The world-renowned Bitcoin wallet Electrum "update phishing" currency theft continues.
A new repo qtum-electrum-new has been built to add qtum-related features to the latest code for Bitcoin electrum.
If the user is using a strong password, the malware spreads using Eternal Blue.
According to Johnwick.io, we will continue to monitor and track the further flow of funds after a recent user submitted a coin-losing incident claiming that the download used an Electrum wallet had been phishing and that more than 700 bitcoins had been lost, and that the stolen address had been added to the Devi AML system. It is reported that malicious websites (electrumsecure) fake Electrum website phishing attacks, to guide users to download and use the wallet, in order to steal the user's private key and other sensitive data. Devi Security Labs is here to remind users not to install unknown sources of Electrum wallets, to avoid asset losses. Electrum Official Website: electrum.org Electrum Phishing Website: electrumsecure.
Electrum Wallet is one of the most popular Bitcoin wallets and has been around for several years. However, Electrum wallet users often rely on electrum servers, which presents some security and privacy trade-offs. If you use an Electrum personal server, Electrum wallet users can connect locally to their own private servers, enjoying the convenience of Electrum without any trade-offs.
In contrast, another wallet, Stratis Electrum, is a simplified trading client.
When the EL constellation is selected, it will participate in two cycles (epoch). In the first cycle, EL constellation nodes participate in both SMA1 and SMA2 phases.
At this time, the SPV-based Electrum wallet became the new favorite of Bitcoin players. Especially for small partners who are new to Bitcoin, editors recommend using electrum wallets.
Private key, public key: In the modern cryptographic system, encryption and decryption is the use of different keys (public keys), that is, the public key algorithm (also known as asymmetric algorithm, dual key algorithm), each communicating party needs two keys, that is, public and private keys, these two keys can be decrypted from each other. Public keys are public and do not need to be kept confidential, while private keys are held by individuals themselves and must be kept safe and carefully kept confidential.
The main reason for the Trezor vulnerability is that it does not have built-in multi-signature functionality, so its multi-signature implementation is to support Electrum extensions. This leads to an attack on Electrum, and Trezor is affected.