and take control of its systems after it detected the problem and contracted external forensic investigators.
No indication was given that there was an exposure of payment card details, passwords, recovery phrases, and wallet private keys.
so Ledger's payment processor Global-e got breached and name & contact information were leaked (none of the payment information fortunately but it doesn't make it better). This is all fucking insane – everything you do online will be fucking leaked one day, so don't use your real… pic.twitter.com/95QVR7zlO5
— sudo rm -rf –no-preserve-root / (@pcaversaccio) January 5, 2026Ledger stated in the email that the intrusion was at the level of a third-party partner and not in the fundamental security of its hardware wallets.
While funds remain safe, security researchers and community members warned that the exposure significantly increases the risk of targeted phishing and social engineering attacks, particularly given Ledger’s history.
This latest incident comes at a sensitive time for crypto security. It follows days after Trust Wallet users suffered unauthorized fund outflows linked to a compromised browser extension and days after attackers targeted MetaMask users in coordinated wallet-draining attempts.
Multiple Trust Wallet users experienced unauthorized fund outflows on Thursday due to a new browser extension theft. Losses are estimated to surpass $6 million.#TrustWallet #CryptoTheft #TrustWalletThefthttps://t.co/mchzwWAHK3
Although unrelated technically, the clustering of incidents has heightened user anxiety across the ecosystem.
Ledger’s name carries particular weight in data breach discussions due to the severe fallout from its 2020 e-commerce and marketing database leak.
That breach exposed roughly 1.1 million email addresses and detailed personal information, including home addresses and phone numbers, for about 292,000 customers.
The data was later dumped publicly, leading to years of persistent phishing campaigns, extortion attempts, and even reports of physical threats against known crypto holders.
Repeated Data Leaks Expose Long-Term Risks for Ledger Users
The company has also faced other security challenges, as in December 2023, attackers compromised Ledger’s Connect Kit JavaScript library through a supply-chain exploit, draining nearly $500,000 from users who interacted with affected decentralized applications during a short window.
Security experts note that while the hardware wallets themselves remain uncompromised, repeated leaks of customer data create long-term risks that extend beyond immediate financial loss.
Exposed personal information is often reused in highly convincing phishing campaigns, including fake emails, messages, and even physical letters.
In April 2025, Ledger users received professionally designed mail telling them to scan QR codes and input their 24-word recovery phrases, which was a scam that the company confirmed to be fake.
Owners of @Ledger hardware wallets have reported receiving fake letters designed to trick them into revealing their wallet seed phrases.#Ledger #Scamhttps://t.co/s0jxsJxckm
Some community members traced those efforts back to data obtained during earlier breaches, showing how long such incidents can echo.
The Ledger hack also confirms a larger pattern in the industry, as in December 2025, crypto tax software Maker Koinly alerted users that their email addresses and basic profile information might have been leaked in a hack on analytics firm Mixpanel.
@KoinlyOfficial warns a third-party breach may have exposed user emails but stresses that no wallet, transaction, tax, or portfolio data was shared with Mixpanel.#CryptoSecurity #CryptoTax #Koinlyhttps://t.co/ASDxMchfyg
Supply chain vulnerabilities are mentioned by investigators and regulators as one of the least secure links in crypto security, as attackers focus on vendors who have access to user data, not Core systems.
The attackers are dynamic and evolving in spite of the reported reduction of phishing-related losses by 83% in 2025.
Security companies have noted that the number of losses peaks during times of high activity in the market, and low-activity markets have lower incidences.