However, there are a few commonalities among the victims: Most of the attacks have occurred on the weekend, and has the exploiter swapping assets within a victim’s wallet for ETH (often bypassing staked positions, non-fungible tokens and lesser-known coins), consolidating that ETH and then transferring it out. Often the attacker has gone back hours, days or weeks after an initial attack to sweep remaining funds, Monahan said.
Related posts
-
Crypto industry doesn’t need Bitcoin anymore
In an interview posted Thursday, Charles Hoskinson called the Bitcoin following a ‘religion’ and unsustainable. Hoskinson,... -
No, a Sponsored Labeled Crypto Press Release Is Not An Alternative to Editorial Coverage
With these services, press releases are generally just “syndicated”, meaning that, although they will indeed be... -
You Can Take Your Toys and Leave
This is why Web3 people are always banging on about the importance of digital property rights....