Binance Square

钱包被盗

203,878 views
31 Discussing
SONGGUOPENG
--
See original
I woke up and found that my Ethereum balance was taken away by hackers. Last night, I used a hot wallet as an exception. I don't know how the private key on the clipboard was leaked, and my Ethereum balance was taken away while I was asleep. But I usually use a cold wallet, which is absolutely safe. Actually, I copied the private key to the clipboard last night and imported it with Little Fox. Then I successfully sent USDT to the exchange account. When I sent $ETH , it always prompted an error: internal json-rpc error. I basically downloaded all my software from the Google Store, and the reason for the private key leak is not clear yet. #钱包被盗 Stolen address: 0x0d8Dc9FBa7660CFbDf490E16cDD1c9321D581561 Hacker address: 0x133b4def3379bb4d13a9a69b563628a3919486f9 Online viewing of screen recording file (display subtitles; requires international Internet): https://drive.google.com/file/d/11EqlirC_NJHxMEpmyHhs-rSrxQS1PTEe/view?usp=drivesdk
I woke up and found that my Ethereum balance was taken away by hackers.
Last night, I used a hot wallet as an exception. I don't know how the private key on the clipboard was leaked, and my Ethereum balance was taken away while I was asleep.

But I usually use a cold wallet, which is absolutely safe.

Actually, I copied the private key to the clipboard last night and imported it with Little Fox. Then I successfully sent USDT to the exchange account. When I sent $ETH , it always prompted an error: internal json-rpc error.

I basically downloaded all my software from the Google Store, and the reason for the private key leak is not clear yet. #钱包被盗
Stolen address: 0x0d8Dc9FBa7660CFbDf490E16cDD1c9321D581561
Hacker address: 0x133b4def3379bb4d13a9a69b563628a3919486f9
Online viewing of screen recording file (display subtitles; requires international Internet): https://drive.google.com/file/d/11EqlirC_NJHxMEpmyHhs-rSrxQS1PTEe/view?usp=drivesdk
See original
Let me ask, can Binance's wallet only be used in Binance? Can't it be used elsewhere? For example, TP wallet. #钱包被盗
Let me ask, can Binance's wallet only be used in Binance? Can't it be used elsewhere? For example, TP wallet. #钱包被盗
See original
#安全 #web3 #钱包被盗 6 The total loss caused by Web3 ecological hacker attacks, phishing scams, etc. in June reached 183 million US dollars🙀 The editor has sorted out some common scenarios and countermeasures for wallet theft. Let us protect the wallet security together and share the prosperity of the bull market~ Scenario 1: After you recharge or withdraw cash, the hacker immediately sends a transaction similar to your address (for example, your address is 0x123...456, and its address is also 0x123...456). If you have If you are used to copying addresses directly from transaction records, you are prone to being scammed; Prevention method: When proofreading addresses, don’t just look at the beginning and end, but also intercept some of the middle to check; Scenario 2: When copying private keys, scan your editor directly, and the coins are stolen before you transfer; Prevention method: When it comes to private keys and mnemonics, remember to disconnect from the Internet; if you need to send it through social tools, you can truncate it and disrupt the order of sending, etc.; Scenario 3: Use or impersonate a well-known social account of a big V, post a fake phishing link, and you click on it and enter If you sign and perform other operations, the coins will be transferred; Prevention methods: (1) Use the historical collection address; (2) When opening a new link, compare it with the official website address on Twitter to see if it is consistent; Scenario 4: There is a backdoor in the fingerprint browser. Last year, many users who installed Bit Browser reported that their private keys were stolen, involving more than 3,000 wallets Prevention methods: When using the fingerprint browser, check whether its development background, investment institutions, security verification, etc. are reliable; and do not put too much balance in the account wallet used to control the loss within a certain range; Scenario 5: c hrome plug-in was acquired, leaving a backdoor to steal user information; Prevention method: If there is a large balance in the wallet, do not download and use plug-ins that are not well-known; Scenario 6: After authorizing tokens to some smart contracts, the tokens are transferred away; Prevention method: Regularly cancel unnecessary token authorization; when authorizing, only authorize the amount required for operation; some tokens given to the wallet from unknown sources (some are phishing, some cannot be exchanged at all, and cheat you of handling fees), do not authorize; Scenario 7: Pirated wallet, after you import the private key or mnemonic, the coins are gone. Prevention method: Find the official website and download the wallet;
#安全 #web3 #钱包被盗 6 The total loss caused by Web3 ecological hacker attacks, phishing scams, etc. in June reached 183 million US dollars🙀

The editor has sorted out some common scenarios and countermeasures for wallet theft. Let us protect the wallet security together and share the prosperity of the bull market~

Scenario 1: After you recharge or withdraw cash, the hacker immediately sends a transaction similar to your address (for example, your address is 0x123...456, and its address is also 0x123...456). If you have If you are used to copying addresses directly from transaction records, you are prone to being scammed;
Prevention method: When proofreading addresses, don’t just look at the beginning and end, but also intercept some of the middle to check;

Scenario 2:
When copying private keys, scan your editor directly, and the coins are stolen before you transfer;
Prevention method:
When it comes to private keys and mnemonics, remember to disconnect from the Internet; if you need to send it through social tools, you can truncate it and disrupt the order of sending, etc.;

Scenario 3:
Use or impersonate a well-known social account of a big V, post a fake phishing link, and you click on it and enter If you sign and perform other operations, the coins will be transferred;
Prevention methods: (1) Use the historical collection address; (2) When opening a new link, compare it with the official website address on Twitter to see if it is consistent;

Scenario 4:
There is a backdoor in the fingerprint browser. Last year, many users who installed Bit Browser reported that their private keys were stolen, involving more than 3,000 wallets
Prevention methods:
When using the fingerprint browser, check whether its development background, investment institutions, security verification, etc. are reliable; and do not put too much balance in the account wallet used to control the loss within a certain range;

Scenario 5:
c hrome plug-in was acquired, leaving a backdoor to steal user information;
Prevention method:
If there is a large balance in the wallet, do not download and use plug-ins that are not well-known;

Scenario 6:
After authorizing tokens to some smart contracts, the tokens are transferred away;
Prevention method:
Regularly cancel unnecessary token authorization; when authorizing, only authorize the amount required for operation; some tokens given to the wallet from unknown sources (some are phishing, some cannot be exchanged at all, and cheat you of handling fees), do not authorize;

Scenario 7: Pirated wallet, after you import the private key or mnemonic, the coins are gone.
Prevention method: Find the official website and download the wallet;
See original
CoinStats suspends service due to security breach, 1,590 wallets affectedCryptocurrency portfolio management app CoinStats has temporarily shut down its app to address a security breach that affected 1,590 wallets. According to CoinStats, the number of affected wallets only accounts for 1.3% of all wallets, and the centralized exchanges (CEX) connected to these wallets were not affected. Emergency security operations launched to address security breaches Cryptocurrency portfolio management app CoinStats has urgently suspended its services due to a security incident. The incident affected 1,590 user wallets, accounting for 1.3% of the total number of CoinStats wallets. Fortunately, the centralized exchanges connected to these wallets were not affected by the security breach. At the same time, CoinStats is currently investigating scam notifications received by some iOS and Android users.

CoinStats suspends service due to security breach, 1,590 wallets affected

Cryptocurrency portfolio management app CoinStats has temporarily shut down its app to address a security breach that affected 1,590 wallets.
According to CoinStats, the number of affected wallets only accounts for 1.3% of all wallets, and the centralized exchanges (CEX) connected to these wallets were not affected.
Emergency security operations launched to address security breaches
Cryptocurrency portfolio management app CoinStats has urgently suspended its services due to a security incident. The incident affected 1,590 user wallets, accounting for 1.3% of the total number of CoinStats wallets. Fortunately, the centralized exchanges connected to these wallets were not affected by the security breach. At the same time, CoinStats is currently investigating scam notifications received by some iOS and Android users.
See original
30.8 BTC and 328.9 ETH were stolen from a fake wallet!!! More than 3 million US dollars in total, I can't stand it! 🙈🙈 This person downloaded imtoken from Baidu search, 12 minutes after importing the private key, 328.9 ETH and 30.8 BTC were all stolen!! Do not search for wallet downloads in the browser, 99% are fake, Do not search for wallet official websites in the browser, basically they are all fake official websites! You can only confirm carefully, or ask a reliable person, One misstep will lead to eternal regret, and it is highly likely that you will not be able to get it back, 20 million! #钱包被盗
30.8 BTC and 328.9 ETH were stolen from a fake wallet!!!
More than 3 million US dollars in total, I can't stand it! 🙈🙈
This person downloaded imtoken from Baidu search,
12 minutes after importing the private key, 328.9 ETH and 30.8 BTC were all stolen!!
Do not search for wallet downloads in the browser, 99% are fake,
Do not search for wallet official websites in the browser, basically they are all fake official websites!
You can only confirm carefully, or ask a reliable person,
One misstep will lead to eternal regret, and it is highly likely that you will not be able to get it back, 20 million!
#钱包被盗
See original
AdsPower Fingerprint Browser Security Team proactively disclosed a security incident about some of its encrypted wallet plug-ins being maliciously replaced. Relevant users should pay attention and check whether their devices have malicious plug-ins. The users affected this time are mainly Little Fox and OKX wallets. The following will introduce the self-check guide in detail: 1. Open the software-click on the upper right corner to enter the personal settings-click on local settings-click "View details" in other settings to open the system log. Another method is to enter and search directly in the file bar (the C in front refers to the C drive where you installed the software, and the same applies to others) 2. Check all logs from the 21st to the 24th 3. If the words "zipmd5" and other downloads appear, it can be basically confirmed that malicious files have been downloaded. Main hacker address: 0xf772be79bd6d1f4316e938c6c40cf68cf6911c81 0x4e8f3340eFbC48EC36d043F11a5f23D457dB51ea 0xD3d5aF11A482A89D4BbfE4880C3D71D1dE5F155f 0xeb095f0b2e26a2a67c11595065e459439b7de672 0x49e0d1b8b254d1eb7e8ba0f0ab1b4ff94f5ba021 It is recommended that relevant users immediately conduct self-examination, reinstall the Chrome plug-in, and transfer the cryptocurrency to a safe wallet to minimize the risk. #钱包被盗 #指纹浏览器 #钱包安全
AdsPower Fingerprint Browser Security Team proactively disclosed a security incident about some of its encrypted wallet plug-ins being maliciously replaced. Relevant users should pay attention and check whether their devices have malicious plug-ins.

The users affected this time are mainly Little Fox and OKX wallets. The following will introduce the self-check guide in detail:

1. Open the software-click on the upper right corner to enter the personal settings-click on local settings-click "View details" in other settings to open the system log. Another method is to enter and search directly in the file bar (the C in front refers to the C drive where you installed the software, and the same applies to others)

2. Check all logs from the 21st to the 24th

3. If the words "zipmd5" and other downloads appear, it can be basically confirmed that malicious files have been downloaded.

Main hacker address: 0xf772be79bd6d1f4316e938c6c40cf68cf6911c81

0x4e8f3340eFbC48EC36d043F11a5f23D457dB51ea

0xD3d5aF11A482A89D4BbfE4880C3D71D1dE5F155f

0xeb095f0b2e26a2a67c11595065e459439b7de672

0x49e0d1b8b254d1eb7e8ba0f0ab1b4ff94f5ba021

It is recommended that relevant users immediately conduct self-examination, reinstall the Chrome plug-in, and transfer the cryptocurrency to a safe wallet to minimize the risk.

#钱包被盗 #指纹浏览器 #钱包安全
See original
Downloaded a fake wallet and 30.8 BTC and 328.9 ETH were stolen#钱包被盗 I saw a tweet a few days ago that a player downloaded a fake imtoken wallet and had 30.8 BTC and 328.9 ETH stolen, nearly 3 million US dollars, equivalent to more than 22 million RMB! Your wallet is stolen and your assets are reduced to zero. This is the fastest way to lose money in the crypto market. Downloaded a fake wallet and 30.8 BTC was stolen According to the on-chain track of the stolen wallet address, 30.8 BTC were transferred in on February 12 and transferred out on April 25. The owner said that he downloaded the imtoken wallet from Baidu search on April 25 and imported the mnemonic phrase. 12 minutes later, 30.8 BTC and 328.9 ETH in the wallet were transferred away. According to the records, after the BTC was transferred, it was dispersed to 3 different wallet addresses, and they are still on the chain.

Downloaded a fake wallet and 30.8 BTC and 328.9 ETH were stolen

#钱包被盗
I saw a tweet a few days ago that a player downloaded a fake imtoken wallet and had 30.8 BTC and 328.9 ETH stolen, nearly 3 million US dollars, equivalent to more than 22 million RMB!
Your wallet is stolen and your assets are reduced to zero. This is the fastest way to lose money in the crypto market.

Downloaded a fake wallet and 30.8 BTC was stolen
According to the on-chain track of the stolen wallet address, 30.8 BTC were transferred in on February 12 and transferred out on April 25.
The owner said that he downloaded the imtoken wallet from Baidu search on April 25 and imported the mnemonic phrase. 12 minutes later, 30.8 BTC and 328.9 ETH in the wallet were transferred away.
According to the records, after the BTC was transferred, it was dispersed to 3 different wallet addresses, and they are still on the chain.
See original
Regarding the solution for private keys facing quantum computer attacks: ① Use multiple signatures, and only one private key account has assets. The remaining private keys are only used for signature authentication. ​② Each private key account has a daily login limit, and the first private key is the login object ③ For private keys that have logged in more than the limit on the same day, Bitcoin must be paid as the login cost for each subsequent login within the same day, and the paid Bitcoin will be destroyed immediately (quantum computers are used to destroy the value of Bitcoin, so paying Bitcoin for immediate destruction actually increases the value of Bitcoin) ④ For brute force cracking, a bankruptcy login cost must be paid, and brute force cracking by quantum computers will be meaningless. ⑤ If a private key is restricted, the private key owner only needs to change a private key to log in to avoid the login cost (it has no effect on the private key owner, but it limits the brute force cracking of quantum computers and ensures the security of the wallet) #钱包安全 #钱包被盗 #钱包的助记词丢了 #钱包
Regarding the solution for private keys facing quantum computer attacks:

① Use multiple signatures, and only one private key account has assets. The remaining private keys are only used for signature authentication.
​② Each private key account has a daily login limit, and the first private key is the login object
③ For private keys that have logged in more than the limit on the same day, Bitcoin must be paid as the login cost for each subsequent login within the same day, and the paid Bitcoin will be destroyed immediately (quantum computers are used to destroy the value of Bitcoin, so paying Bitcoin for immediate destruction actually increases the value of Bitcoin)
④ For brute force cracking, a bankruptcy login cost must be paid, and brute force cracking by quantum computers will be meaningless.
⑤ If a private key is restricted, the private key owner only needs to change a private key to log in to avoid the login cost (it has no effect on the private key owner, but it limits the brute force cracking of quantum computers and ensures the security of the wallet)

#钱包安全
#钱包被盗
#钱包的助记词丢了
#钱包
See original
Artist DeeKay's wallet was hacked, All crypto assets were stolen, leaving only NFTs It is suspected that the Google cloud leaked and the mnemonic phrase was leaked He said that as a web3 creator, all his income on the chain has been reduced to zero, Only NFTs that have no value now are left NFT bull market, I also chased his NFT, Very cool and unique The assets he accumulated through blockchain have been reduced to zero The income of several years has been stolen Recently, hackers have occurred frequently, whether it is the OG bigwigs in the currency circle such as Shenyu Or web3 creator DeeKay, or many individual players Frequent thefts, be sure to keep your wallet safe Once stolen, assets will be reduced to zero, and there is no possibility of recovery #钱包被盗 #NFT #DeeKay
Artist DeeKay's wallet was hacked,
All crypto assets were stolen, leaving only NFTs
It is suspected that the Google cloud leaked and the mnemonic phrase was leaked
He said that as a web3 creator, all his income on the chain has been reduced to zero,
Only NFTs that have no value now are left
NFT bull market, I also chased his NFT,
Very cool and unique
The assets he accumulated through blockchain have been reduced to zero
The income of several years has been stolen
Recently, hackers have occurred frequently, whether it is the OG bigwigs in the currency circle such as Shenyu
Or web3 creator DeeKay, or many individual players
Frequent thefts, be sure to keep your wallet safe
Once stolen, assets will be reduced to zero, and there is no possibility of recovery
#钱包被盗 #NFT #DeeKay
See original
Downloaded a fake wallet and 30.8 BTC and 328.9 ETH were stolen BTC #钱包被盗 #safeWallet #SAFE I saw a tweet a few days ago that a player downloaded the imtoken fake wallet and 30.8 BTC and 328.9 ETH were stolen, nearly 3 million US dollars, equivalent to more than 22 million RMB! The wallet was stolen and the assets were zero. This is the fastest way to lose money in the crypto market. #safeWallet If there is a privacy protection wallet, how can it be possible (anwang)
Downloaded a fake wallet and 30.8 BTC and 328.9 ETH were stolen
BTC
#钱包被盗 #safeWallet #SAFE

I saw a tweet a few days ago that a player downloaded the imtoken fake wallet and 30.8 BTC and
328.9 ETH were stolen, nearly 3 million US dollars, equivalent to more than 22 million RMB!

The wallet was stolen and the assets were zero. This is the fastest way to lose money in the crypto market.
#safeWallet If there is a privacy protection wallet, how can it be possible (anwang)
See original
A friend in the group said that his friend had 60WU stolen recently! The gains from the crypto market over the past few years were reduced to zero overnight! This friend recently changed to a Huawei triple-screen phone, and imported the previous Apple mobile wallet to the new phone, but the wallet was emptied and the assets were reduced to zero! He did not elaborate on whether he downloaded a fake wallet, or the mnemonic phrase was leaked, or there was a problem in some link, but the wallet balance was indeed gone. 60wu, more than 4 million RMB, the wealth accumulated by hard work for a long time, was reduced to zero overnight. The crypto market may be a faster way to accumulate wealth. At the same time, asset theft and wallet theft also happen frequently. I don’t know which link is not paid attention to, and the balance is reduced to zero. It’s not that Android phones are definitely bad, but Apple phones are relatively safer. Wallets with large balances should avoid connecting to the Internet, or use cold wallets, reduce operations such as importing wallets to new phones and new computers, and reduce interactions as much as possible. If you are not careful, it will be a disaster, which is hard to prevent. If you want to hold $BTC and safely pass the bull and bear markets, you must also learn how to use the wallet and store BTC in a safe wallet. I hope we can all keep our wallets well and gain something in the crypto market! #钱包被盗 #资产被盗 #BTC☀️
A friend in the group said that his friend had 60WU stolen recently!
The gains from the crypto market over the past few years were reduced to zero overnight!
This friend recently changed to a Huawei triple-screen phone,
and imported the previous Apple mobile wallet to the new phone,
but the wallet was emptied and the assets were reduced to zero!

He did not elaborate on whether he downloaded a fake wallet, or the mnemonic phrase was leaked, or there was a problem in some link, but the wallet balance was indeed gone. 60wu, more than 4 million RMB, the wealth accumulated by hard work for a long time, was reduced to zero overnight. The crypto market may be a faster way to accumulate wealth. At the same time, asset theft and wallet theft also happen frequently. I don’t know which link is not paid attention to, and the balance is reduced to zero. It’s not that Android phones are definitely bad, but Apple phones are relatively safer. Wallets with large balances should avoid connecting to the Internet, or use cold wallets, reduce operations such as importing wallets to new phones and new computers, and reduce interactions as much as possible. If you are not careful, it will be a disaster, which is hard to prevent. If you want to hold $BTC and safely pass the bull and bear markets, you must also learn how to use the wallet and store BTC in a safe wallet. I hope we can all keep our wallets well and gain something in the crypto market! #钱包被盗 #资产被盗 #BTC☀️
See original
A major vulnerability in Apple's commonly used software could be exploited by hackers to steal wallets🚂Cisco Talos, a cybersecurity company, recently discovered eight vulnerabilities in the Microsoft 365 app for macOS. Hackers can use these vulnerabilities to bypass the macOS permission model and use existing application permissions to perform malicious operations without additional user verification. In short, Hackers can send emails, record audio, take photos or videos without the user's permission. Talos reported these vulnerabilities to the Microsoft team, and Microsoft responded that these vulnerabilities are of low risk. Since these Microsoft applications need to allow unsigned libraries to be loaded to support plug-in functionality, these vulnerabilities cannot be fixed. However, Microsoft has fixed the vulnerabilities for the following applications that do not support plug-ins:

A major vulnerability in Apple's commonly used software could be exploited by hackers to steal wallets

🚂Cisco Talos, a cybersecurity company, recently discovered eight vulnerabilities in the Microsoft 365 app for macOS. Hackers can use these vulnerabilities to bypass the macOS permission model and use existing application permissions to perform malicious operations without additional user verification. In short,
Hackers can send emails, record audio, take photos or videos without the user's permission.
Talos reported these vulnerabilities to the Microsoft team, and Microsoft responded that these vulnerabilities are of low risk. Since these Microsoft applications need to allow unsigned libraries to be loaded to support plug-in functionality, these vulnerabilities cannot be fixed. However, Microsoft has fixed the vulnerabilities for the following applications that do not support plug-ins:
See original
Search for fake chainlist URLs from Google, add network and token contracts, $7,000 was stolen, and tens of thousands of dollars were paid for tuition😂 Do not search and download directly from Google or Baidu, you may encounter phishing sites, Do not search and download any currency circle tools, download from the official website #chainlist #钱包被盗
Search for fake chainlist URLs from Google, add network and token contracts,
$7,000 was stolen, and tens of thousands of dollars were paid for tuition😂
Do not search and download directly from Google or Baidu, you may encounter phishing sites,
Do not search and download any currency circle tools, download from the official website
#chainlist #钱包被盗
See original
AFP: Cryptocurrency fraud may become a new battlefield for global cybersecurityAccording to a recent report from the Financial Review, the Australian Federal Police (AFP) has uncovered a shocking cryptocurrency scam in which the digital wallets of more than 2,000 Australian citizens were illegally hacked by a foreign fraud gang. Part of a broader effort called Operation Spincaster, which targets cybercrime on a global scale, it marks significant progress in our fight against cryptocurrency crime. The Australian Federal Police and the Joint Police Cyber ​​Crime Co-ordination Centre (JPC3) were at the heart of this operation, working in partnership with other government law enforcement agencies to tackle the growing prevalence of digital fraud and online scams.

AFP: Cryptocurrency fraud may become a new battlefield for global cybersecurity

According to a recent report from the Financial Review, the Australian Federal Police (AFP) has uncovered a shocking cryptocurrency scam in which the digital wallets of more than 2,000 Australian citizens were illegally hacked by a foreign fraud gang.

Part of a broader effort called Operation Spincaster, which targets cybercrime on a global scale, it marks significant progress in our fight against cryptocurrency crime.
The Australian Federal Police and the Joint Police Cyber ​​Crime Co-ordination Centre (JPC3) were at the heart of this operation, working in partnership with other government law enforcement agencies to tackle the growing prevalence of digital fraud and online scams.
See original
Today a friend in the group had his TP wallet stolen for 23wu. Hackers are so abominable and impossible to guard against This friend has no additional apps installed on his phone, and his wallet has not interacted with him in any way. But it was stolen and transferred directly. I don’t know what to do now, who to turn to? You really need to be careful when using your wallet, the tuition is really too expensive😂😂 #钱包被盗 #tp钱包
Today a friend in the group had his TP wallet stolen for 23wu.
Hackers are so abominable and impossible to guard against
This friend has no additional apps installed on his phone, and his wallet has not interacted with him in any way.
But it was stolen and transferred directly.
I don’t know what to do now, who to turn to?
You really need to be careful when using your wallet, the tuition is really too expensive😂😂
#钱包被盗 #tp钱包
See original
Analysis of the risk of theft when investing in virtual currency and related legal issuesRecently, with the popularity of inscriptions and memes on the chain, more and more virtual currency investors are turning their attention to the chain, and transferring funds from centralized exchanges to decentralized on-chain wallet addresses for on-chain transactions. Interaction. Although on-chain opportunities are fairer and more profitable than the secondary market, they also hide huge risks, the most deadly of which is the theft of invested virtual currency. There have been many cases of coin theft in the past few days. The profits and principal obtained by investors through the investment chain have been stolen by the coin gangs, resulting in huge losses. 1. Common risks of virtual currency theft 1. Private keys and mnemonics are leaked, and it is well known that acquaintances steal coins. If you want to transfer the virtual currency in the wallet address on the chain, you only need to master the private key or mnemonic corresponding to the wallet address. That’s fine, so protecting the private key and mnemonic phrase of your wallet address from being leaked is the key point to ensure the security of assets on the chain. There have been several huge cases of currency theft before because investors trusted their friends too much and inadvertently leaked their private keys and mnemonic phrases, resulting in the theft of virtual currencies in their wallets. In addition, some criminal gangs have recently appeared under the banner of virtual currency investment, taking advantage of the high technical threshold of on-chain wallets and the weak security awareness of novice investors to commit currency theft. First, it lures novice investors under the banner of virtual currency investment, enthusiastically guides them to deposit funds through the exchange OTC, and then allows them to withdraw the purchased virtual currency to an on-chain wallet. When guiding the creation of a wallet address, it helps to record the address. Memorize the words, and then restore the wallet on other devices to transfer and steal virtual currency. Therefore, virtual currency investors must properly keep their address private keys and mnemonic phrases when using on-chain wallets. 2. Fake wallet apps phishing and stealing coins Due to compliance and regulatory reasons, wallet APPs on the virtual currency chain cannot be listed on major domestic app stores, so some investors often encounter fake APP download links when downloading wallet APPs. This There is no difference between the fake APP and the official genuine APP in terms of product functions and usage, except that there is a backdoor to obtain the user's wallet private key and mnemonic phrase. When making some small-amount on-chain transfers, assets will not be stolen, so users will not notice it.However, when a large amount of virtual assets is transferred to the wallet address, the phishing gang will immediately transfer the assets in the address to complete the coin theft. 3. Interactive authorization of high-risk contracts on the chain leads to stolen virtual currencies. Investors often exchange investment experiences and new projects in social software such as TG and WeChat communities, and often encounter project links sent by "enthusiastic" group friends. Sometimes if you are not careful, you will interact with a high-risk contract address on the chain, causing the other party to obtain permission to transfer the tokens in the address, and then the virtual currency in the address will be transferred and stolen. 4. Find someone else to register an exchange account on your behalf. Stolen virtual currency exchanges often launch welfare activities such as launchpad and pledge to earn coins. However, due to risk control of activities, the amount of user participation will be limited. In order to obtain more benefits, some users will Find friends around you to register or even buy some overseas KYC accounts to participate in platform activities. Because centralized exchanges can reset and retrieve accounts by submitting relevant identity authentication materials, account assets registered through others are at greater risk of being stolen. 2. How to recover losses after virtual currency is stolen. The biggest feature of blockchain is traceability. Therefore, when the virtual currency in the wallet address on the chain is stolen, it needs to be tracked and located through a browser or related on-chain data tools as soon as possible. Understand the flow of stolen funds and monitor the addresses where stolen funds are deposited. Secondly, due to the decentralized nature of the blockchain, stolen on-chain assets can only be applied for judicial freezing when they enter centralized exchanges, wallets and other institutions. However, the prerequisite for applying for judicial freezing assistance is that a public security certificate must be issued to these institutions. , the court and other regulatory authorities’ certification freezing procedures. In addition, the USDT involved in the case on the chain can also apply for TEDA's assistance in freezing, but the communication operation cost and difficulty are high. After grasping the initial flow of stolen assets, organize relevant materials as soon as possible and request the public security department to intervene in the investigation. Only in this way can freezing procedures be issued as soon as possible to recover losses when virtual assets flow into centralized institutions. Since it is difficult to investigate cases related to virtual currencies and recover losses, it is recommended to promptly entrust professional lawyers and security companies to assist. 3. Legal characterization of virtual currency theft (1) Jurisprudence on the theft of virtual currency for investment introduced by an acquaintance: In a virtual currency theft case heard by the Taocheng District Court in Hengshui, Hebei Province in 2020, the victim Liu was introduced to him by a friend in August 2019. The defendant, Tian, ​​assisted Liu in depositing money to purchase 35 Bitcoins, and assisted him in downloading a wallet to store the purchased Bitcoins.During the operation, Tian took a photo of the mnemonic phrase and login password of the wallet address. In October of the same year, Tian used the address mnemonic he had to recover his wallet address, stole the Bitcoins stored by the victim Liu, and cashed out 9 Bitcoins, making an illegal profit of RMB 390,000. The defendant Tian was ultimately sentenced to three years in prison and fined RMB 100,000 for illegally obtaining computer information system data. (2) Jurisprudence of inducing downloads of phishing websites to steal virtual currencies: In the case number (2023) Hu 0106 Xingchu No. 112 heard by the Jing'an District Court in Shanghai, the defendant Cai conspired with relevant people he met online in mid-2021 to pass Illegal technical means were used to steal other people’s virtual coins. Among them, Cai was responsible for promoting a pre-built “phishing website” on the Chinese Internet, inducing network users to download and install it, and using the “Telegram” communication software with a hidden Trojan program, thereby secretly obtaining the user’s personal information. Virtual currency account password. On November 3, 2021, the criminal gang used the obtained account password to transfer the victim's more than 30 million USDT, 2.83 Bitcoins and other virtual currencies. In the end, the defendant Cai was sentenced to three years and four months in prison and fined RMB 50,000 for the crime of illegally obtaining computer information system data. (3) Find someone else to register an exchange account on your behalf and have it stolen. Jurisprudence: In a coin theft case heard by the Haikou Intermediate People’s Court in June 2022, the victim Wang Moumou purchased financial products from the exchange with high returns and wanted to make additional investments. However, there is a limit on the purchase limit for each account, so Wang reached a verbal agreement with the defendant Xiang to register an exchange account as Xiang. The right to use these accounts belongs to the victim, and the investment risks are also borne by him. If there is a profit, 4% of the profit will be given to the defendant Xiang in return. Later, the defendant Xiang stole the mobile phone card used by Wang that was registered with Xiang's identity, and stole virtual currency by changing the account password of the exchange, ultimately making an illegal profit of more than 13 million yuan. In the end, the defendant Wang was convicted of theft and sentenced to 15 years in prison and fined RMB 600,000. From the above cases, it can be seen that for the criminal act of stealing virtual currency, in judicial practice, there will be two penalties for the crime of illegally obtaining computer information system data and the crime of theft.The main point of controversy is whether virtual currency is “public or private property” within the meaning of criminal law. The viewpoint of being punished with the crime of theft: Virtual currency is obtained through mining, pledging, etc. by spending a lot of time and money. It has a certain economic value and can be artificially possessed, controlled and transferred through on-chain wallets and transfer operations, and should be regarded as property. protected by criminal law. But the problem with determining the crime of theft is how to determine the amount of theft? According to Article 11 of the Shanghai Municipal Opinions on the Application of the "Interpretations on Several Issues Concerning the Application of Laws in Handling Criminal Cases of Theft" issued by the Supreme People's Court and the Supreme People's Procuratorate, if the stolen property cannot be valued and there is no valid price certificate, it can be sold as stolen property. The price determines the amount of theft. From the perspective of the crime of illegally obtaining computer information system data: Virtual currency is not a physical object, and is significantly different from tangible and intangible property such as property in the criminal law sense. It is essentially data information in a computer system. According to the Supreme Court’s “Research Opinions on How to Qualify the Profits from Illegal Sales of Game Coins Using Computers to Steal Others,” the legal attribute of virtual property is computer information system data and should be protected as electronic data. Those who steal virtual currency from online games should be convicted and sentenced for the crime of illegally obtaining computer information system data. In many cases of currency theft, the private key mnemonic of the address is obtained through various technical means, and then the wallet is restored and theft is carried out. Therefore, some people believe that this kind of theft of virtual currency violates the crime of theft and illegality at the same time. The crime of obtaining computer information system data belongs to imaginary competition and should be dealt with from the first level. The prosecutors of the Third Branch of the Beijing Municipal People's Procuratorate believe that the theft of virtual currencies should consider whether it is recognized by the overall legal order, and the punishment should be based on the means of the theft and the dominant subject. The regulatory policy documents on virtual currencies mainly include the "Notice on Preventing Bitcoin Risks" issued by five ministries and commissions in 2013, the "Announcement on Preventing Financing Risks of Token Issuance" issued by seven ministries and commissions in 2017, and the "Notice on Preventing Financing Risks of Token Issuance" issued by ten ministries and commissions in 2021. Notice on Further Preventing and Dealing with the Risks of Speculation in Virtual Currency Transactions”.These three documents represent the regulatory authorities' attitudes towards virtual currencies at different times, from the recognition in 2013 that they were virtual commodities to the later notices that clarified the relevant civil legal actions of investors investing in virtual currencies. If it violates public order and good customs, the contract will be invalid and the losses will be borne by you. Therefore, the theft of virtual currency should be determined at different time points. Scenario 1: Theft of Bitcoins belonging to the exchange through technical means. This kind of currency theft occurred before September 4, 2017. The regulatory authorities did not explicitly prohibit the business of domestic virtual currency exchanges, so technical means were used to steal the exchange’s Bitcoins. The act of virtual currency simultaneously violates the crime of theft and the crime of illegally obtaining computer information system data. Imagination and cooperation should be treated as a felony. This kind of currency theft that occurred after September 4, 2017, because the 94 Announcement explicitly prohibits the domestic virtual currency trading platform business, so the virtual currency in the exchange cannot be deemed as public or private property in the sense of criminal law, so it should be deemed illegal The crime of obtaining computer information system data. Scenario 2: Theft of personally owned Bitcoins through technical means. This kind of currency theft occurred before September 2021. If it constitutes both the crime of theft and the crime of illegally obtaining computer information system data, Imagination Cooperative should be treated as a felony; in Coin theft that occurred after September 2021 is because the 924 notice issued by the regulatory authorities clarified that any legal person, unincorporated organization, or natural person who invests in virtual currencies and related derivatives that violates public order and good customs will have invalid relevant civil legal actions. The losses shall be borne by him/herself. Therefore, the act of stealing money cannot be regulated as the crime of theft, but should be convicted as the crime of illegally obtaining computer information system data. Scenario 3: Using non-technical means to steal private keys and mnemonic phrases to transfer personally owned Bitcoins. Such currency theft that occurred before September 2021 meets the criteria for criminalization and can constitute the crime of theft; in September 2021 Such currency theft that occurred later cannot be regulated as a crime of infringement of property, because the method cannot be evaluated by other means, such as illegally obtaining computer information system data, so it cannot be determined to constitute a crime. The author believes that the above-mentioned views of the Beijing prosecutors reflect that the intensity of protection of domestic virtual currencies by regulatory authorities has gradually decreased with the introduction of regulatory policies. In practice, cases related to virtual currencies in some areas will also be difficult to file on the grounds that they are not protected. .However, the author does not agree with the view that stealing private keys and mnemonic words through non-technical means to transfer personally owned virtual currency after the 924 notification does not constitute a crime. Bitcoin and Ethereum invested by individual citizens are purchased with equivalent legal currency, which is a high-risk investment target. If the theft of such investment products is not considered a crime, it will inevitably lead to more virtual currencies. of theft crimes. In addition, although you can obtain private keys and mnemonic words through non-technical means to transfer other people's virtual currencies, during this transfer and theft operation, you need to restore the wallet address. This behavior of restoring the address to transfer tokens Can it be considered an intrusion of entering a computer information system through technical means without authorization or consent of others? If the answer is yes, can it still be convicted and treated as the crime of illegally obtaining computer information system data? Summary: Although virtual currencies serve as criminal media and tools in many crimes due to their own characteristics, it is undeniable that they have certain technological innovations and financial attributes. Many developed countries are gradually improving regulatory regulations and allowing blockchain Technological innovation is implemented quickly to better serve the real world. It is hoped that regulatory authorities will not be one-size-fits-all when treating this innovative technology, and while cracking down on illegal crimes, they need to give it room for development. Bitcoin and other virtual currencies invested by citizens with real money should be given the necessary protection when they are illegally misappropriated by criminals. #BTC #钱包被盗 #钱包

Analysis of the risk of theft when investing in virtual currency and related legal issues

Recently, with the popularity of inscriptions and memes on the chain, more and more virtual currency investors are turning their attention to the chain, and transferring funds from centralized exchanges to decentralized on-chain wallet addresses for on-chain transactions. Interaction. Although on-chain opportunities are fairer and more profitable than the secondary market, they also hide huge risks, the most deadly of which is the theft of invested virtual currency. There have been many cases of coin theft in the past few days. The profits and principal obtained by investors through the investment chain have been stolen by the coin gangs, resulting in huge losses. 1. Common risks of virtual currency theft 1. Private keys and mnemonics are leaked, and it is well known that acquaintances steal coins. If you want to transfer the virtual currency in the wallet address on the chain, you only need to master the private key or mnemonic corresponding to the wallet address. That’s fine, so protecting the private key and mnemonic phrase of your wallet address from being leaked is the key point to ensure the security of assets on the chain. There have been several huge cases of currency theft before because investors trusted their friends too much and inadvertently leaked their private keys and mnemonic phrases, resulting in the theft of virtual currencies in their wallets. In addition, some criminal gangs have recently appeared under the banner of virtual currency investment, taking advantage of the high technical threshold of on-chain wallets and the weak security awareness of novice investors to commit currency theft. First, it lures novice investors under the banner of virtual currency investment, enthusiastically guides them to deposit funds through the exchange OTC, and then allows them to withdraw the purchased virtual currency to an on-chain wallet. When guiding the creation of a wallet address, it helps to record the address. Memorize the words, and then restore the wallet on other devices to transfer and steal virtual currency. Therefore, virtual currency investors must properly keep their address private keys and mnemonic phrases when using on-chain wallets. 2. Fake wallet apps phishing and stealing coins Due to compliance and regulatory reasons, wallet APPs on the virtual currency chain cannot be listed on major domestic app stores, so some investors often encounter fake APP download links when downloading wallet APPs. This There is no difference between the fake APP and the official genuine APP in terms of product functions and usage, except that there is a backdoor to obtain the user's wallet private key and mnemonic phrase. When making some small-amount on-chain transfers, assets will not be stolen, so users will not notice it.However, when a large amount of virtual assets is transferred to the wallet address, the phishing gang will immediately transfer the assets in the address to complete the coin theft. 3. Interactive authorization of high-risk contracts on the chain leads to stolen virtual currencies. Investors often exchange investment experiences and new projects in social software such as TG and WeChat communities, and often encounter project links sent by "enthusiastic" group friends. Sometimes if you are not careful, you will interact with a high-risk contract address on the chain, causing the other party to obtain permission to transfer the tokens in the address, and then the virtual currency in the address will be transferred and stolen. 4. Find someone else to register an exchange account on your behalf. Stolen virtual currency exchanges often launch welfare activities such as launchpad and pledge to earn coins. However, due to risk control of activities, the amount of user participation will be limited. In order to obtain more benefits, some users will Find friends around you to register or even buy some overseas KYC accounts to participate in platform activities. Because centralized exchanges can reset and retrieve accounts by submitting relevant identity authentication materials, account assets registered through others are at greater risk of being stolen. 2. How to recover losses after virtual currency is stolen. The biggest feature of blockchain is traceability. Therefore, when the virtual currency in the wallet address on the chain is stolen, it needs to be tracked and located through a browser or related on-chain data tools as soon as possible. Understand the flow of stolen funds and monitor the addresses where stolen funds are deposited. Secondly, due to the decentralized nature of the blockchain, stolen on-chain assets can only be applied for judicial freezing when they enter centralized exchanges, wallets and other institutions. However, the prerequisite for applying for judicial freezing assistance is that a public security certificate must be issued to these institutions. , the court and other regulatory authorities’ certification freezing procedures. In addition, the USDT involved in the case on the chain can also apply for TEDA's assistance in freezing, but the communication operation cost and difficulty are high. After grasping the initial flow of stolen assets, organize relevant materials as soon as possible and request the public security department to intervene in the investigation. Only in this way can freezing procedures be issued as soon as possible to recover losses when virtual assets flow into centralized institutions. Since it is difficult to investigate cases related to virtual currencies and recover losses, it is recommended to promptly entrust professional lawyers and security companies to assist. 3. Legal characterization of virtual currency theft (1) Jurisprudence on the theft of virtual currency for investment introduced by an acquaintance: In a virtual currency theft case heard by the Taocheng District Court in Hengshui, Hebei Province in 2020, the victim Liu was introduced to him by a friend in August 2019. The defendant, Tian, ​​assisted Liu in depositing money to purchase 35 Bitcoins, and assisted him in downloading a wallet to store the purchased Bitcoins.During the operation, Tian took a photo of the mnemonic phrase and login password of the wallet address. In October of the same year, Tian used the address mnemonic he had to recover his wallet address, stole the Bitcoins stored by the victim Liu, and cashed out 9 Bitcoins, making an illegal profit of RMB 390,000. The defendant Tian was ultimately sentenced to three years in prison and fined RMB 100,000 for illegally obtaining computer information system data. (2) Jurisprudence of inducing downloads of phishing websites to steal virtual currencies: In the case number (2023) Hu 0106 Xingchu No. 112 heard by the Jing'an District Court in Shanghai, the defendant Cai conspired with relevant people he met online in mid-2021 to pass Illegal technical means were used to steal other people’s virtual coins. Among them, Cai was responsible for promoting a pre-built “phishing website” on the Chinese Internet, inducing network users to download and install it, and using the “Telegram” communication software with a hidden Trojan program, thereby secretly obtaining the user’s personal information. Virtual currency account password. On November 3, 2021, the criminal gang used the obtained account password to transfer the victim's more than 30 million USDT, 2.83 Bitcoins and other virtual currencies. In the end, the defendant Cai was sentenced to three years and four months in prison and fined RMB 50,000 for the crime of illegally obtaining computer information system data. (3) Find someone else to register an exchange account on your behalf and have it stolen. Jurisprudence: In a coin theft case heard by the Haikou Intermediate People’s Court in June 2022, the victim Wang Moumou purchased financial products from the exchange with high returns and wanted to make additional investments. However, there is a limit on the purchase limit for each account, so Wang reached a verbal agreement with the defendant Xiang to register an exchange account as Xiang. The right to use these accounts belongs to the victim, and the investment risks are also borne by him. If there is a profit, 4% of the profit will be given to the defendant Xiang in return. Later, the defendant Xiang stole the mobile phone card used by Wang that was registered with Xiang's identity, and stole virtual currency by changing the account password of the exchange, ultimately making an illegal profit of more than 13 million yuan. In the end, the defendant Wang was convicted of theft and sentenced to 15 years in prison and fined RMB 600,000. From the above cases, it can be seen that for the criminal act of stealing virtual currency, in judicial practice, there will be two penalties for the crime of illegally obtaining computer information system data and the crime of theft.The main point of controversy is whether virtual currency is “public or private property” within the meaning of criminal law. The viewpoint of being punished with the crime of theft: Virtual currency is obtained through mining, pledging, etc. by spending a lot of time and money. It has a certain economic value and can be artificially possessed, controlled and transferred through on-chain wallets and transfer operations, and should be regarded as property. protected by criminal law. But the problem with determining the crime of theft is how to determine the amount of theft? According to Article 11 of the Shanghai Municipal Opinions on the Application of the "Interpretations on Several Issues Concerning the Application of Laws in Handling Criminal Cases of Theft" issued by the Supreme People's Court and the Supreme People's Procuratorate, if the stolen property cannot be valued and there is no valid price certificate, it can be sold as stolen property. The price determines the amount of theft. From the perspective of the crime of illegally obtaining computer information system data: Virtual currency is not a physical object, and is significantly different from tangible and intangible property such as property in the criminal law sense. It is essentially data information in a computer system. According to the Supreme Court’s “Research Opinions on How to Qualify the Profits from Illegal Sales of Game Coins Using Computers to Steal Others,” the legal attribute of virtual property is computer information system data and should be protected as electronic data. Those who steal virtual currency from online games should be convicted and sentenced for the crime of illegally obtaining computer information system data. In many cases of currency theft, the private key mnemonic of the address is obtained through various technical means, and then the wallet is restored and theft is carried out. Therefore, some people believe that this kind of theft of virtual currency violates the crime of theft and illegality at the same time. The crime of obtaining computer information system data belongs to imaginary competition and should be dealt with from the first level. The prosecutors of the Third Branch of the Beijing Municipal People's Procuratorate believe that the theft of virtual currencies should consider whether it is recognized by the overall legal order, and the punishment should be based on the means of the theft and the dominant subject. The regulatory policy documents on virtual currencies mainly include the "Notice on Preventing Bitcoin Risks" issued by five ministries and commissions in 2013, the "Announcement on Preventing Financing Risks of Token Issuance" issued by seven ministries and commissions in 2017, and the "Notice on Preventing Financing Risks of Token Issuance" issued by ten ministries and commissions in 2021. Notice on Further Preventing and Dealing with the Risks of Speculation in Virtual Currency Transactions”.These three documents represent the regulatory authorities' attitudes towards virtual currencies at different times, from the recognition in 2013 that they were virtual commodities to the later notices that clarified the relevant civil legal actions of investors investing in virtual currencies. If it violates public order and good customs, the contract will be invalid and the losses will be borne by you. Therefore, the theft of virtual currency should be determined at different time points. Scenario 1: Theft of Bitcoins belonging to the exchange through technical means. This kind of currency theft occurred before September 4, 2017. The regulatory authorities did not explicitly prohibit the business of domestic virtual currency exchanges, so technical means were used to steal the exchange’s Bitcoins. The act of virtual currency simultaneously violates the crime of theft and the crime of illegally obtaining computer information system data. Imagination and cooperation should be treated as a felony. This kind of currency theft that occurred after September 4, 2017, because the 94 Announcement explicitly prohibits the domestic virtual currency trading platform business, so the virtual currency in the exchange cannot be deemed as public or private property in the sense of criminal law, so it should be deemed illegal The crime of obtaining computer information system data. Scenario 2: Theft of personally owned Bitcoins through technical means. This kind of currency theft occurred before September 2021. If it constitutes both the crime of theft and the crime of illegally obtaining computer information system data, Imagination Cooperative should be treated as a felony; in Coin theft that occurred after September 2021 is because the 924 notice issued by the regulatory authorities clarified that any legal person, unincorporated organization, or natural person who invests in virtual currencies and related derivatives that violates public order and good customs will have invalid relevant civil legal actions. The losses shall be borne by him/herself. Therefore, the act of stealing money cannot be regulated as the crime of theft, but should be convicted as the crime of illegally obtaining computer information system data. Scenario 3: Using non-technical means to steal private keys and mnemonic phrases to transfer personally owned Bitcoins. Such currency theft that occurred before September 2021 meets the criteria for criminalization and can constitute the crime of theft; in September 2021 Such currency theft that occurred later cannot be regulated as a crime of infringement of property, because the method cannot be evaluated by other means, such as illegally obtaining computer information system data, so it cannot be determined to constitute a crime. The author believes that the above-mentioned views of the Beijing prosecutors reflect that the intensity of protection of domestic virtual currencies by regulatory authorities has gradually decreased with the introduction of regulatory policies. In practice, cases related to virtual currencies in some areas will also be difficult to file on the grounds that they are not protected. .However, the author does not agree with the view that stealing private keys and mnemonic words through non-technical means to transfer personally owned virtual currency after the 924 notification does not constitute a crime. Bitcoin and Ethereum invested by individual citizens are purchased with equivalent legal currency, which is a high-risk investment target. If the theft of such investment products is not considered a crime, it will inevitably lead to more virtual currencies. of theft crimes. In addition, although you can obtain private keys and mnemonic words through non-technical means to transfer other people's virtual currencies, during this transfer and theft operation, you need to restore the wallet address. This behavior of restoring the address to transfer tokens Can it be considered an intrusion of entering a computer information system through technical means without authorization or consent of others? If the answer is yes, can it still be convicted and treated as the crime of illegally obtaining computer information system data? Summary: Although virtual currencies serve as criminal media and tools in many crimes due to their own characteristics, it is undeniable that they have certain technological innovations and financial attributes. Many developed countries are gradually improving regulatory regulations and allowing blockchain Technological innovation is implemented quickly to better serve the real world. It is hoped that regulatory authorities will not be one-size-fits-all when treating this innovative technology, and while cracking down on illegal crimes, they need to give it room for development. Bitcoin and other virtual currencies invested by citizens with real money should be given the necessary protection when they are illegally misappropriated by criminals. #BTC #钱包被盗 #钱包
See original
Little White asks the experts: When I transferred from the web wallet to the Binance exchange wallet, I originally had 1 BTC in my account, planning to transfer 0.05 BTC to Binance, but the remaining balance was transferred to another address at the same time. Does this mean my web wallet has been hacked? #钱包被盗 (segwit wallet) Please help me answer, experts 🙏
Little White asks the experts: When I transferred from the web wallet to the Binance exchange wallet, I originally had 1 BTC in my account, planning to transfer 0.05 BTC to Binance, but the remaining balance was transferred to another address at the same time. Does this mean my web wallet has been hacked? #钱包被盗 (segwit wallet) Please help me answer, experts 🙏
See original
🚫 Binance responds: We have nothing to do with WazirX's $235 million hack! Recently, Binance clarified that they have nothing to do with the $235 million cryptocurrency hack liability allegations against WazirX. The dispute began in July 2024, when WazirX reported that one of their multi-signature wallets was hacked, resulting in huge losses. It is reported that this wallet is jointly managed by WazirX team members and third-party custodian provider Liminal. However, Binance made it clear in an official statement that they neither own WazirX nor operate the platform. They emphasized that Binance was not involved in the operation of the compromised wallet or security system at the time of the incident. After the attack, WazirX faced a large number of withdrawal requests that could not be met, and its related entity Zettai Pte Ltd subsequently applied to the Singapore High Court for a suspension of repayment. In court, WazirX founder Nischal Shetty hinted that Binance may be partially responsible for the losses. However, Binance denied the allegations and insisted that it had nothing to do with the hack or the loss of funds. They pointed out that despite previously providing wallet services to WazirX, they had later completed the removal of all funds at WazirX's request and were then fully controlled by WazirX and Liminal. Binance also stated that although the two companies had considered a potential acquisition deal, the deal was not reached. Currently, the ownership and operation of WazirX is in the hands of local entity Zanmai. Binance also criticized WazirX and claimed that they misled customers by implying that Binance owned or controlled the platform. 🗣 Conclusion: This incident not only triggered a discussion on how exchanges can strengthen security measures to protect user assets, but also reminded users and the community of the trust and transparency of exchanges. In short, as legal actions unfold and the attribution of responsibilities is further clarified, this may promote progress in security and regulation across the industry. 💬 What do you think of this incident? Do you think Binance's clarification is enough to dispel doubts? Share your thoughts in the comments! #币安 #WazirX #加密货币安全 #钱包被盗
🚫 Binance responds: We have nothing to do with WazirX's $235 million hack!

Recently, Binance clarified that they have nothing to do with the $235 million cryptocurrency hack liability allegations against WazirX.

The dispute began in July 2024, when WazirX reported that one of their multi-signature wallets was hacked, resulting in huge losses. It is reported that this wallet is jointly managed by WazirX team members and third-party custodian provider Liminal.

However, Binance made it clear in an official statement that they neither own WazirX nor operate the platform. They emphasized that Binance was not involved in the operation of the compromised wallet or security system at the time of the incident.

After the attack, WazirX faced a large number of withdrawal requests that could not be met, and its related entity Zettai Pte Ltd subsequently applied to the Singapore High Court for a suspension of repayment. In court, WazirX founder Nischal Shetty hinted that Binance may be partially responsible for the losses.

However, Binance denied the allegations and insisted that it had nothing to do with the hack or the loss of funds. They pointed out that despite previously providing wallet services to WazirX, they had later completed the removal of all funds at WazirX's request and were then fully controlled by WazirX and Liminal.

Binance also stated that although the two companies had considered a potential acquisition deal, the deal was not reached. Currently, the ownership and operation of WazirX is in the hands of local entity Zanmai. Binance also criticized WazirX and claimed that they misled customers by implying that Binance owned or controlled the platform.

🗣 Conclusion:

This incident not only triggered a discussion on how exchanges can strengthen security measures to protect user assets, but also reminded users and the community of the trust and transparency of exchanges.

In short, as legal actions unfold and the attribution of responsibilities is further clarified, this may promote progress in security and regulation across the industry.

💬 What do you think of this incident? Do you think Binance's clarification is enough to dispel doubts? Share your thoughts in the comments!

#币安 #WazirX #加密货币安全 #钱包被盗
See original
Blockchain Security Guide: How to prevent the risk of coin and U theft to make your digital assets safer!In the blockchain world full of opportunities and challenges, security incidents such as coin theft and U theft occur frequently, causing headaches for many investors. Today, we will bring you a detailed blockchain security guide to help you easily prevent risks and protect your digital assets! First of all, it is very important to choose a safe and reliable operating system. iOS and Mac systems are highly respected for their high security, while Android and Windows systems have become the focus of hacker attacks due to their many vulnerabilities. Therefore, we recommend that you use iOS and Mac systems as much as possible to reduce the risk of being attacked by hackers.

Blockchain Security Guide: How to prevent the risk of coin and U theft to make your digital assets safer!

In the blockchain world full of opportunities and challenges, security incidents such as coin theft and U theft occur frequently, causing headaches for many investors. Today, we will bring you a detailed blockchain security guide to help you easily prevent risks and protect your digital assets!
First of all, it is very important to choose a safe and reliable operating system. iOS and Mac systems are highly respected for their high security, while Android and Windows systems have become the focus of hacker attacks due to their many vulnerabilities. Therefore, we recommend that you use iOS and Mac systems as much as possible to reduce the risk of being attacked by hackers.
See original
Hey, my wallet was stolen again😔 In this case, it is most likely that you downloaded a fake phishing wallet, and after a year of hard work, it was taken away by a scammer. Do not search and download the wallet from the browser, because it is likely to be a phishing URL. Once the mnemonic phrase is imported, the mnemonic phrase may be leaked and the assets will be unsafe. #钱包被盗
Hey, my wallet was stolen again😔
In this case, it is most likely that you downloaded a fake phishing wallet, and after a year of hard work, it was taken away by a scammer.
Do not search and download the wallet from the browser, because it is likely to be a phishing URL.
Once the mnemonic phrase is imported, the mnemonic phrase may be leaked and the assets will be unsafe.
#钱包被盗
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number