#private keys
10 articles found
Latest
Lost Crypto: Are There Ways to Recover Your Assets?
People can lose their cryptocurrencies in different scenarios. Common cases are losing private keys to their wallets, sending crypto to the wrong address, or being scammed. For different cases, there are recovery methods that may work. In this article, we’ll be discussing the possibilities of regaining control over missing crypto.Hacker Targets RocketSwap, Then Launches Meme Token
RocketSwap, a DEX on the Base Layer 2 network, suffered a hack, losing 471 ETH ($862,000). The team identified lapses, including offline signatures during launchpad deployment and storing private keys on the server. While some accused the team of a potential rug pull, RocketSwap blames a third-party hacker who brute-forced a server to extract private keys. Post-hack, the hacker moved assets to Ethereum, creating a meme token, "LoveRCKT", which saw a brief price surge on Uniswap before plummeting.No NFT photography!
Looks like we have a new kind of wallet asset theft: taking a picture of the balance screen. A scammer claiming to be an investor stole an entire collection of NFTs worth about $4 million from a Webaverse founder. The fraudster explained that he needed to see the proof of NFTs before signing a partnership agreement. The victim insists that he only showed the scammer the Trust Wallet balance interface. He revealed no seed phrases or private keys. The thief took some pictures of the screen and went out for a smoke. A few minutes later the funds were drained from the wallet, and the potential partner had never returned. The weird story is confirmed by Etherscan. The odd thing is that the theft happened on Nov. 26, but was reported only now. Did the victim hope to wake up one fine day and realize that everything was just a dream?SlowMist Identifies Key Reasons for Cryptocurrency Losses
Security company SlowMist has analyzed reports of stolen cryptocurrency assets for the second quarter of 2024, which were collected through the MistTrack platform. This analysis only considered hack reports submitted via the official form, identifying three primary attack methods: theft of private keys, the use of fake crypto wallets, and phishing.Trojan Threat: iToken Wallet's Security Compromised
Several iToken wallet users found their private keys and secret phrases exposed because of a Trojan virus created by a former Huobi employee. Upon this unsettling discovery, iToken's team swiftly notified the endangered users, making them aware of possible wallet risks. The investigation has kicked off, focusing on Huobi employee's involvement.1 - 10 of 10 results