When Scammers Go Physical: A Ledger User Receives a Handwritten Phishing Letter

A Ledger customer in Italy got a real handwritten letter with a QR code leading to a phishing site, exposing how the 2020 data breaches of Ledger still fuel scams years later and showing scammers’ low-cost, high‑ROI shift to postal phishing.

Black & White Path
Black & White Path
Black & White Path
When Scammers Go Physical: A Ledger User Receives a Handwritten Phishing Letter

Handwritten Scam Letter Arrives

A Ledger user in Italy recently received the first physical phishing letter they had ever seen. The envelope bears the Ledger logo and contains a QR code that redirects to a phishing website.

Ledger’s Two Data Breaches

First breach – July 2020: about 270,000 customers had their name, address, phone number and email exposed.

Second breach – December 2020: another 27,000 users were affected, this time mainly their email and mailing addresses.

Despite Ledger’s public promise to protect user data, the leaked information remains on the black market five years later, enabling scammers to launch “postal phishing” attacks.

Scammer’s ROI Calculation

Security researchers examined the phishing site and found the domain ends with .gl. The scammers continuously iterate the site, indicating a coordinated effort rather than a lone actor.

Printing cost: a few dollars

Postage: a few dollars

Labor: a few dollars

Total cost: roughly ten to twenty dollars

As soon as a victim scans the QR code and makes a payment, the scammers break even, showing a clear cost‑effective model.

Security Team’s Takeaway

First, the “shelf life” of leaked data is much longer than expected; data from 2020 is still being weaponized in 2025, raising doubts about the effectiveness of post‑breach remediation.

Second, scammers are upgrading the “user experience”. Physical letters bypass the fatigue users have with email spam, making recipients more likely to trust the content and fall for the scam.

Physical ransom letter sample
Physical ransom letter sample
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

information securitydata breachphishingLedgerphysical phishingpostal scamscam ROI
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.