MASSIVE WALLET TOKENS HACKING!! SUCUSSFULLY IS CONTINUED

HI All,

Please alert our community Mist multi signature under massive attack and the details are as below:

List of the TOKEN holders are under massive compromise and its ON GOING ON :
https://etherscan.io/address/0x0026070b9f0b2281de86ca9348e131648a771fa7

[1] SONM token holders are drained via below tracking:
https://etherscan.io/address/0x983f6d60db79ea8ca4eb9968c6aff8cfa04b3c63

[2] COFOUND.it token holders are drained via below tracking:
https://etherscan.io/address/0x12fef5e57bf45873cd9b62e9dbd7bfb99e32d73e

[3] ICONOMI token holders are drained via below tracking:
this is a continuous transfer chain tokens are being spread eventually to the below address ... please take care of this. .
https://etherscan.io/address/0x888666ca69e0f178ded6d75b5726cee99a87d698

[4] GOLEM token holders are drained via below tracking:
This is a continuous transfer chain tokens are being spread eventually from the below address ...
https://etherscan.io/address/0xa74476443119a942de498590fe1f2454d7d4ac0d

[5] DDF Digital developers Fund Tokens are in pipeline to be drained form original token holders
https://etherscan.io/address/0xcc4ef9eeaf656ac1a2ab886743e98e97e090ed38

[6] BlockCAT Tokens are in pipeline to be drained form original token holders
This is a continuous transfer chain tokens are being spread eventually from the below address ...
https://etherscan.io/tx/0xc1725d1a24932eebf0a80f407fc4efe1224f87e71452ca56a14a320a409b273c

[7] DAO CASINO token holders are drained via below tracking:
This is a continuous transfer chain tokens are being spread eventually from the below address ...
https://etherscan.io/address/0x725803315519de78d232265a8f1040f054e70b98

[8] ADSHARES token holders are drained via below tracking:
This is a continuous transfer chain tokens are being spread eventually from the below address ...
https://etherscan.io/address/0x422866a8f0b032c5cf1dfbdef31a20f4509562b0

  1. The hacker hacks in to system, and sends the instruction from your wallet to the ORIGINAL contract issuer to transfer the TOKEN with below coding :

It’s an instruction command for the contract issuer to transfer of tokens..
Function: transfer (address _to, uint256 _value) ***
Method ID: 0xa9059cbb
[0]:000000000000000000000000fe068c8b4980fe48a98a430ea68839665c6fbbbc
[1]:0000000000000000000000000000000000000000000000cef964d35e79680000

• Explanation :
[0] is the destination of the token transfer address
[1] is the token value issued by the Original TOKEN issuer to you which is available in the transaction details in ether block chain:

The above command is sent to the contract issuer and it can reviewed as 0 ETHER and those all having 0 ether sent back is hacked! Second proof please click on the transaction details to know more details from wallet to wallet.

• How does the hacker gets the wallet password / private key ?
Most of them save password in the word or note pad file & hacker search it and get it accessed.

• Why are you so sure about the hacking?

My wallet got hacked on 27th JULY 2017 and I have lost the ORIGINAL tokens worth US$50000 purchased and want to share this to our community.

Thanks / CSK

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Logo
Center