Recently, a major crypto asset security incident has drawn widespread attention. A user reportedly purchased a tampered Cold Wallet device on a short video platform, resulting in the theft of approximately 50 million yuan in digital assets. It is understood that the criminals may have obtained the user's Private Key during the wallet initialization phase, and then transferred the funds through the "Huiwang" trading channel.
Security experts emphasize that such incidents remind users once again that purchasing crypto asset storage devices must go through officially authorized channels and should not be tempted by low prices. Most "unopened" or "discounted" Cold Wallets advertised online are dangerous products that have been maliciously modified and may contain backdoor programs. In the field of digital asset security, choosing trusted channels to purchase hardware devices is the first line of defense in protecting assets.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Recently, a major crypto asset security incident has drawn widespread attention. A user reportedly purchased a tampered Cold Wallet device on a short video platform, resulting in the theft of approximately 50 million yuan in digital assets. It is understood that the criminals may have obtained the user's Private Key during the wallet initialization phase, and then transferred the funds through the "Huiwang" trading channel.
Security experts emphasize that such incidents remind users once again that purchasing crypto asset storage devices must go through officially authorized channels and should not be tempted by low prices. Most "unopened" or "discounted" Cold Wallets advertised online are dangerous products that have been maliciously modified and may contain backdoor programs. In the field of digital asset security, choosing trusted channels to purchase hardware devices is the first line of defense in protecting assets.