Crypto hardware wallet manufacturer Ledger began notifying customers on January 5, 2026, that personal data was exposed after hackers breached Global-e, a third-party e-commerce platform Ledger uses for some online purchases. The breach affects an undisclosed number of customers who bought through Ledger.com when Global-e served as the Merchant of Record.

Incident overview

AttributeDetails
Disclosure dateJanuary 5, 2026
Breached entityGlobal-e (third-party payment processor)
Affected companyLedger (and other Global-e clients)
Breach typeCloud system unauthorized access
First reported byZachXBT (blockchain investigator)
Ledger systems compromisedNo
Global-e system compromisedYes (cloud-based order system)

What was exposed

Global-e confirmed the stolen data includes:

Data typeExposedRisk
Customer namesYesIdentity correlation
Postal addressesYesPhysical targeting
Email addressesYesPhishing campaigns
Telephone numbersYesSIM swapping, vishing
Order numbersYesSocial engineering
Products purchasedYesConfirms crypto ownership
Prices paidYesValue estimation

What was NOT exposed

Ledger emphasized that the most sensitive data remained secure:

Data typeStatusReason
24-word recovery phrasesNot exposedNot stored by Global-e
Private keysNot exposedNot accessible through e-commerce
Cryptocurrency balancesNot exposedSelf-custodial; not visible to third parties
Payment card detailsNot exposedNot included in breach scope
Ledger account credentialsNot exposedSeparate from Global-e systems
Wallet firmwareNot exposedDevice-based, not cloud-stored

“This was not a breach of Ledger’s platform, hardware or software systems, which remain secure. For the avoidance of doubt, as the Ledger product is self-custodial, Global-e does not have access to your 24 words, blockchain balance, or any secrets related to digital assets.” — Ledger statement

Discovery timeline

DateEvent
Late December 2025Global-e detects unauthorized access (estimated)
January 5, 2026Global-e notifies affected brands
January 5, 2026ZachXBT shares notification email on X
January 6, 2026Ledger publishes support article
January 6, 2026Phishing campaigns targeting victims detected
OngoingGlobal-e forensic investigation continues

Broader impact

Ledger was not the only brand affected. Global-e’s cloud-based system contained order data from multiple major brands.

Known Global-e clients

CategoryBrands
FashionBurberry, Hugo Boss, Ralph Lauren, Givenchy, Michael Kors
EntertainmentNetflix, Disney Store
SportsAdidas, Wimbledon
TechnologyLedger
AudioBang & Olufsen
RetailM&S

The scope of the breach across other brands has not been publicly disclosed. Global-e stated it is “currently notifying all potentially affected individuals and relevant regulators directly.”

Additional known impact

CompanyDisclosure
Multiple major retailersLikely affected, not yet disclosed
Consumer brandsCustomer notifications expected

Global-e’s response

ActionDetails
System isolationAffected systems isolated immediately
Security containmentThreat activity contained
NotificationsContacting affected individuals and regulators
InvestigationOngoing forensic review
Third-party IREngaged external security firm

Phishing campaigns already active

Within hours of disclosure, users reported a surge in phishing attempts specifically targeting Ledger owners.

Fake Ledger-Trezor merger campaign

Cybercriminals launched a particularly sophisticated campaign:

ElementDetails
ThemeFake merger between Ledger and Trezor
ClaimUsers must “migrate” wallets due to merger
RequestEnter 24-word recovery phrase
InfrastructureProfessional-looking phishing sites
GoalSteal recovery phrases and drain wallets

Common scam patterns

Scam typeDescriptionRisk
Replacement device emailsClaims Ledger device needs replacementCredential theft
Firmware update noticesUrgent “security update” notificationsMalware delivery
Support callsPhone calls requesting account verificationSocial engineering
Physical packagesFake replacement devices mailed to addressesCompromised hardware
QR code scamsLinks to “verify” wallet via malicious sitesCredential theft
SMS phishingText messages with urgent action requiredLink clicking

Ledger’s warning

“Ledger will never send physical items or ask you to scan QR codes, visit websites, or share your 24-word recovery phrase.”

Why this matters for crypto holders

Address data combined with known Ledger ownership creates targeting risk beyond typical phishing:

RiskThreatSeverity
Physical theft targetingAttackers know you own crypto hardware and where you liveCritical
Social engineeringScammers can reference your actual purchase detailsHigh
SIM swapping setupPhone numbers enable account takeover attacksHigh
”Wrench attack” riskPhysical coercion to hand over cryptoCritical
Targeted burglaryKnown high-value asset holderHigh
Stalking/surveillancePhysical address compromisedHigh
Family targetingCriminals may target family membersHigh

Crypto holders should consider whether their delivery address creates personal safety concerns.

Ledger’s breach history

This is not Ledger’s first third-party data exposure:

YearIncidentRecords affectedSource
2020E-commerce/marketing database272,000Direct breach
2020Shopify rogue employee292,000Insider threat
2023Connect Kit supply chain$484,000 stolenLibrary compromise
2026Global-e cloud breachUndisclosedThird-party

Cumulative exposure concern

FactorImplication
Multiple breachesSame customers may be exposed repeatedly
Data correlationAttackers can combine data from multiple breaches
Long-term targetingVictim lists shared and resold
Trust erosionCustomer confidence affected

Pattern analysis

Incident typeLedger’s own systemsThird-party systems
2020 databaseCompromisedN/A
2020 ShopifyN/ACompromised (insider)
2023 Connect KitSupply chainN/A
2026 Global-eSecureCompromised

The repeated exposure of customer data through third parties—despite Ledger’s own systems remaining secure—highlights the persistent supply chain risk in e-commerce operations.

Hardware wallet security paradox

RealityImplication
Hardware never compromised7+ million units sold, zero confirmed device hacks
Customer data repeatedly exposedE-commerce creates persistent attack surface
Security vs. privacy mismatchStrong device security, weak data protection

Recommendations

For affected Ledger customers

PriorityAction
CriticalNever share your 24-word recovery phrase with anyone
CriticalAssume you’re a target for sophisticated phishing
CriticalVerify ALL communications independently
HighConsider physical address privacy for future purchases
HighMonitor for SIM swap attempts (unusual phone behavior)
HighEnable carrier PIN/passcode protection
MediumReview home security considerations
OngoingWatch for unusual account access or surveillance

Verifying legitimate communications

LegitimateSuspicious
In-app notifications in Ledger LiveEmails asking for recovery phrase
Official website (manually typed URL)Links in emails or SMS
Ledger Live app messagesPhone calls requesting verification
Physical packages you didn’t order
Requests to scan QR codes
Urgent action deadlines

Address privacy measures

OptionBenefit
PO BoxSeparates crypto purchases from home address
Forwarding serviceAdditional layer of anonymity
Work addressReduces home targeting risk
Friend/family address(With their permission)
Alternate identityLegal name alternatives where permitted

Physical security considerations

MeasurePurpose
Home security systemDeter and detect intrusion
Secure storageKeep hardware wallet in safe location
DiscretionDon’t discuss crypto holdings publicly
Travel awarenessBe cautious with hardware wallet travel
Duress walletConsider decoy wallet with small balance

Recommendations for crypto industry

PriorityAction
HighTreat crypto customer data as high-value targeting info
HighMinimize data sharing with third parties
HighAudit vendor security practices annually
HighImplement data minimization in e-commerce
MediumConsider privacy-preserving purchase options
OngoingMonitor for customer data exposure

Context

The Ledger breaches demonstrate that hardware wallet security is only as strong as the weakest link in the purchase chain. While Ledger’s hardware and software remain uncompromised—with over 7 million units sold and zero confirmed device hacks—customers face repeated exposure through third-party vendors handling e-commerce operations.

For crypto holders, this creates a paradox: buying a hardware wallet to secure assets creates a data trail that makes you a target. Organizations selling high-value security products need to treat customer data with the same rigor they apply to the products themselves.

The immediate concern is not cryptocurrency theft (the wallets remain secure) but rather the physical safety and social engineering risks that come from attackers knowing exactly who owns crypto hardware and where they live. The fake Ledger-Trezor merger phishing campaign demonstrates how quickly criminals adapt to capitalize on breach disclosures.

Until crypto hardware manufacturers address the inherent tension between secure products and insecure purchase processes, customers must take extraordinary measures to protect their privacy during acquisition.