Position: Home page » Ethereum » Ethereum stolen

Ethereum stolen

Publish: 2021-05-09 15:32:41
1.

According to several okex and okcoin users, their accounts were stolen, with losses ranging from tens of thousands to millions. According to preliminary statistics, nearly 10 users have reported losing about 600 bitcoins, worth about 20 million yuan

On September 1, some users said that they had 468 okcoin accounts, only 125 of them were left, 343 less. The user said that there is no need for any password or verification to transfer the okcoin contract account to the spot account. The developed currency to currency transaction has no depth at all and is easy to be used by the number stealing personnel. Okcoin does not provide corresponding protection

on September 16, another user transferred 30 BCC tokens stored in okex to okcoin, and on September 23, the account was invaded again, buying and selling between bitcoin, Leyte, Ethereum and RMB for many times, exhausting 30 BCCs and 27 bitcoins, trading nearly 1000 pieces in two hours, and the abnormal IP addresses were Russia and the Netherlands

"if the virtual currency property is changed into legal currency for cash withdrawal, the account is required to have real name authentication, so it is necessary to withdraw the profit in one stroke by knocking or exploding the position." Liu Chaoqun thinks that several problems of okex platform include: there is basically no trading volume of currency trading at ordinary times, and the trading volume suddenly increases a hundred times, so the platform does not do any risk control on this; There is no email or SMS verification for remote login; After the remote login reminder, immediately contact the platform, and the platform does not respond at the first time; The withdrawal speed of profit account is obviously abnormal, much higher than the normal speed

2. I met a hacker
there is no way to find out the theft, just like where the blackmail virus is and who blackmailed it is still a mystery
the nature of bitcoin is that it cannot solve cases
bitcoin (bitcoin: bitcoin) was originally a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals.
3. If your mobile phone is lost, you can report to the relevant department and register. Some Samsung models support remote control function, you can try to use this function to locate the general location of the mobile phone. How to use remote control function:
1. This function needs to enable remote control function, bind Samsung account and open mobile data through mobile phone before losing mobile phone
2. Log in to the remote control website through computer or other mobile phones
3. Enter Samsung account and password to enter the remote control website interface. Click to find my mobile phone, such as mobile networking, using this function, the mobile phone will automatically turn on the GPS function and locate
note: if the mobile phone is not connected to the network or the remote control function is not turned on, or the other party resets the mobile phone, the remote control function cannot be realized.
4. If it's lost, it's better to post the lost advertisement
5. This is completely OK. The new account needs real name authentication. If you forget your password, you can get it back again.
6.

According to Chaina alysis, a research firm, up to 20% of the existing bitcoin has disappeared forever. At the time of the study, about 3.8 million bitcoins could never be retrieved. In this article, we will explore all possible ways to lose bitcoin

1. Cryptocurrency hackers

the hacker behavior of cryptocurrency exchange is the main reason for the loss of bitcoin. Exchanges are a hot target for cyber criminals, accounting for 27% of cyber attacks in 2018. Mt. GOx was the first high-profile cryptocurrency hacker, but since then, many major exchanges have been hacked, including bitfinex, bitstamp and, more recently, cryptopia, the cryptocurrency exchange in New Zealand, which lost 9.4% of its total positions

Malware

the malware on torrent website and Google play store are used to steal passwords from vulnerable categories. For example, there is a malware clipper that uses users' behavior of ing and pasting wallet addresses to steal passwords. For example, if you send BTC to an address, you usually and paste the address, because it is a long string of random characters, clipper malware will exchange wallet addresses, which means that when you paste, you will send encryption to the wrong address

7. Looking for experts
8. Digital cryptocurrency is not issued by legal tender institutions and is not controlled by the central bank. It is based on the open source code of a group of equations calculated by computers all over the world. It is generated by a large number of operations of computer graphics card and CPU, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The design based on cryptography can make the cryptocurrency only be owned by real people. As we all know, virtual currency can be divided into two categories: non cryptocurrency (enterprise currency) and digital cryptocurrency
1. Non cryptocurrency (enterprise currency):
it is issued by companies or private indivials, and can be issued indefinitely. It does not need to solve the equation through the CPU program of computer graphics card. Because it can be issued unlimited according to the market demand, it does not have the value of collection and appreciation< Second, digital cryptocurrency:
it is not issued by legal tender institutions and is not controlled by the central bank. It is based on the open source code of a group of equations calculated by computers all over the world. It is generated by a large number of operations of computer graphics card and CPU, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The design based on cryptography can make the cryptocurrency only be transferred or paid by the real owner< What does digital cryptocurrency look like
real open source code is a series of special solutions generated by a series of complex algorithms. After mining, cryptocurrency is a string of codes, just like the serial number in the lower left corner of RMB. As long as you master the open source code, whoever owns the serial number will have the right to use the cryptocurrency. You can really own this financial digital asset
bitcoin, Ethereum, Leyte, doggy, Ruitai, Ruibo, Dasch and so on are the most well-known coins in the ranking.
9. Novice do not toss wallet, you can put money in a trusted exchange for custody
the private key must be well protected and should not be known to anyone except yourself
wallet is very important. If you want to use it, you should fully understand the choice.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750