Fri, 01 Maethereum

قام شخص ما للتو باستنزاف محافظ إيثريوم النائمة منذ فترة طويلة، وقد يعود السبب إلى سنوات مضت

Burns Brief

تم استنزاف المئات من محافظ إيثريوم التي ظلت دون تغيير لسنوات في نفس العنوان الموسوم، مما أدى إلى تحويل التعرض للمفتاح القديم إلى أشد تحذير أمني للعملات المشفرة هذا الأسبوع. وقد أثارت الأخبار قلق المشاركين في السوق، حيث يتطلع الدببة إلى دفع الأسعار إلى الانخفاض بينما يحاول المضاربون على الارتفاع الدفاع عن مستويات الدعم الرئيسية. راقب رد فعل $ETH – التحرك الحاسم فوق أو تحت المستويات الرئيسية سيؤكد الاتجاه التالي.

Hundreds of Ethereum wallets that had sat untouched for years were drained into the same tagged address, turning old key exposure into this week’s sharpest crypto security warning. On Apr. 30, WazzCrypto flagged the incident affecting mainnet wallets on X, and their warning spread quickly because the affected accounts did not appear to be freshly baited hot wallets. They were old wallets with quiet histories, some tied to assets and tooling from an earlier Ethereum era. Over 260 ETH, roughly $600,000, was drained from hundreds of dormant wallets. More than 500 wallets appear to be affected, with losses totaling roughly $800,000, and many wallets have been idle for four to eight years. The related Etherscan address is labeled Fake_Phishing2831105 , and shows 596 transactions, and records a 324.741 ETH movement to THORChain Router v4.1.1 around the Apr. 30 window. The constant across them is more important for now: long-idle wallets have been moved to a common destination, while the compromise path remains unresolved. That unresolved vector makes the drain the strongest warning this week, following a surge in DeFi hacks. Protocol exploits usually give investigators a contract, a function call, or a privileged transaction to inspect. Here, the central question sits at the wallet layer. Did someone obtain old seed phrases, crack weakly generated keys, use leaked private-key material, abuse a tool that once handled keys, or exploit another path that has yet to surface? Public discussion has produced theories including weak entropy in legacy wallet tools, compromised mnemonics, trading-bot key handling, and LastPass-era seed storage. One affected user personally raised the LastPass theory. The practical advice for users is limited but urgent. Idleness does not mitigate private-key risk. A wallet with value depends on the full history of the key, the seed phrase, the device that generated it, the software that touched it, and every place that secret may have been stored. F

Key Takeaways