HomeIntelligenceBrief
🔓 BREACH BRIEF🔴 Critical🔓 Breach

South Korean Tax Agency Accidentally Exposes Crypto Wallet Recovery Phrase, $4.8 M Stolen

The South Korean National Tax Service unintentionally disclosed a Ledger wallet’s 24‑word recovery phrase in a press release, allowing attackers to siphon approximately $4.8 million in cryptocurrency. The incident highlights critical operational‑security gaps in third‑party handling of digital‑asset evidence.

🛡️ LiveThreat™ Intelligence · 📅 March 17, 2026· 📰 schneier.com
🔴
Severity
Critical
🔓
Type
Breach
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
schneier.com

South Korean Tax Agency Accidentally Exposes Crypto Wallet Recovery Phrase, $4.8 M Stolen

What Happened — The South Korean National Tax Service (NTS) published photos of a seized Ledger hardware wallet that unintentionally displayed the handwritten mnemonic recovery phrase. Within minutes, threat actors used the phrase to transfer roughly $4.8 million worth of Pre‑Retogeum (PRTG) tokens to an address they controlled.

Why It Matters for TPRM

  • Public exposure of cryptographic secrets can instantly convert a seized asset into a loss, highlighting the need for strict data‑handling controls with third‑party custodians.
  • Government‑level mishandling demonstrates that even high‑trust partners can create severe supply‑chain risk for downstream organizations.
  • The incident underscores the importance of verifying redaction processes before any public disclosure of seized digital‑asset evidence.

Who Is Affected — Government agencies, law‑enforcement partners, cryptocurrency custodians, and any organization that relies on third‑party hardware‑wallet providers for asset storage.

Recommended Actions

  • Review contracts with custodial and hardware‑wallet vendors for mandatory redaction and data‑sanitization clauses.
  • Validate that your own incident‑response playbooks include steps to scrub sensitive crypto‑key material from public communications.
  • Conduct a tabletop exercise simulating accidental key exposure to test detection and containment capabilities.

Technical Notes — The leak stemmed from a manual press‑release process that failed to redact a handwritten 24‑word seed phrase (the master key for a Ledger cold wallet). No vulnerability in Ledger hardware was exploited; the breach was purely operational. The stolen assets were transferred via standard blockchain transactions, leaving an immutable on‑chain audit trail. Source: Schneier on Security

📰 Original Source
https://www.schneier.com/blog/archives/2026/03/south-korean-police-accidentally-post-cryptocurrency-wallet-password.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.