Your reliable guide in the crypto world, providing comprehensive news and analysis on all things related to cryptocurrency.

Monero’s community wallet loses all funds after attack

  • A recent attack compromised Monero’s community crowdfunding wallet, wiping out its entire balance of 2,675.73 Monero (XMR), worth nearly $460,000.
  • The incident took place on Sept. 1 but was only disclosed on GitHub on Nov. 2 by Monero’s developer Luigi. According to him, the source of the breach has not been identified yet.
  • Monero’s Community Crowdfunding System (CCS) funds development proposals from its members.
  • Luigi and Spagni were the only two people who had access to the wallet seed phrase.
  • To make payments to community members, Luigi used a hot wallet that has been on a Windows 10 Pro desktop since 2017. On Sept. 1, however, the CCS wallet was swept in nine transactions.
  • According to other developers, the breach could have originated from the wallet keys being available online on the Ubuntu server.

A recent attack on Monero’s community crowdfunding wallet resulted in the loss of its entire balance of 2,675.73 Monero (XMR), valued around $460,000. The attack occurred on September 1st but was disclosed on GitHub on November 2nd by Monero’s developer Luigi. The source of the breach has not yet been identified. Monero’s Community Crowdfunding System (CCS) is responsible for funding development proposals from its members. Luigi and Spagni were the only individuals with access to the wallet seed phrase. To make payments, Luigi utilized a hot wallet on a Windows 10 Pro desktop. On September 1st, the CCS wallet was emptied in nine transactions. It is speculated by other developers that the breach may have occurred due to the wallet keys being available online on an Ubuntu server.

Share this article
Shareable URL
Prev Post

What is Driving Cardano’s Price Increase Today?

Next Post

private accounts, tokenization, and healthcare infrastructure grab investors’ attention

Leave a Reply

Your email address will not be published. Required fields are marked *

Read next