electrum receiving address change

electrum receiving address change, electrum address

Recently, slow fog technology anti-money laundering (AML) system through continuous tracking found that one of the attackers wallet address bc1qcygs9dl4pqw6atc4yqurzd76p3r9cp6xp2kny has stolen more than 30 BTC, the crime lasted six months, and recently is still active. Slow Fog Technology herely reminds Electrum users of the update prompt, the new version of Electrum in this update prompt is likely to be false, if installed, please promptly transfer Bitcoin out in other security environments. At the same time, we call on the vast number of cryptocurrencies exchanges, wallets and other platforms of the AML wind control system black and monitor such as the above Bitcoin address.

calculate how long my electrum transaction, electrum g

The slow fog area said that the phishing attack that allegedly forged the upgrade prompt had stolen at least 200 BTCs, and that the attack could not have been avoided by upgrading Electrum alone, requiring the entire ecological service to make corresponding changes (because the Electrum client is not a full node, and then has a message on the transaction broadcast and the corresponding service side, the attacker can also deploy a malicious server). Slow fog zones remind users that phishing attacks like Electrum require long-term vigilance. The slow fog zone has previously issued an alert for selectrum phishing updates, and hackers who attacked Electrum wallets used Electrum's software to unusually construct malicious software update prompts to induce users to update and download malware usage. (Slow Fog Zone)