According to Bleeping Computer, the BTC wallet app Electrom accused a phishing product called Electrum Pro of stealing a user's seed key on May 9 on GitHub and registering a domain name called electrum without Electrum's permission. The Electrum team noted that there was a piece of code indicating that the counterfeit product might have taken the user's seed key and uploaded it to the electrum. Affected users should transfer funds from BTC URLs managed by Eletrum Pro.
Chain News, lightweight Bitcoin Wallet Electrum announced that the next version will support Lightning network payment, implemented using Python, Electrum as a Lightning network node, wallet users do not need to run lightning network nodes to make payments, electrum lightning network nodes have been merged into the Electrum master branch.
MFE most common jobs
It's not hard to run your own Electrum server and point your wallet to just use it. This restores Electrum to the point where it has the same privacy and security attributes as the full node, where no one else can see the address or transaction that the wallet is interested in. Electrum then becomes an all-node wallet.
$dir - "$homedir/.electrum/wallets"
DeViable Security Labs hereby suggests that versions of Electrum below 3.3.4 are vulnerable to such phishing attacks, and users using Electrum Wallet are requested to update to the latest version of Electrum 3.3.8 via the official website (electrum.org), which has not yet been officially released, and do not use the link in the prompt to avoid asset losses.
Dash releases Dash Electrum 188.8.131.52 version
most common electrum
In a recent announcement on Twitter, Electrum advised users to disable the automatic connection option and manually select a server, while the company is developing a more powerful Electrum.
Vulnerabilities were found in Electrum and Electrum-LTC. It has been fixed in Electrum-LTC 184.108.40.206. If you are running an earlier version, update your software.
Shunto touch melon, open the github of the electrum, we find the following code in the electrum/electrum/ecc.py.
Denley further revealed that the 49 malicious Chrome extensions targeted cryptocurrencies wallets by Ledger, Trezor, Jaxx, Electrum, Myetherwallet, Metamask, Exodus and Keepkey. He found that the wallet most vulnerable was Ledger, which was targeted by 57 percent of malicious browser extensions. The second largest target wallet was Myetherwallet (22%), followed by Trezor (8%), Electrum (4%), Keepkey (4%) and Jaxx (2%)