Scam Alert

A Number Of Cryptocurrency Wallets Have Been Extracted For Unclear Reasons

Key Points:
  • These hacked accounts typically have the following characteristics: The key is valid from 2014 to 2022, and there is a lot of activity in the cryptocurrency market, with many accounts.
  • There were no indications of phishing sites. Worryingly, the hacked addresses are all OGs (ancient wallets) rather than newly constructed cryptocurrency wallets that have recently entered the market.
On the afternoon of April 18, the crypto community on Twitter erupted after learning that a number of cryptocurrency wallets had been strangely withdrawn.

The Twitter account “Tay” revealed this information. (a member involved in building the MetaMask wallet). “In the last 48 hours, I’ve seen a lot of crypto wallets being drained,” he says. I’m not sure how significant this is, but 5,000 ETH has been stolen since December 2022, including tokens, NFTs, and platform coins on more than 11 distinct blockchains. Nobody knows what the cause is yet.”

This account also states that there is no evidence of being associated with phishing sites. Worryingly, the hacked addresses are all OGs (ancient wallets) rather than newly constructed wallets that have recently entered the market.

Furthermore, some common characteristics of these compromised accounts include:

The key is valid from 2014 until 2022, and there is a lot of activity in the cryptocurrency market, with many accounts. “My current guess is that it’s because some people saved a big amount of cache data from a year ago in order to find the key – the key to the wallet. But this is only a conjecture; I have no idea. This is not a tale about cryptography. Don’t squander your time.”

Hackers are frequently active between 10 a.m. and 4 p.m. (UTC time). Then, between 4 p.m. and 10 p.m., there will be dusting activity. (UTC). The hacker will actively switch to ETH in the victim’s cryptocurrency wallet and then perform the extraction operation with a significant amount of tokens.

Staking positions, NFTs, and lesser-known tokens will not be inspected by hackers because they have not yet been retrieved. There is currently no precise information about the attack’s cause and approach. As a result, the Tay account recommends that users spread assets in a dispersed manner to prevent undesirable risks.

DISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.

Join us to keep track of news: https://linktr.ee/coincu

Chubbi

Coincu News

Chubbi

Recent Posts

Why Qubetics, NEAR Protocol, and IMX Are Dominating Crypto: The Best Altcoins to Join Today for Game-Changing Returns 

Discover why Qubetics, NEAR Protocol, and Immutable X are the best altcoins to join today,…

2 hours ago

Bonk’s ICO Was Just the Start: Why BTFD Coin’s Stage 7 Price Rollback Is Your Second Shot at Crypto Glory

BTFD Coin is offering a chance to relive the glory days of meme coin investing,…

3 hours ago

Decoding BDAG’s AMA: A Blueprint for Scalable Blockchain and Enhanced Community Ties

Explore key takeaways from BlockDAG’s AMA, showcasing strides in scalability, growth of the ecosystem, and…

3 hours ago

Best Cryptos with 1000X Potential: Qubetics Revolutionises Blockchain as Polkadot and Cosmos Shape the Future

Discover why Qubetics, Polkadot, and Cosmos are the best cryptos with 1000X potential, offering innovation,…

7 hours ago

Best Coins to Buy in December 2024: Qubetics Offer 630% ROI, Polkadot Delivers on Interoperability and Near Protocol’s Scalability is Talk of the Town

Explore the best coins to buy in December 2024—Qubetics with its thrilling presale, Polkadot’s interoperability,…

13 hours ago

Crypto Market Outlook 2025 Key Factors to Watch

The Crypto Market Outlook 2025 highlights key areas: stablecoin growth, tokenization, crypto ETFs, DeFi innovation,…

15 hours ago

This website uses cookies.