The on-chain data points out that the Web3 wallet of the victim stayed empty for up to 458 days (nearly 1.5 years) after the phishing approval. Nonetheless, the exploiter remained patient and waited for the funds to enter the respective wallet to drain them. Hence, thirty days back, the wallet received up to 908,551.976006 $USDC. Following this, the attacker executed extraction and emptied the wallet within hours.
According to Scam Sniffer, the exploiter shrewdly drained the victim’s Web3 wallet after it obtained funds. In this respect, a cumulative 125 transfers were reportedly logged before the complete drainage of the respective wallet. The past transfer histories indicate interactions with MetaMask Swaps, Kraken, and other legitimate platforms, disclosing how lingering vulnerabilities could be masked by real activity. Hence, this incident reminds Web3 consumers to revoke former token approvals and regularly audit previous activity to prevent such exploitation.
Go to Source
Author: NixCoin
Key Highlights A 49% stake in World Liberty Financial was sold for $500 million just…
Key Highlights Mac users face new phishing risks; fake audit emails can steal passwords and…
Key Highlights A custom-built algorithm now scans trading data at sub-second intervals to uncover manipulation…
Key Highlights Jeffrey Epstein invested $3 million in Coinbase in 2014 after working with Brock…
Key Highlights The primary obstacle to universal crypto adoption is technical complexity rather than a…
Key Highlights Crypto lost $300B in market value as US liquidity tightened, not due to…
This website uses cookies.
Read More