A hardware wallet is one of the most secure ways to store cryptocurrency, but only if the device you hold is genuine and uncompromised. Counterfeit hardware wallets, pre-loaded with malicious firmware, and supply chain attacks on hardware wallet shipments are documented threats. An attacker who provides you with a compromised device can steal your funds the moment you transfer assets to it. Before trusting any hardware wallet with real value, verifying its authenticity is a non-negotiable step. This guide explains how to verify Ledger, Trezor, Coldcard, and other leading hardware wallets, and how to avoid compromised devices entirely.
The most important defence against a compromised hardware wallet is purchasing only from official, authorised sources. Every major hardware wallet manufacturer sells directly through their official website. For Ledger, this is ledger.com. For Trezor, this is trezor.io. For Coldcard, this is coinkite.com. For SafePal, it is safepal.com. For Tangem, it is tangem.com. For BitBox, it is bitbox.swiss. These manufacturers also maintain lists of authorised resellers. Never purchase a hardware wallet from Amazon, eBay, Gumtree, Facebook Marketplace, or any secondary marketplace, regardless of how good the price appears. The risk of receiving a compromised device is simply too high.
Ledger uses a cryptographic verification process rather than a physical tamper-evident seal (Ledger specifically advises that the absence of a holographic sticker is correct: legitimate Ledger devices do not have anti-tamper stickers). When you first set up a Ledger device, the Ledger Live software performs a “Genuine Check” that verifies the device contains a genuine Ledger secure element by checking a cryptographic certificate. This check confirms the device has not been replaced with a counterfeit. If the Genuine Check fails, do not use the device and contact Ledger support. Additionally, genuine Ledger devices ship with a blank seed phrase card: if you receive a device that appears to already have a seed phrase written down and included in the box, this is a major red flag indicating a pre-seeded attack.
Trezor devices include a holographic seal on the box. A broken or missing seal does not definitively mean the device is compromised, as seals can be damaged in shipping, but it warrants extra caution. More importantly, Trezor devices boot with a firmware verification process: when you connect a new Trezor to Trezor Suite for the first time, the software checks whether the device contains genuine Trezor firmware. A genuine Trezor device has no pre-installed firmware when shipped from the factory: you install the firmware yourself through Trezor Suite during setup. If a device arrives with firmware already installed, this is suspicious and you should not proceed without contacting Trezor support.
Coldcard is an advanced cold storage device designed for Bitcoin maximalists and security-conscious users. Coldcard uses a secure element (Microchip ATECC608) and provides a bag number for the tamper-evident security bag in which it ships. You can verify the bag number matches Coinkite’s records after purchase to confirm the device was not opened in transit. Coldcard also supports a “Brick Me PIN”: a special code that permanently destroys the device’s secure element if entered, providing a duress protection feature. During initial setup, Coldcard generates its own seed phrase on the device itself, never transmitting it externally.
The most dangerous hardware wallet scam is the pre-seeded wallet attack. In this scheme, an attacker sells (or provides for free via some promotion) a hardware wallet that appears normal but has already been set up with a seed phrase known to the attacker. A fake seed phrase recovery card with those pre-determined words is included in the box, and the user is instructed to use this “supplied” recovery phrase rather than generating their own. When the victim transfers funds to the wallet, the attacker drains them using the known seed phrase. The defence is absolute: always initialise a hardware wallet yourself and generate a completely new seed phrase on the device during setup. Never use a pre-supplied seed phrase from any source, no matter how official it looks. Your seed phrase must be generated by the device in your hands, not supplied from outside.
If you are setting up a hardware wallet that has been previously used (for example, a device you inherited or received as a gift), always perform a factory reset before generating a new seed phrase. A factory reset wipes all existing key material from the device and returns it to a blank state. Your new setup then generates a fresh seed phrase that no one else has ever seen. Never import the previous owner’s seed phrase or use any seed phrase that did not come from your own fresh device setup. Even if you trust the previous owner completely, starting with a clean device is the correct practice.
Beyond software verification, physically inspect any hardware wallet you receive. Check for signs of tampering: unusual glue residue around seams, mismatched screws, differences in finish quality compared to official product photos, or any extra components visible through the casing. Legitimate hardware wallets from established manufacturers are produced to very consistent quality standards. Any hardware that looks different from official product images warrants investigation before use. Photographs of your device alongside official product images can help identify discrepancies. If in doubt, contact the manufacturer directly with photos of the device before proceeding.
Once you have verified your hardware wallet is genuine and have generated a new seed phrase on the device, you are ready to receive crypto. Our step-by-step guide on sending crypto to a hardware wallet from an exchange covers the exact process of transferring assets from an exchange into cold storage safely. Remember to send a small test transaction first, verify receipt on the device before transferring large amounts, and always confirm the receiving address on the hardware wallet’s screen rather than relying solely on what the connected software displays.
After generating a new seed phrase on your verified hardware wallet, back it up immediately. Write each word in order on the provided recovery card or on your own paper. Store the backup in a secure physical location, separate from the hardware wallet itself. For long-term security, consider metal seed phrase backup solutions that are fireproof and waterproof. Our seed phrase storage guide covers all options in detail, from basic paper to advanced cryptographic techniques. Our advanced seed phrase storage guide is also worth reading for anyone managing significant long-term holdings. A crypto wallet backup guide covering the full backup and recovery process is available for complete guidance.
Only purchase hardware wallets from official manufacturer websites or authorised resellers: never from secondary marketplaces. Verify your device using the manufacturer’s official verification method (Ledger Genuine Check, Trezor firmware verification, Coldcard bag number). Never use a pre-supplied seed phrase: always generate a new one on the device itself during your own setup process. Physically inspect the device for signs of tampering. If you inherit a used device, factory reset it before use. Understanding the full hardware wallet security ecosystem and the self-custody awareness principles that underpin it ensures your cold storage remains as secure as the technology allows.
WRITTEN & REVIEWED BY Chris Shepley
UPDATED: MARCH 2026