Hey everyone,
Yesterday I got a letter in the mail that looked like it came from Trezor.
Not an email. Not a text. A physical letter.
And honestly, that is what made it more interesting to me. We are all used to talking about phishing as something that shows up in an inbox or a DM, but this one tried to borrow the credibility of paper mail. At first glance it looked official enough that I think a lot of people would at least stop and consider it.
The letter claimed that an "Authentication Check" was becoming mandatory and that I needed to scan a QR code before a deadline in order to avoid losing access to parts of Trezor Suite.
That is exactly the kind of wording scammers use when they want you to panic first and think later.
I do not want to pretend this was some low-effort scam full of obvious nonsense. It was actually put together pretty well.
That is the part worth talking about, because a lot of people still expect scams to look cheap.
This did not look cheap.
It looked like somebody spent real time trying to build trust.
Even though it looked polished, a few things felt wrong immediately.
First, it came with a regular postage stamp instead of looking like business mail. That does not prove anything by itself, but it stood out to me.
Second, the envelope was sealed with staples. That was weird enough on its own, and it made me wonder if the envelope had been reused or handled in some unusual way.
Third, the entire message was built around urgency:
That pressure is a classic phishing move. Real security companies do not need you to panic-scan a QR code from a mailed letter in order to "save" your wallet access.
Fourth, I decoded the QR code from the letter.
It points to:
https://trezor.authentication-validate.io/
That is exactly the kind of domain trick that can catch people. It starts with trezor, which feels familiar, but the actual registered domain is authentication-validate.io, not trezor.io.
Once I actually read the letter instead of just looking at it, the cracks started showing.
The sender was listed as "Trezor, Inc".
That was a major problem.
From Trezor's own current documentation, the operating company name is Trezor Company s.r.o., and Trezor says it is part of the SatoshiLabs Group. So if you know Trezor mostly through the SatoshiLabs name, your memory is not wrong, but "Trezor, Inc" still does not match the official company naming.
The Prague / Czech Republic address by itself is not suspicious, because Trezor is in Prague. In fact, the official address used in Trezor's own documents is Kundratka 2359/17a, Liben, 180 00 Prague 8, Czech Republic.
So the scam worked by mixing one real-looking detail with other false ones.
The CEO name was another place where I initially thought something was off. After checking, Matěj Žák actually is the CEO of Trezor, so that part appears to be copied from real company information.
That is important, because it shows how these scams work now:
Put all of that together and it becomes believable enough to catch people off guard.
The biggest giveaway was not the stamp, the staples, or even the company name.
It was the claim itself.
To be clear, device authentication is a real thing in the Trezor ecosystem.
But according to Trezor's own documentation, that check happens in Trezor Suite during device setup or device verification, not through a random physical letter telling you to scan a QR code to keep your access.
Trezor's official security guidance says that if you receive unsolicited contact from them by text message, phone call, WhatsApp, Telegram, or postal letter, you should treat it as phishing.
Trezor also says they will never contact you asking you to perform wallet-related actions this way, and that any message urging you to "verify your backup" or do something similar should be treated as a scam.
That lines up with what felt wrong here from the start.
So what this scam appears to do is hijack a real security term and wrap it in a fake compliance threat.
The letter tries to manufacture a fake compliance problem and then funnel the target toward a QR code.
That is not how legitimate wallet security works.
There was one more detail that really pushed this over the line for me.
The letter is dated February 20, 2026.
The domain behind the QR code, authentication-validate.io, was created on February 15, 2026.
So the domain appears to have been registered just five days before the date printed on the letter.
That is not what you expect from an established hardware wallet company supposedly rolling out a major mandatory security feature.
What makes this worth posting about is not that I caught it.
What makes it worth posting about is that I can easily imagine somebody else not catching it.
If you are new to self-custody, or if you are older, tired, distracted, or just not expecting a scam to arrive through the mail, this kind of thing could absolutely work.
That is what bothered me about it.
It was not just fake.
It was competent.
Front of the envelope:

Letter:

Close-up of the QR area / hologram:

If you use a hardware wallet, the lesson is simple:
A scam does not have to look sloppy to be fake.
In 2026, apparently it can show up in your mailbox looking polished, branded, and almost believable.
That should worry all of us a little.
But if you slow down and verify the details, you can still catch it before it catches you.
https://trezor.authentication-validate.io/authentication-validate.io: created 2026-02-15As always,
Michael Garcia a.k.a. TheCrazyGM
Good post - thanks for the heads-up !
The question that jumped into my mind was where or how the scammers found a list of Trezor owners to send the letters to. It seems quite well targetted.
It might not be that Trezor themselves have had a data leak. I can see it as just as likely that the scammers paid some sap in a third world bank call centre who has never seen $10,000 before and doesn't make that in ten years. All they want is a list of debit or credit card payments where Trezor or SatoshiLabs have received funds, and the names and addresses of the card holders. Or perhaps it was an Amazon leak - or anywhere else you can buy the devices where a human can extract a list of customer names and addresses.
Makes me really curious because I have moved 4 times since I purchased that and switched banks about as many times... I am fairly certain I did get it from Amazon and they do have my current address, so it could have been a fairly recent data dump.
They could have also just grabbed any mailing list and sprayed them at random and hope for the best?
Your reply is upvoted by @topcomment; a manual curation service that rewards meaningful and engaging comments.
Trezor would never put the word "Trezor" on the front of the envelope
Yeah, I would like to think they would be quiet and private similar to credit card companies and such when you get a pin etc, usually completely nondescript.
PUBLIC SAFTEY ANNOUNCEMENT!
!PAKX
!PIMP
!PIZZA
View or trade
PAKXtokens.Use !PAKX command if you hold enough balance to call for a @pakx vote on worthy posts! More details available on PAKX Blog.
$PIZZA slices delivered:
@ecoinstant(1/20) tipped @thecrazygm
Learn more at https://hive.pizza.
I'm going to be honest too, that fucking holgram almost sold me.