SlowMist Reminder: When using a wallet at risk of being hacked, please make sure to disconnect from the internet before exporting the mnemonic phrase to transfer your assets.
BlockBeats News, December 26, 23pds, Chief Information Security Officer of SlowMist Technology, stated on social media that "Users who have been continuously using wallets from a compromised version must disconnect from the internet first, then export the mnemonic phrase to transfer their assets. Otherwise, if you open the wallet online, it may be compromised. For wallets that have already backed up the mnemonic phrase, be sure to transfer the assets first and then upgrade the wallet."
You may also like

Vietnam Sets Mid-January Timeline for Pilot Crypto Exchange Approvals
Key Takeaways Vietnam aims to regulate its growing cryptocurrency market by licensing pilot digital asset exchanges under a…

Ledger Faces Yet Another Data Breach — Customer Information at Risk
Key Takeaways Ledger, the prominent hardware wallet manufacturer, has experienced another data breach via its payment processor, Global-e,…

2025 Crypto Violence Retrospective: Increasing Assaults and Fatal Incidents in a Growing Market
Key Takeaways Violent incidents involving cryptocurrency holders have escalated, with 2025 documenting 65 attacks, including 4 fatalities. The…

Court Sentences Criminal in Virtual Currency Fraud Case with Major Global Implications
Key Takeaways A landmark case in Beijing reveals a significant cross-border telecom and internet fraud scheme involving virtual…

Rep. Torres Targets Insider Trading on Prediction Markets Following Profitable Maduro Bet
Key Takeaways A substantial Polymarket wager concerning Maduro’s capture has led Rep. Ritchie Torres to propose new legislation…

Cybersecurity Firm Warns of Shai-Hulud 3.0 Threatening the NPM Ecosystem
Key Takeaways SlowMist’s CISO has issued a warning about Shai-Hulud 3.0, a significant threat targeting the NPM ecosystem…

SlowMist Warns of Return of Shai-Hulud 3.0 Supply Chain Attack
Key Takeaways SlowMist’s Chief Information Security Officer alerted the community about the resurgence of Shai-Hulud 3.0, an advanced…

Hackers Exploit Rainbow Six Siege Servers, Ubisoft Responds
Key Takeaways Hackers successfully breached Rainbow Six Siege, distributing enormous amounts of in-game currency. Players discovered unexpected changes…

Trust Wallet Investigates Browser Extension Security Incident
Key Takeaways A recent security incident in Trust Wallet’s browser extension has affected 2,596 wallets, leading to the…

Trust Wallet Users Experience $7 Million Loss Due to Hacked Chrome Extension
Key Takeaways Trust Wallet faced a significant security breach affecting its Chrome extension, resulting in over $7 million…

Trust Wallet Browser Extension Security Incident Leads to Losses
Key Takeaways Trust Wallet identified a significant security breach in its browser extension version 2.68. Approximately over $6…

Trust Wallet Hack Results in $3.5 Million Loss for Major Wallet Holder
Key Takeaways A significant Trust Wallet hack led to the theft of $3.5 million from an inactive wallet.…

Social Engineering in the Crypto Universe: Safeguarding Your Assets in 2025
Key Takeaways Social engineering, a psychological manipulation tactic, has been the leading cause of crypto asset theft in…

Crypto Advice for Newcomers, Veterans, and Skeptics in 2026
Key Takeaways Newcomers should learn about the fundamentals of crypto and blockchain technology before investing. Experimenting with crypto…

Nofx’s Two-Month Journey from Stardom to Scandal: The Open Source Dilemma
Key Takeaways Nofx’s rise and fall in two months highlights inherent challenges in open source projects. A transition…

Enhancing the Future of Cryptocurrency Exchange: Understanding the Landscape
Key Takeaways Cryptocurrency exchange platforms are pivotal for digital currency transactions, offering diverse services tailored to user needs.…

The Evolution of Cryptocurrency Exchanges and the Role of WEEX
Key Takeaways Cryptocurrency exchanges like WEEX play a crucial role in the digital asset trading ecosystem by providing…

The Deepfake Reckoning: Why Crypto’s Next Security Battle Will Be Against Synthetic Humans
Key Takeaways The rise of generative AI and deepfakes poses a significant threat to digital identity verification in…
Vietnam Sets Mid-January Timeline for Pilot Crypto Exchange Approvals
Key Takeaways Vietnam aims to regulate its growing cryptocurrency market by licensing pilot digital asset exchanges under a…
Ledger Faces Yet Another Data Breach — Customer Information at Risk
Key Takeaways Ledger, the prominent hardware wallet manufacturer, has experienced another data breach via its payment processor, Global-e,…
2025 Crypto Violence Retrospective: Increasing Assaults and Fatal Incidents in a Growing Market
Key Takeaways Violent incidents involving cryptocurrency holders have escalated, with 2025 documenting 65 attacks, including 4 fatalities. The…
Court Sentences Criminal in Virtual Currency Fraud Case with Major Global Implications
Key Takeaways A landmark case in Beijing reveals a significant cross-border telecom and internet fraud scheme involving virtual…
Rep. Torres Targets Insider Trading on Prediction Markets Following Profitable Maduro Bet
Key Takeaways A substantial Polymarket wager concerning Maduro’s capture has led Rep. Ritchie Torres to propose new legislation…
Cybersecurity Firm Warns of Shai-Hulud 3.0 Threatening the NPM Ecosystem
Key Takeaways SlowMist’s CISO has issued a warning about Shai-Hulud 3.0, a significant threat targeting the NPM ecosystem…